Lecuyer M, Atlidakis V, Geambasu R, et al. Certified Robustness to Adversarial Examples...
Lecuyer M, Atlidakis V, Geambasu R, et al. Certified Robustness to Adversarial Examples...
Sabour S, Frosst N, Hinton G E, et al. Dynamic Routing Between Capsules[C]. neural info...
Li Y., Xie L., Zhang Y., Zhang R., Wang Y., Tian Q., Defending Adversarial Attacks by C...
Der Maaten L V, Hinton G E. Visualizing data using t-SNE[J]. Journal of Machine Learnin...
Luigi Ambrosio, Giuseppe Da Prato, Andrea Mennucci, An Introduction to Measure Theory a...
[TOC] JOHNNY HU, BAIRE ONE FUNCTIONS. 一些基本的定義(諸如逐點收斂, 一致收斂集合等)就不敘述了. 定義 Definition: 令, ...
@[TOC] Chapter 4 Inverse Function Theorem 這個章節(jié)講得很好, 還引用了莊子秋水中的一段話, 大佬啊. 4.1 The Inverse...
Hu S, Yu T, Guo C, et al. A New Defense Against Adversarial Images: Turning a Weakness ...
Mustafa A., Khan S., Hayat M., Goecke R., Shen J., Shao L., Adversarial Defense by Rest...
Ma X, Li B, Wang Y, et al. Characterizing Adversarial Subspaces Using Local Intrinsic D...
Wang H, Wang Y, Zhou Z, et al. CosFace: Large Margin Cosine Loss for Deep Face Recognit...
Pang T, Du C, Zhu J, et al. Max-Mahalanobis Linear Discriminant Analysis Networks[C]. i...
[TOC] Wang X., He K., Guo C., Weinberger K., Hopcroft H., AT-GAN: A Generative Attack M...
Xiao C, Li B, Zhu J, et al. Generating Adversarial Examples with Adversarial Networks[J...
Moosavidezfooli S, Fawzi A, Fawzi O, et al. Universal Adversarial Perturbations[C]. com...
Kingma D P, Ba J. Adam: A Method for Stochastic Optimization[J]. arXiv: Learning, 2014....
Wang Y, Zou D, Yi J, et al. Improving Adversarial Robustness Requires Revisiting Miscla...
Schmidt L, Santurkar S, Tsipras D, et al. Adversarially Robust Generalization Requires ...
Samangouei P, Kabkab M, Chellappa R, et al. Defense-GAN: Protecting Classifiers Against...
Athalye A, Carlini N, Wagner D, et al. Obfuscated Gradients Give a False Sense of Secur...