"Boxing Clever": Practical Techniques for Gaining Insights into Training Data and Monitoring Distribution Shift
暂无分享,去创建一个
[1] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[2] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[3] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Razvan Andonie,et al. Big Holes in Big Data: A Monte Carlo Algorithm for Detecting Large Hyper-Rectangles in High Dimensional Data , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[5] Arijit Ghosh,et al. Uniformity of Point Samples in Metric Spaces Using Gap Ratio , 2014, SIAM J. Discret. Math..
[6] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[7] Francisco Herrera,et al. A unifying view on dataset shift in classification , 2012, Pattern Recognit..
[8] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[9] Ji Feng,et al. Deep Forest: Towards An Alternative to Deep Neural Networks , 2017, IJCAI.
[10] Robert B. Gramacy,et al. Ja n 20 08 Bayesian Treed Gaussian Process Models with an Application to Computer Modeling , 2009 .
[11] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[12] Moustapha Cissé,et al. Countering Adversarial Images using Input Transformations , 2018, ICLR.
[13] Geoffrey E. Hinton,et al. Dynamic Routing Between Capsules , 2017, NIPS.