-
1
-
-
84992584998
-
-
arXiv preprint arXiv:1603. 06042
-
ANDOR, D., ALBERTI, C., WEISS, D., SEVERYN, A., PRESTA, A., GANCHEV, K., PETROV, S., AND COLLINS, M. Globally normalized transition-based neural networks. ArXiv preprint arXiv:1603. 06042 (2016).
-
(2016)
Globally Normalized Transition-based Neural Networks
-
-
Andor, D.1
Alberti, C.2
Weiss, D.3
Severyn, A.4
Presta, A.5
Ganchev, K.6
Petrov, S.7
Collins, M.8
-
2
-
-
85024499196
-
-
arXiv preprint arXiv:1605. 07262
-
BASTANI, O., IOANNOU, Y., LAMPROPOULOS, L., VYTINIOTIS, D., NORI, A., AND CRIMINISI, A. Measuring neural net robustness with constraints. ArXiv preprint arXiv:1605. 07262 (2016).
-
(2016)
Measuring Neural Net Robustness with Constraints
-
-
Bastani, O.1
Ioannou, Y.2
Lampropoulos, L.3
Vytiniotis, D.4
Nori, A.5
Criminisi, A.6
-
3
-
-
85010075270
-
-
arXiv preprint arXiv:1604. 07316
-
BOJARSKI, M., DEL TESTA, D., DWORAKOWSKI, D., FIRNER, B., FLEPP, B., GOYAL, P., JACKEL, L. D., MONFORT, M., MULLER, U., ZHANG, J., et al. End to end learning for self-driving cars. ArXiv preprint arXiv:1604. 07316 (2016).
-
(2016)
End to End Learning for Self-driving Cars
-
-
Bojarski, M.1
Del Testa, D.2
Dworakowski, D.3
Firner, B.4
Flepp, B.5
Goyal, P.6
Jackel, L.D.7
Monfort, M.8
Muller, U.9
Zhang, J.10
-
5
-
-
85024499569
-
Hidden voice commands
-
Austin, TX
-
CARLINI, N., MISHRA, P., VAIDYA, T., ZHANG, Y., SHERR, M., SHIELDS, C., WAGNER, D., AND ZHOU, W. Hidden voice commands. In 25th USENIX Security Symposium (USENIX Security 16), Austin, TX (2016).
-
(2016)
25th USENIX Security Symposium (USENIX Security 16)
-
-
Carlini, N.1
Mishra, P.2
Vaidya, T.3
Zhang, Y.4
Sherr, M.5
Shields, C.6
Wagner, D.7
Zhou, W.8
-
6
-
-
68049121093
-
Anomaly detection: A survey
-
CHANDOLA, V., BANERJEE, A., AND KUMAR, V. Anomaly detection: A survey. ACM computing surveys (CSUR) 41, 3 (2009), 15.
-
(2009)
ACM Computing Surveys (CSUR)
, vol.41
, Issue.3
, pp. 15
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
8
-
-
84890516914
-
Large-scale malware classification using random projections and neural networks
-
IEEE
-
DAHL, G. E., STOKES, J. W., DENG, L., AND YU, D. Large-scale malware classification using random projections and neural networks. In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (2013), IEEE, pp. 3422-3426.
-
(2013)
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 3422-3426
-
-
Dahl, G.E.1
Stokes, J.W.2
Deng, L.3
-
9
-
-
72249100259
-
Imagenet: A large-scale hierarchical image database
-
IEEE
-
DENG, J., DONG, W., SOCHER, R., LI, L.-J., LI, K., AND FEI-FEI, L. Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on (2009), IEEE, pp. 248-255.
-
(2009)
Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on
, pp. 248-255
-
-
Deng, J.1
Dong, W.2
Socher, R.3
Li, L.-J.4
Li, K.5
Fei-Fei, L.6
-
10
-
-
85058585233
-
A machine learning approach to visual perception of forest trails for mobile robots
-
GIUSTI, A., GUZZI, J., CIREşAN, D. C., HE, F.-L., RODRíGUEZ, J. P., FONTANA, F., FAESSLER, M., FORSTER, C., SCHMIDHUBER, J., DI CARO, G., et al. A machine learning approach to visual perception of forest trails for mobile robots. IEEE Robotics and Automation Letters 1, 2 (2016), 661-667.
