暂无分享,去创建一个
Ian Goodfellow | Pushmeet Kohli | Sumanth Dathathri | Jonathan Uesato | Rudy Bunel | Aditi Raghunathan | Ian J. Goodfellow | Krishnamurthy Dvijotham | Alexey Kurakin | Percy Liang | Jacob Steinhardt | Shreya Shankar | Pushmeet Kohli | Percy Liang | Krishnamurthy Dvijotham | J. Steinhardt | Rudy Bunel | Aditi Raghunathan | S. Shankar | Sumanth Dathathri | J. Uesato | Alexey Kurakin | I. Goodfellow | Shreya Shankar
[1] Zaiwen Wen. FIRST-ORDER METHODS FOR SEMIDEFINITE PROGRAMMING , 2009 .
[2] Yurii Nesterov,et al. Smoothing Technique and its Applications in Semidefinite Optimization , 2004, Math. Program..
[3] Timothy A. Mann,et al. On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models , 2018, ArXiv.
[4] J. Renegar. Efficient First-Order Methods for Linear Programming and Semidefinite Programming , 2014, 1409.5832.
[5] Franz Rendl,et al. A Spectral Bundle Method for Semidefinite Programming , 1999, SIAM J. Optim..
[6] Yoram Singer,et al. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011, J. Mach. Learn. Res..
[7] Cho-Jui Hsieh,et al. Efficient Neural Network Robustness Certification with General Activation Functions , 2018, NeurIPS.
[8] Stephen P. Boyd,et al. Proximal Algorithms , 2013, Found. Trends Optim..
[9] Alexandre d'Aspremont,et al. A Stochastic Smoothing Algorithm for Semidefinite Programming , 2012, SIAM J. Optim..
[10] Pushmeet Kohli,et al. Verification of Non-Linear Specifications for Neural Networks , 2019, ICLR.
[11] Christian Tjandraatmadja,et al. Strong mixed-integer programming formulations for trained neural networks , 2018, Mathematical Programming.
[12] J. Zico Kolter,et al. Scaling provable adversarial defenses , 2018, NeurIPS.
[13] Cho-Jui Hsieh,et al. A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks , 2019, NeurIPS.
[14] Renato D. C. Monteiro,et al. First- and second-order methods for semidefinite programming , 2003, Math. Program..
[15] Barak A. Pearlmutter. Fast Exact Multiplication by the Hessian , 1994, Neural Computation.
[16] Joel Nothman,et al. Author Correction: SciPy 1.0: fundamental algorithms for scientific computing in Python , 2020, Nature Methods.
[17] Pushmeet Kohli,et al. A Dual Approach to Scalable Verification of Deep Networks , 2018, UAI.
[18] Rüdiger Ehlers,et al. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks , 2017, ATVA.
[19] Stephen Tu,et al. Practical first order methods for large scale semidefinite programming , 2014 .
[20] Mykel J. Kochenderfer,et al. Algorithms for Verifying Deep Neural Networks , 2019, Found. Trends Optim..
[21] Aditi Raghunathan,et al. Semidefinite relaxations for certifying robustness to adversarial examples , 2018, NeurIPS.
[22] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[23] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[24] J. Zico Kolter,et al. Certified Adversarial Robustness via Randomized Smoothing , 2019, ICML.
[25] Torsten Koller,et al. Learning-based Model Predictive Control for Safe Exploration and Reinforcement Learning , 2019, ArXiv.
[26] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[27] Manfred Morari,et al. Safety Verification and Robustness Analysis of Neural Networks via Quadratic Constraints and Semidefinite Programming , 2019, ArXiv.
[28] Guanghui Lan,et al. Primal-dual first-order methods with O (1/e) iteration-complexity for cone programming. , 2011 .
[29] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[30] Travis E. Oliphant,et al. Python for Scientific Computing , 2007, Computing in Science & Engineering.
[31] Po-Sen Huang,et al. Achieving Robustness in the Wild via Adversarial Mixing With Disentangled Representations , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[32] J. Danskin. The Theory of Max-Min, with Applications , 1966 .
[33] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[34] Volkan Cevher,et al. Sketchy Decisions: Convex Low-Rank Matrix Optimization with Optimal Storage , 2017, AISTATS.
[35] Pushmeet Kohli,et al. A Unified View of Piecewise Linear Neural Network Verification , 2017, NeurIPS.
[36] Yurii Nesterov,et al. Lectures on Convex Optimization , 2018 .
[37] Volkan Cevher,et al. An Optimal-Storage Approach to Semidefinite Programming using Approximate Complementarity , 2019, SIAM J. Optim..
[38] C. Lemaréchal,et al. Nonsmooth Algorithms to Solve Semidefinite Programs , 1999 .
[39] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[40] Mykel J. Kochenderfer,et al. Toward Scalable Verification for Safety-Critical Deep Networks , 2018, ArXiv.
[41] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[42] Pieter Abbeel,et al. Safe Exploration in Markov Decision Processes , 2012, ICML.
[43] J. Kuczy,et al. Estimating the Largest Eigenvalue by the Power and Lanczos Algorithms with a Random Start , 1992 .
[44] J. Zico Kolter,et al. Learning perturbation sets for robust machine learning , 2020, ICLR.
[45] Natalia Gimelshein,et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.
[46] B. Parlett. The Symmetric Eigenvalue Problem , 1981 .
[47] Manfred Morari,et al. Efficient and Accurate Estimation of Lipschitz Constants for Deep Neural Networks , 2019, NeurIPS.
[48] Wotao Yin,et al. Alternating direction augmented Lagrangian methods for semidefinite programming , 2010, Math. Program. Comput..
[49] J. Zico Kolter,et al. Provable defenses against adversarial examples via the convex outer adversarial polytope , 2017, ICML.
[50] Sven Gowal,et al. Scalable Verified Training for Provably Robust Image Classification , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[51] Matthew Mirman,et al. Fast and Effective Robustness Certification , 2018, NeurIPS.
[52] Volkan Cevher,et al. Scalable Semidefinite Programming , 2019, SIAM J. Math. Data Sci..
[53] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[54] Honglak Lee,et al. SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image Editing , 2019, ECCV.
[55] C. Lanczos. An iteration method for the solution of the eigenvalue problem of linear differential and integral operators , 1950 .
[56] Sanjeev Arora,et al. A combinatorial, primal-dual approach to semidefinite programs , 2007, STOC '07.
[57] Mislav Balunovic,et al. Adversarial Training and Provable Defenses: Bridging the Gap , 2020, ICLR.
[58] Henryk Wozniakowski,et al. Estimating the Largest Eigenvalue by the Power and Lanczos Algorithms with a Random Start , 1992, SIAM J. Matrix Anal. Appl..
[59] Pushmeet Kohli,et al. Adversarial Risk and the Dangers of Evaluating Against Weak Attacks , 2018, ICML.
[60] Russ Tedrake,et al. Evaluating Robustness of Neural Networks with Mixed Integer Programming , 2017, ICLR.
[61] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[62] Yuval Tassa,et al. Safe Exploration in Continuous Action Spaces , 2018, ArXiv.
[63] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[64] Matthew Mirman,et al. Differentiable Abstract Interpretation for Provably Robust Neural Networks , 2018, ICML.
[65] A. Hardness,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018 .
[66] Inderjit S. Dhillon,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018, ICML.
[67] Suman Jana,et al. Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).