暂无分享,去创建一个
[1] D. Luenberger. Optimization by Vector Space Methods , 1968 .
[2] Jon A. Wellner,et al. Weak Convergence and Empirical Processes: With Applications to Statistics , 1996 .
[3] Csaba Szepesvári,et al. A Unified Analysis of Value-Function-Based Reinforcement-Learning Algorithms , 1999, Neural Computation.
[4] Peter L. Bartlett,et al. Rademacher and Gaussian Complexities: Risk Bounds and Structural Results , 2003, J. Mach. Learn. Res..
[5] S. Boucheron,et al. Theory of classification : a survey of some recent advances , 2005 .
[6] J. Andrew Bagnell,et al. Maximum margin planning , 2006, ICML.
[7] Peng Sun,et al. A Robust Optimization Perspective on Stochastic Programming , 2007, Oper. Res..
[8] C. Villani. Optimal Transport: Old and New , 2008 .
[9] A. Juditsky,et al. Solving variational inequalities with Stochastic Mirror-Prox algorithm , 2008, 0809.0815.
[10] Shie Mannor,et al. Robustness and Regularization of Support Vector Machines , 2008, J. Mach. Learn. Res..
[11] Koby Crammer,et al. A theory of learning from different domains , 2010, Machine Learning.
[12] Melvyn Sim,et al. Distributionally Robust Optimization and Its Tractable Approximations , 2010, Oper. Res..
[13] Shie Mannor,et al. A distributional interpretation of robust optimization , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[14] Yinyu Ye,et al. Distributionally Robust Optimization Under Moment Uncertainty with Application to Data-Driven Problems , 2010, Oper. Res..
[15] R. Bass. Convergence of probability measures , 2011 .
[16] Anja De Waegenaere,et al. Robust Solutions of Optimization Problems Affected by Uncertain Probabilities , 2011, Manag. Sci..
[17] Saeed Ghadimi,et al. Stochastic First- and Zeroth-Order Methods for Nonconvex Stochastic Programming , 2013, SIAM J. Optim..
[18] Gábor Lugosi,et al. Concentration Inequalities - A Nonasymptotic Theory of Independence , 2013, Concentration Inequalities.
[19] Jean-Philippe Vial,et al. Robust Optimization , 2021, ICORES.
[20] Bastian Goldlücke,et al. Variational Analysis , 2014, Computer Vision, A Reference Guide.
[21] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[22] Stephen P. Boyd,et al. Proximal Algorithms , 2013, Found. Trends Optim..
[23] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Daniel Kuhn,et al. Distributionally Robust Logistic Regression , 2015, NIPS.
[25] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[26] Shin Ishii,et al. Distributional Smoothing with Virtual Adversarial Training , 2015, ICLR 2016.
[27] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[28] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[29] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[30] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[31] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[32] Benjamin Pfaff,et al. Perturbation Analysis Of Optimization Problems , 2016 .
[33] John C. Duchi,et al. Stochastic Gradient Methods for Distributionally Robust Optimization with f-divergences , 2016, NIPS.
[34] Sepp Hochreiter,et al. Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs) , 2015, ICLR.
[35] Karthyek R. A. Murthy,et al. Quantifying Distributional Model Risk Via Optimal Transport , 2016, Math. Oper. Res..
[36] Mykel J. Kochenderfer,et al. Towards Proving the Adversarial Robustness of Deep Neural Networks , 2017, FVAV@iFM.
[37] Dawn Xiaodong Song,et al. Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong , 2017, ArXiv.
[38] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[39] Min Wu,et al. Safety Verification of Deep Neural Networks , 2016, CAV.
[40] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[41] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[42] Martín Abadi,et al. Adversarial Patch , 2017, ArXiv.
[43] Yunmei Chen,et al. Accelerated schemes for a class of variational inequalities , 2014, Mathematical Programming.
[44] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[45] Vishal Gupta,et al. Data-driven robust optimization , 2013, Math. Program..
[46] Terrance E. Boult,et al. Towards Robust Deep Neural Networks with BANG , 2016, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).
[47] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[48] Daniel Kuhn,et al. Data-driven distributionally robust optimization using the Wasserstein metric: performance guarantees and tractable reformulations , 2015, Mathematical Programming.
[49] M. KarthyekRajhaaA.,et al. Robust Wasserstein profile inference and applications to machine learning , 2019, J. Appl. Probab..