暂无分享,去创建一个
Carola-Bibiane Schönlieb | Christian Etmann | Peter Maass | Sebastian Lunz | P. Maass | Christian Etmann | C. Schönlieb | Sebastian Lunz | C. Etmann
[1] Aleksander Madry,et al. Robustness May Be at Odds with Accuracy , 2018, ICLR.
[2] Guillermo Sapiro,et al. Robust Large Margin Deep Neural Networks , 2017, IEEE Transactions on Signal Processing.
[3] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Ankur Taly,et al. Axiomatic Attribution for Deep Networks , 2017, ICML.
[5] Matthias Bethge,et al. Foolbox v0.8.0: A Python toolbox to benchmark the robustness of machine learning models , 2017, ArXiv.
[6] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[7] Alexander Binder,et al. Explaining nonlinear classification decisions with deep Taylor decomposition , 2015, Pattern Recognit..
[8] Raja Giryes,et al. Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization , 2018, ECCV.
[9] Lawrence D. Jackel,et al. Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.
[10] Martin Wattenberg,et al. SmoothGrad: removing noise by adding noise , 2017, ArXiv.
[11] Matthias Bethge,et al. Robust Perception through Analysis by Synthesis , 2018, ArXiv.
[12] Harris Drucker,et al. Improving generalization performance using double backpropagation , 1992, IEEE Trans. Neural Networks.
[13] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[15] Cem Anil,et al. Sorting out Lipschitz function approximation , 2018, ICML.
[16] Bernhard Schölkopf,et al. Adversarial Vulnerability of Neural Networks Increases With Input Dimension , 2018, ArXiv.
[17] Hossein Mobahi,et al. Large Margin Deep Networks for Classification , 2018, NeurIPS.
[18] Thomas Brox,et al. Striving for Simplicity: The All Convolutional Net , 2014, ICLR.
[19] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[20] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[21] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[22] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[23] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[24] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.
[25] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..