Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems
暂无分享,去创建一个
Lei Ma | Jianjun Zhao | Yi Li | Yang Liu | Xiaofei Xie | Xiaoning Du | Xiaofei Xie | L. Ma | Xiaoning Du | Yi Li | Yang Liu | Jianjun Zhao | Jianjun Zhao
[1] H. B. Mann,et al. On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other , 1947 .
[2] E. L. Lehmann,et al. Theory of point estimation , 1950 .
[3] S. Seshu,et al. Introduction to the theory of finite-state machines , 1963 .
[4] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[5] Patrick Cousot,et al. Abstract Interpretation Frameworks , 1992, J. Log. Comput..
[6] Dan Roth,et al. Learning Question Classifiers , 2002, COLING.
[7] Lijun Zhang,et al. Probabilistic Model Checking Modulo Theories , 2007, Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007).
[8] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[9] Kenji Fukumizu,et al. Universality, Characteristic Kernels and RKHS Embedding of Measures , 2010, J. Mach. Learn. Res..
[10] Bernhard Schölkopf,et al. Hilbert Space Embeddings and Metrics on Probability Measures , 2009, J. Mach. Learn. Res..
[11] T. Hill,et al. How to combine independent data sets for the same quantity. , 2010, Chaos.
[12] Christopher Potts,et al. Learning Word Vectors for Sentiment Analysis , 2011, ACL.
[13] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[14] Jürgen Schmidhuber,et al. Multi-column deep neural networks for image classification , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[15] Categorical distribution , 2012 .
[16] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[17] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[18] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[19] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[20] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[21] Ryan Cotterell,et al. Weighting Finite-State Transductions With Neural Context , 2016, NAACL.
[22] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[23] Daniel Jurafsky,et al. Understanding Neural Networks through Representation Erasure , 2016, ArXiv.
[24] Antonio Criminisi,et al. Measuring Neural Net Robustness with Constraints , 2016, NIPS.
[25] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[26] Christian Poellabauer,et al. Crafting Adversarial Examples For Speech Paralinguistics Applications , 2017, ArXiv.
[27] Junfeng Yang,et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems , 2017, SOSP.
[28] Moustapha Cissé,et al. Houdini: Fooling Deep Structured Prediction Models , 2017, ArXiv.
[29] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[30] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[31] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[32] Jinfeng Yi,et al. Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach , 2018, ICLR.
[33] Sameer Singh,et al. Generating Natural Adversarial Examples , 2017, ICLR.
[34] Dejing Dou,et al. HotFlip: White-Box Adversarial Examples for Text Classification , 2017, ACL.
[35] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[36] Inderjit S. Dhillon,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018, ICML.
[37] Matthew Mirman,et al. Fast and Effective Robustness Certification , 2018, NeurIPS.
[38] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[39] Lei Ma,et al. DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[40] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[41] Yanjun Qi,et al. Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[42] Ting Wang,et al. TextBugger: Generating Adversarial Text Against Real-world Applications , 2018, NDSS.
[43] Mislav Balunovic,et al. Certifying Geometric Robustness of Neural Networks , 2019, NeurIPS.
[44] Sijia Liu,et al. CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks , 2018, AAAI.
[45] Ngai Wong,et al. POPQORN: Quantifying Robustness of Recurrent Neural Networks , 2019, ICML.
[46] Jianjun Zhao,et al. DeepStellar: model-based quantitative analysis of stateful deep learning systems , 2019, ESEC/SIGSOFT FSE.
[47] Lei Ma,et al. DeepMutation++: A Mutation Testing Framework for Deep Learning Systems , 2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[48] Jinfeng Yi,et al. Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples , 2018, AAAI.