Adversarial Parameter Defense by Multi-Step Risk Minimization
暂无分享,去创建一个
Liangyou Li | Xuancheng Ren | Qi Su | Xu Sun | Ruixuan Luo | Zhiyuan Zhang
[1] Graham Neubig,et al. Weight Poisoning Attacks on Pretrained Models , 2020, ACL.
[2] Hossein Mobahi,et al. Sharpness-Aware Minimization for Efficiently Improving Generalization , 2020, ArXiv.
[3] Indranil Saha,et al. journal homepage: www.elsevier.com/locate/neucom , 2022 .
[4] Arash Behboodi,et al. Gradient $\ell_1$ Regularization for Quantization Robustness , 2020, ICLR.
[5] Dimitris N. Metaxas,et al. Maximum-Entropy Adversarial Data Augmentation for Improved Generalization and Robustness , 2020, NeurIPS.
[6] Siddharth Garg,et al. BadNets: Evaluating Backdooring Attacks on Deep Neural Networks , 2019, IEEE Access.
[7] Markus Nagel,et al. Data-Free Quantization Through Weight Equalization and Bias Correction , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[8] Deliang Fan,et al. TBT: Targeted Neural Network Attack With Bit Trojan , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Tiago Oliveira Weber,et al. Amplifier-based MOS Analog Neural Network Implementation and Weights Optimization , 2019, 2019 32nd Symposium on Integrated Circuits and Systems Design (SBCCI).
[10] Bin Dong,et al. You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle , 2019, NeurIPS.
[11] Jorge Nocedal,et al. On Large-Batch Training for Deep Learning: Generalization Gap and Sharp Minima , 2016, ICLR.
[12] J. Feldmann,et al. All-optical spiking neurosynaptic networks with self-learning capabilities , 2019, Nature.
[13] Jia Xu,et al. Adversarial Defense Via Local Flatness Regularization , 2019, 2020 IEEE International Conference on Image Processing (ICIP).
[14] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[15] Xu Sun,et al. Exploring the Vulnerability of Deep Neural Networks: A Study of Parameter Corruption , 2020, ArXiv.
[16] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[17] Antonio Torralba,et al. Ieee Transactions on Pattern Analysis and Machine Intelligence 1 80 Million Tiny Images: a Large Dataset for Non-parametric Object and Scene Recognition , 2022 .
[18] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[19] Alexander M. Rush,et al. Sequence-to-Sequence Learning as Beam-Search Optimization , 2016, EMNLP.
[20] Lysandre Debut,et al. HuggingFace's Transformers: State-of-the-art Natural Language Processing , 2019, ArXiv.
[21] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[23] Mahmood Amiri,et al. A Digital Hardware System for Spiking Network of Tactile Afferents , 2019, Frontiers in Neuroscience.
[24] Yisen Wang,et al. Adversarial Weight Perturbation Helps Robust Generalization , 2020, NeurIPS.
[25] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[26] Luc Van Gool,et al. The Pascal Visual Object Classes (VOC) Challenge , 2010, International Journal of Computer Vision.
[27] Yufeng Li,et al. A Backdoor Attack Against LSTM-Based Text Classification Systems , 2019, IEEE Access.
[28] Nathan Srebro,et al. Exploring Generalization in Deep Learning , 2017, NIPS.
[29] Yi Zhang,et al. Stronger generalization bounds for deep nets via a compression approach , 2018, ICML.
[30] Jan Niehues,et al. The IWSLT 2015 Evaluation Campaign , 2015, IWSLT.
[31] Richong Zhang,et al. Regularizing Neural Networks via Adversarial Model Perturbation , 2020, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Simon S. Du,et al. Improved Corruption Robust Algorithms for Episodic Reinforcement Learning , 2021, ICML.
[33] Farida Cheriet,et al. An Efficient FPGA-based Overlay Inference Architecture for Fully Connected DNNs , 2018, 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig).
[34] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[35] R. Venkatesh Babu,et al. Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Braden Phillips,et al. A Scalable Network-on-Chip Based Neural Network Implementation on FPGAs , 2019, 2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF).
[37] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[38] Tara N. Sainath,et al. State-of-the-Art Speech Recognition with Sequence-to-Sequence Models , 2017, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[39] Tom Goldstein,et al. FreeLB: Enhanced Adversarial Training for Language Understanding , 2019, ICLR 2020.
[40] Stanley Osher,et al. Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization , 2018, ArXiv.
[41] Christopher Potts,et al. Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank , 2013, EMNLP.
[42] Stefano Soatto,et al. Entropy-SGD: biasing gradient descent into wide valleys , 2016, ICLR.
[43] Jason Yosinski,et al. LCA: Loss Change Allocation for Neural Network Training , 2019, NeurIPS.
[44] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.