暂无分享,去创建一个
[1] Seyed-Mohsen Moosavi-Dezfooli,et al. The Robustness of Deep Networks: A Geometrical Perspective , 2017, IEEE Signal Processing Magazine.
[2] Dawn Song,et al. Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.
[3] Michael Unser,et al. Deep Convolutional Neural Network for Inverse Problems in Imaging , 2016, IEEE Transactions on Image Processing.
[4] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[5] Gerd Folkers,et al. On computable numbers , 2016 .
[6] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[7] David A. Forsyth,et al. SafetyNet: Detecting and Rejecting Adversarial Examples Robustly , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[8] Bolei Zhou,et al. Learning Deep Features for Discriminative Localization , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[10] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Anders C. Hansen,et al. New barriers in complexity theory: On the solvability complexity index and the towers of algorithms , 2015 .
[12] Jian Sun,et al. Deep ADMM-Net for Compressive Sensing MRI , 2016, NIPS.
[13] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Dawn Song,et al. Physical Adversarial Examples for Object Detectors , 2018, WOOT @ USENIX Security Symposium.
[15] P. Odifreddi. Classical recursion theory , 1989 .
[16] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[17] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[18] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.
[19] Bruce R. Rosen,et al. Image reconstruction by domain-transform manifold learning , 2017, Nature.
[20] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[21] Aggelos K. Katsaggelos,et al. Using Deep Neural Networks for Inverse Problems in Imaging: Beyond Analytical Methods , 2018, IEEE Signal Processing Magazine.
[22] Chun-Nam Yu,et al. A Direct Approach to Robust Deep Learning Using Adversarial Networks , 2019, ICLR.
[23] Jonas Adler,et al. Solving ill-posed inverse problems using iterative deep neural networks , 2017, ArXiv.
[24] Francesco Renna,et al. On instabilities of deep learning in image reconstruction and the potential costs of AI , 2019, Proceedings of the National Academy of Sciences.
[25] S. Smale. Mathematical problems for the next century , 1998 .
[26] Michael Unser,et al. Convolutional Neural Networks for Inverse Problems in Imaging: A Review , 2017, IEEE Signal Processing Magazine.
[27] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[28] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[29] Danilo Vasconcellos Vargas,et al. Understanding the One Pixel Attack: Propagation Maps and Locality Analysis , 2019, AISafety@IJCAI.
[30] Quoc V. Le,et al. AutoAugment: Learning Augmentation Policies from Data , 2018, ArXiv.
[31] Lenore Blum,et al. Complexity and Real Computation , 1997, Springer New York.
[32] Rita Strack,et al. Imaging: AI transforms image reconstruction , 2018, Nature Methods.
[33] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[34] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[35] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[36] Andrew L. Beam,et al. Adversarial attacks on medical machine learning , 2019, Science.
[37] James Bailey,et al. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality , 2018, ICLR.
[38] Anders C. Hansen,et al. On the approximation of spectra of linear operators on Hilbert spaces , 2008 .
[39] Anders C. Hansen,et al. On the Solvability Complexity Index, the n-pseudospectrum and approximations of spectra of operators , 2011 .
[40] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.