暂无分享,去创建一个
[1] Tsuyoshi Murata,et al. {m , 1934, ACML.
[2] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[3] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[5] Sanjit A. Seshia,et al. Formal Specification for Deep Neural Networks , 2018, ATVA.
[6] Pushmeet Kohli,et al. A Dual Approach to Scalable Verification of Deep Networks , 2018, UAI.
[7] Alessio Lomuscio,et al. Reachability Analysis for Neural Agent-Environment Systems , 2018, KR.
[8] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[9] Milan Sonka,et al. Image Processing, Analysis and Machine Vision , 1993, Springer US.
[10] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[11] Leonid Ryzhyk,et al. Verifying Properties of Binarized Deep Neural Networks , 2017, AAAI.
[12] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[13] Junfeng Yang,et al. Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems , 2017, ArXiv.
[14] Milan Sonka,et al. Image pre-processing , 1993 .
[15] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[16] Alessio Lomuscio,et al. An approach to reachability analysis for feed-forward ReLU neural networks , 2017, ArXiv.
[17] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[18] Min Wu,et al. Safety Verification of Deep Neural Networks , 2016, CAV.
[19] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[20] Rüdiger Ehlers,et al. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks , 2017, ATVA.