-
(2016)
IEEE Robotics and Automation Letters
, vol.1
, Issue.2
, pp. 661-667
-
-
Giusti, A.1
Guzzi, J.2
Cireşan, D.C.3
He, F.-L.4
Rodríguez, J.P.5
Fontana, F.6
Faessler, M.7
Forster, C.8
Schmidhuber, J.9
Caro, G.D.I.10
-
13
-
-
84890543083
-
Speech recognition with deep recurrent neural networks
-
IEEE
-
GRAVES, A., MOHAMED, A.-R., AND HINTON, G. Speech recognition with deep recurrent neural networks. In 2013 IEEE international conference on acoustics, speech and signal processing (2013), IEEE, pp. 6645-6649.
-
(2013)
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 6645-6649
-
-
Graves, A.1
Mohamed, A.-R.2
Hinton, G.3
-
14
-
-
85024477322
-
-
arXiv preprint arXiv:1606. 04435
-
GROSSE, K., PAPERNOT, N., MANOHARAN, P., BACKES, M., AND MCDANIEL, P. Adversarial perturbations against deep neural networks for malware classification. ArXiv preprint arXiv:1606. 04435 (2016).
-
(2016)
Adversarial Perturbations Against Deep Neural Networks for Malware Classification
-
-
Grosse, K.1
Papernot, N.2
Manoharan, P.3
Backes, M.4
McDaniel, P.5
-
16
-
-
84986274465
-
Deep residual learning for image recognition
-
HE, K., ZHANG, X., REN, S., AND SUN, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016), pp. 770-778.
-
(2016)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
, pp. 770-778
-
-
Zhang, X.1
Ren, S.2
Sun, J.3
-
17
-
-
85032751458
-
Deep neural networks for acoustic modeling in speech recognition
-
HINTON, G., DENG, L., YU, D., DAHL, G., RAHMAN MOHAMED, A., JAITLY, N., SENIOR, A., VANHOUCKE, V., NGUYEN, P., SAINATH, T., AND KINGSBURY, B. Deep neural networks for acoustic modeling in speech recognition. Signal Processing Magazine (2012).
-
(2012)
Signal Processing Magazine
-
-
Hinton, G.1
Deng, L.2
Dahl, G.3
Rahman Mohamed, A.4
Jaitly, N.5
Senior, A.6
Vanhoucke, V.7
Nguyen, P.8
Sainath, T.9
Kingsbury, B.10
-
18
-
-
85032751458
-
Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups
-
HINTON, G., DENG, L., YU, D., DAHL, G. E., MOHAMED, A.-R., JAITLY, N., SENIOR, A., VANHOUCKE, V., NGUYEN, P., SAINATH, T. N., et al. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Processing Magazine 29, 6 (2012), 82-97.
-
(2012)
IEEE Signal Processing Magazine
, vol.29
, Issue.6
, pp. 82-97
-
-
Hinton, G.1
Deng, L.2
Dahl, G.E.3
Mohamed, A.-R.4
Jaitly, N.5
Senior, A.6
Vanhoucke, V.7
Nguyen, P.8
Sainath, T.N.9
-
20
-
-
85016032110
-
-
CoRR, abs/1511. 03034
-
HUANG, R., XU, B., SCHUURMANS, D., AND SZEPESV áRI, C. Learning with a strong adversary. CoRR, abs/1511. 03034 (2015).
-
(2015)
Learning with A Strong Adversary
-
-
Huang, R.1
Schuurmans, D.2
Szepesvári, C.3
-
21
-
-
85018687899
-
-
arXiv preprint arXiv:1610. 06940
-
HUANG, X., KWIATKOWSKA, M., WANG, S., AND WU, M. Safety verification of deep neural networks. ArXiv preprint arXiv:1610. 06940 (2016).
-
(2016)
Safety Verification of Deep Neural Networks
-
-
Huang, X.1
Kwiatkowska, M.2
Wang, S.3
-
22
-
-
84994005639
-
Neural networks in mobile robot motion
-
JANGLOVá, D. Neural networks in mobile robot motion. Cutting Edge Robotics 1, 1 (2005), 243.
-
(2005)
Cutting Edge Robotics
, vol.1
, Issue.1
, pp. 243
-
-
Janglová, D.1
-
25
-
-
84876231242
-
ImageNet classification with deep convolutional neural networks
-
KRIZHEVSKY, A., SUTSKEVER, I., AND HINTON, G. E. ImageNet classification with deep convolutional neural networks. In Advances in neural information processing systems (2012), pp. 1097-1105.
-
(2012)
Advances in Neural Information Processing Systems
, pp. 1097-1105
-
-
Krizhevsky, A.1
Sutskever, I.2
Hinton, G.E.3
-
27
-
-
0032203257
-
Gradientbased learning applied to document recognition
-
LECUN, Y., BOTTOU, L., BENGIO, Y., AND HAFFNER, P. Gradientbased learning applied to document recognition. Proceedings of the IEEE 86, 11 (1998), 2278-2324.
