暂无分享,去创建一个
Shing-Chi Cheung | Ming Wen | Yongqiang Tian | Shiqing Ma | Wuqi Zhang | Chengnian Sun | Yu Jiang | Chengnian Sun | Yongqiang Tian | Shiqing Ma | Ming Wen | S. Cheung | Yu Jiang | Wuqi Zhang
[1] Hanan Samet,et al. Pruning Filters for Efficient ConvNets , 2016, ICLR.
[2] Ming Yan,et al. Deep learning library testing via effective model generation , 2020, ESEC/SIGSOFT FSE.
[3] Tao Liu,et al. Security analysis and enhancement of model compressed deep learning systems under adversarial attacks , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).
[4] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Dawn Xiaodong Song,et al. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms , 2018, ECCV.
[6] Lei Ma,et al. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[7] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[8] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[9] Sarangapani Jagannathan,et al. A comprehensive survey on model compression and acceleration , 2020, Artificial Intelligence Review.
[10] Ali Farhadi,et al. XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks , 2016, ECCV.
[11] Guy Jacob,et al. Neural Network Distiller: A Python Package For DNN Compression Research , 2019, ArXiv.
[12] Zhendong Su,et al. Finding deep compiler bugs via guided stochastic program mutation , 2015, OOPSLA.
[13] Lin Xu,et al. Incremental Network Quantization: Towards Lossless CNNs with Low-Precision Weights , 2017, ICLR.
[14] Fuyuan Zhang,et al. DeepSearch: a simple and effective blackbox attack for deep neural networks , 2020, ESEC/SIGSOFT FSE.
[15] Jinfeng Yi,et al. Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach , 2018, ICLR.
[16] Huy Le Nguyen,et al. Algorithms for high dimensional data , 2014 .
[17] Ian Goodfellow,et al. TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing , 2018, ICML.
[18] Zhijian Liu,et al. HAQ: Hardware-Aware Automated Quantization With Mixed Precision , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[20] Shin Yoo,et al. Guiding Deep Learning System Testing Using Surprise Adequacy , 2018, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[21] David G. Lowe,et al. Scalable Nearest Neighbor Algorithms for High Dimensional Data , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Yahong Han,et al. Curls & Whey: Boosting Black-Box Adversarial Attacks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Lei Ma,et al. DeepHunter: a coverage-guided fuzz testing framework for deep neural networks , 2019, ISSTA.
[24] Richard L. Tweedie,et al. Markov Chains and Stochastic Stability , 1993, Communications and Control Engineering Series.
[25] Asit K. Mishra,et al. Apprentice: Using Knowledge Distillation Techniques To Improve Low-Precision Network Accuracy , 2017, ICLR.
[26] Haijun Wang,et al. DiffChaser: Detecting Disagreements for Deep Neural Networks , 2019, IJCAI.
[27] Rich Caruana,et al. Model compression , 2006, KDD '06.
[28] Zhendong Su,et al. Coverage-directed differential testing of JVM implementations , 2016, PLDI.
[29] Bradley P. Carlin,et al. Markov Chain Monte Carlo in Practice: A Roundtable Discussion , 1998 .
[30] Dan Alistarh,et al. Model compression via distillation and quantization , 2018, ICLR.
[31] Suman Jana,et al. DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[32] Junfeng Yang,et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems , 2017, SOSP.
[33] Andrew Gordon Wilson,et al. Simple Black-box Adversarial Attacks , 2019, ICML.
[34] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.