暂无分享,去创建一个
[1] Mislav Balunovic,et al. Certifying Geometric Robustness of Neural Networks , 2019, NeurIPS.
[2] Ole Winther,et al. Autoencoding beyond pixels using a learned similarity metric , 2015, ICML.
[3] Junfeng Yang,et al. Efficient Formal Safety Analysis of Neural Networks , 2018, NeurIPS.
[4] Aaron C. Courville,et al. Adversarially Learned Inference , 2016, ICLR.
[5] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[6] Volkan Cevher,et al. On Certifying Non-uniform Bound against Adversarial Attacks , 2019, ICML.
[7] Xiaogang Wang,et al. FD-GAN: Pose-guided Feature Distilling GAN for Robust Person Re-identification , 2018, NeurIPS.
[8] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[9] Alexei A. Efros,et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[10] Russ Tedrake,et al. Evaluating Robustness of Neural Networks with Mixed Integer Programming , 2017, ICLR.
[11] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[12] Matthew Mirman,et al. Differentiable Abstract Interpretation for Provably Robust Neural Networks , 2018, ICML.
[13] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[14] Lawrence Carin,et al. Second-Order Adversarial Attack and Certifiable Robustness , 2018, ArXiv.
[15] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[16] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[17] Cho-Jui Hsieh,et al. Towards Robust Neural Networks via Random Self-ensemble , 2017, ECCV.
[18] Muhammed Sit,et al. Realistic River Image Synthesis Using Deep Generative Adversarial Networks , 2020, Frontiers in Water.
[19] Pushmeet Kohli,et al. Training verified learners with learned verifiers , 2018, ArXiv.
[20] Samy Bengio,et al. Generating Sentences from a Continuous Space , 2015, CoNLL.
[21] Xiaoyu Cao,et al. Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification , 2017, ACSAC.
[22] Samy Bengio,et al. Density estimation using Real NVP , 2016, ICLR.
[23] Kristen Grauman,et al. Fine-Grained Visual Comparisons with Local Learning , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[24] Francesco Visin,et al. A guide to convolution arithmetic for deep learning , 2016, ArXiv.
[25] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[26] Douglas Eck,et al. A Neural Representation of Sketch Drawings , 2017, ICLR.
[27] Timothy A. Mann,et al. On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models , 2018, ArXiv.
[28] Patrick Cousot,et al. Probabilistic Abstract Interpretation , 2012, ESOP.
[29] Matthew Mirman,et al. Fast and Effective Robustness Certification , 2018, NeurIPS.
[30] Tao Xiang,et al. Pose-Normalized Image Generation for Person Re-identification , 2017, ECCV.
[31] Mark S. Squillante,et al. PROVEN: Certifying Robustness of Neural Networks with a Probabilistic Approach , 2018, ICML.
[32] Yingzhen Li,et al. Are Generative Classifiers More Robust to Adversarial Attacks? , 2018, ICML.
[33] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[34] J. Zico Kolter,et al. Certified Adversarial Robustness via Randomized Smoothing , 2019, ICML.
[35] Andriy Mnih,et al. Disentangling by Factorising , 2018, ICML.
[36] Cho-Jui Hsieh,et al. A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks , 2019, NeurIPS.
[37] Chi-Keung Tang,et al. Attribute-Guided Face Generation Using Conditional CycleGAN , 2017, ECCV.
[38] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[39] Kristen Grauman,et al. Semantic Jitter: Dense Supervision for Visual Comparisons via Synthetic Images , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[40] Bingbing Ni,et al. Pose Transferrable Person Re-identification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[41] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[42] Paul Babyn,et al. Generative Adversarial Network in Medical Imaging: A Review , 2018, Medical Image Anal..
[43] Mykel J. Kochenderfer,et al. Deep Neural Network Compression for Aircraft Collision Avoidance Systems , 2018, Journal of Guidance, Control, and Dynamics.
[44] Pushmeet Kohli,et al. A Dual Approach to Scalable Verification of Deep Networks , 2018, UAI.
[45] Chunhua Shen,et al. Adversarial Generation of Training Examples: Applications to Moving Vehicle License Plate Recognition , 2017 .
[46] Yann LeCun,et al. Disentangling factors of variation in deep representation using adversarial training , 2016, NIPS.
[47] Timon Gehr,et al. An abstract domain for certifying neural networks , 2019, Proc. ACM Program. Lang..
[48] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[49] Yang Song,et al. PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples , 2017, ICLR.
[50] Alex Graves,et al. Conditional Image Generation with PixelCNN Decoders , 2016, NIPS.
[51] David Berthelot,et al. Understanding and Improving Interpolation in Autoencoders via an Adversarial Regularizer , 2018, ICLR.
[52] Pushmeet Kohli,et al. Verification of deep probabilistic models , 2018, ArXiv.
[53] Shiguang Shan,et al. AttGAN: Facial Attribute Editing by Only Changing What You Want , 2017, IEEE Transactions on Image Processing.
[54] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[55] Matthew Sotoudeh,et al. Computing Linear Restrictions of Neural Networks , 2019, NeurIPS.
[56] David Berthelot,et al. BEGAN: Boundary Equilibrium Generative Adversarial Networks , 2017, ArXiv.
[57] J. Zico Kolter,et al. Scaling provable adversarial defenses , 2018, NeurIPS.
[58] Suman Jana,et al. Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[59] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[60] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[61] Ankur Taly,et al. Axiomatic Attribution for Deep Networks , 2017, ICML.
[62] Russ Tedrake,et al. Verifying Neural Networks with Mixed Integer Programming , 2017, ArXiv.
[63] Sebastian Nowozin,et al. Adversarial Variational Bayes: Unifying Variational Autoencoders and Generative Adversarial Networks , 2017, ICML.