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.11
, pp. 2278-2324
-
-
Lecun, Y.1
Bottou, L.2
Bengio, Y.3
Haffner, P.4
-
29
-
-
84893676344
-
Rectifier nonlinearities improve neural network acoustic models
-
MAAS, A. L., HANNUN, A. Y., AND NG, A. Y. Rectifier nonlinearities improve neural network acoustic models. In Proc. ICML (2013), vol. 30.
-
(2013)
Proc. ICML
, vol.30
-
-
Maas, A.L.1
Hannun, A.Y.2
-
30
-
-
85076462227
-
Fast, lean and accurate: Modeling password guessability using neural networks
-
MELICHER, W., UR, B., SEGRETI, S. M., KOMANDURI, S., BAUER, L., CHRISTIN, N., AND CRANOR, L. F. Fast, lean and accurate: Modeling password guessability using neural networks. In Proceedings of USENIX Security (2016).
-
(2016)
Proceedings of USENIX Security
-
-
Melicher, W.1
Segreti, S.M.2
Komanduri, S.3
Bauer, L.4
Christin, N.5
Cranor, L.F.6
-
32
-
-
84904867557
-
-
arXiv preprint arXiv:1312. 5602
-
MNIH, V., KAVUKCUOGLU, K., SILVER, D., GRAVES, A., ANTONOGLOU, I., WIERSTRA, D., AND RIEDMILLER, M. Playing Atari with deep reinforcement learning. ArXiv preprint arXiv:1312. 5602 (2013).
-
(2013)
Playing Atari with Deep Reinforcement Learning
-
-
Mnih, V.1
Kavukcuoglu, K.2
Silver, D.3
Graves, A.4
Antonoglou, I.5
Wierstra, D.6
Riedmiller, M.7
-
33
-
-
84924051598
-
Human-level control through deep reinforcement learning
-
MNIH, V., KAVUKCUOGLU, K., SILVER, D., RUSU, A. A., VENESS, J., BELLEMARE, M. G., GRAVES, A., RIEDMILLER, M., FIDJELAND, A. K., OSTROVSKI, G., et al. Human-level control through deep reinforcement learning. Nature 518, 7540 (2015), 529-533.
-
(2015)
Nature
, vol.518
, Issue.7540
, pp. 529-533
-
-
Mnih, V.1
Kavukcuoglu, K.2
Silver, D.3
Rusu, A.A.4
Veness, J.5
Bellemare, M.G.6
Graves, A.7
Riedmiller, M.8
Fidjeland, A.K.9
Ostrovski, G.10
-
35
-
-
85024477605
-
-
arXiv preprint arXiv:1610. 00768
-
PAPERNOT, N., GOODFELLOW, I., SHEATSLEY, R., FEINMAN, R., AND MCDANIEL, P. cleverhans v1. 0. 0: An adversarial machine learning library. ArXiv preprint arXiv:1610. 00768 (2016).
-
(2016)
Cleverhans v1. 0. 0: An Adversarial Machine Learning Library
-
-
Papernot, N.1
Goodfellow, I.2
Sheatsley, R.3
Feinman, R.4
McDaniel, P.5
-
38
-
-
84978047763
-
The limitations of deep learning in adversarial settings
-
IEEE
-
PAPERNOT, N., MCDANIEL, P., JHA, S., FREDRIKSON, M., CELIK, Z. B., AND SWAMI, A. The limitations of deep learning in adversarial settings. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (2016), IEEE, pp. 372-387.
-
(2016)
2016 IEEE European Symposium on Security and Privacy (EuroS&P)
, pp. 372-387
-
-
Papernot, N.1
McDaniel, P.2
Jha, S.3
Fredrikson, M.4
Celik, Z.B.5
Swami, A.6
-
39
-
-
84987680683
-
Distillation as a defense to adversarial perturbations against deep neural networks
-
PAPERNOT, N., MCDANIEL, P., WU, X., JHA, S., AND SWAMI, A. Distillation as a defense to adversarial perturbations against deep neural networks. IEEE Symposium on Security and Privacy (2016).
-
(2016)
IEEE Symposium on Security and Privacy
-
-
Papernot, N.1
McDaniel, P.2
Jha, S.3
Swami, A.4
-
40
-
-
84946021187
-
Malware classification with recurrent networks
-
IEEE
-
PASCANU, R., STOKES, J. W., SANOSSIAN, H., MARINESCU, M., AND THOMAS, A. Malware classification with recurrent networks. In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2015), IEEE, pp. 1916-1920.
