Differentiable Abstract Interpretation for Provably Robust Neural Networks
暂无分享,去创建一个
[1] Patrick Cousot,et al. A static analyzer for large safety-critical software , 2003, PLDI '03.
[2] Eric Goubault,et al. An Accurate Join for Zonotopes, Preserving Affine Input/Output Relations , 2012, NSAD@SAS.
[3] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[4] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[5] Eric Goubault,et al. Perturbed affine arithmetic for invariant computation in numerical program analysis , 2008, ArXiv.
[6] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[7] Andrew Y. Ng,et al. Reading Digits in Natural Images with Unsupervised Feature Learning , 2011 .
[8] Klaus-Robert Müller,et al. Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.
[9] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[10] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[11] David L. Dill,et al. Ground-Truth Adversarial Examples , 2017, ArXiv.
[12] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[13] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[14] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[15] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[16] Dawn Song,et al. Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.
[17] Yoshua Bengio,et al. Série Scientifique Scientific Series Incorporating Second-order Functional Knowledge for Better Option Pricing Incorporating Second-order Functional Knowledge for Better Option Pricing , 2022 .
[18] Roland Vollgraf,et al. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.
[19] Swarat Chaudhuri,et al. Bridging boolean and quantitative synthesis using smoothed proof search , 2014, POPL.
[20] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .
[21] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[22] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[23] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[24] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[25] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[26] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[27] Eric Goubault,et al. The Zonotope Abstract Domain Taylor1+ , 2009, CAV.