-
(2015)
2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1916-1920
-
-
Pascanu, R.1
Stokes, J.W.2
Sanossian, H.3
Marinescu, M.4
Thomas, A.5
-
41
-
-
84947041871
-
ImageNet large scale visual recognition challenge
-
RUSSAKOVSKY, O., DENG, J., SU, H., KRAUSE, J., SATHEESH, S., MA, S., HUANG, Z., KARPATHY, A., KHOSLA, A., BERNSTEIN, M., BERG, A. C., AND FEI-FEI, L. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV) 115, 3 (2015), 211-252.
-
(2015)
International Journal of Computer Vision (IJCV)
, vol.115
, Issue.3
, pp. 211-252
-
-
Russakovsky, O.1
Deng, J.2
Krause, J.3
Satheesh, S.4
Ma, S.5
Huang, Z.6
Karpathy, A.7
Khosla, A.8
Bernstein, M.9
Berg, A.C.10
Fei-Fei, L.11
-
43
-
-
84963949906
-
Mastering the game of Go with deep neural networks and tree search
-
SILVER, D., HUANG, A., MADDISON, C. J., GUEZ, A., SIFRE, L., VAN DEN DRIESSCHE, G., SCHRITTWIESER, J., ANTONOGLOU, I., PANNEERSHELVAM, V., LANCTOT, M., et al. Mastering the game of Go with deep neural networks and tree search. Nature 529, 7587 (2016), 484-489.
-
(2016)
Nature
, vol.529
, Issue.7587
, pp. 484-489
-
-
Silver, D.1
Huang, A.2
Maddison, C.J.3
Guez, A.4
Sifre, L.5
Van Den Driessche, G.6
Schrittwieser, J.7
Antonoglou, I.8
Panneershelvam, V.9
Lanctot, M.10
-
44
-
-
84962006941
-
-
arXiv preprint arXiv:1412. 6806
-
SPRINGENBERG, J. T., DOSOVITSKIY, A., BROX, T., AND RIEDMILLER, M. Striving for simplicity: The all convolutional net. ArXiv preprint arXiv:1412. 6806 (2014).
-
(2014)
Striving for Simplicity: The All Convolutional Net
-
-
Springenberg, J.T.1
Dosovitskiy, A.2
Brox, T.3
Riedmiller, M.4
-
45
-
-
84990032289
-
-
arXiv preprint arXiv:1512. 00567
-
SZEGEDY, C., VANHOUCKE, V., IOFFE, S., SHLENS, J., AND WOJNA, Z. Rethinking the Inception architecture for computer vision. ArXiv preprint arXiv:1512. 00567 (2015).
-
(2015)
Rethinking the Inception Architecture for Computer Vision
-
-
Szegedy, C.1
Vanhoucke, V.2
Ioffe, S.3
Shlens, J.4
Wojna, Z.5
-
46
-
-
84925331214
-
Intriguing properties of neural networks
-
SZEGEDY, C., ZAREMBA, W., SUTSKEVER, I., BRUNA, J., ERHAN, D., GOODFELLOW, I., AND FERGUS, R. Intriguing properties of neural networks. ICLR (2013).
-
(2013)
ICLR
-
-
Szegedy, C.1
Zaremba, W.2
Sutskever, I.3
Bruna, J.4
Erhan, D.5
Goodfellow, I.6
Fergus, R.7
-
47
-
-
84987616197
-
Adversarial perturbations of deep neural networks
-
T. Hazan, G. Papandreou, and D. Tarlow, Eds
-
WARDE-FARLEY, D., AND GOODFELLOW, I. Adversarial perturbations of deep neural networks. Advanced Structured Prediction, T. Hazan, G. Papandreou, and D. Tarlow, Eds (2016).
-
(2016)
Advanced Structured Prediction
-
-
Warde-Farley, D.1
Goodfellow, I.2
-
48
-
-
84924408055
-
Droid-sec: Deep learning in android malware detection
-
ACM
-
YUAN, Z., LU, Y., WANG, Z., AND XUE, Y. Droid-sec: Deep learning in android malware detection. In ACM SIGCOMM Computer Communication Review (2014), vol. 44, ACM, pp. 371-372.
-
(2014)
ACM SIGCOMM Computer Communication Review
, vol.44
, pp. 371-372
-
-
Yuan, Z.1
Wang, Z.2
Xue, Y.3
|