Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 221000045-5.doi: 10.11896/jsjkx.221000045
• Artificial Intelligence • Previous Articles Next Articles
GAO Yuzhao, XING Yunhan, LIU Jiaxiang
CLC Number:
[1]HINTON G,DENG L,YU D,et al.Deep neural networks foracoustic modeling in speech recognition:The shared views of four research groups[J].IEEE Signal Processing Magazine,2012,29(6):82-97. [2]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenetclassification with deep convolutional neural networks[J].Communications of the ACM,2017,60(6):84-90. [3]LUBOSCH M,KUNATH M,WINKLER H.Industrial sche-duling with Monte Carlo tree search and machine learning[C]//Procedia CIRP.2018:1283-1287. [4]HUANG X,KROENING D,RUAN W,et al.A survey of safetyand trustworthiness of deep neural networks:Verification,testing,adversarial attack and defence,and interpretability[J].Computer Science Review,2020,37:100270. [5]ZHANG M H,DU D H,ZHANG M Z,et al.Spatio-temporaltrajectory data-driven autonomous driving scenario meta-mode-ling approach[J].Ruan Jian Xue Bao/Journal of Software,2021,32(4):973-987. [6]KALRA N,PADDOCK S M.Driving to safety:How many miles of driving would it take to demonstrate autonomous vehicle reliab-ility?[J].Transportation Research Part A:Policy and Practice,2016,94:182-193. [7]WANG Z,YAN M,LIU S,et al.Survey on testing of deep neural networks[J].Ruan Jian Xue Bao/Journal of Software,2020,31(5):1255-1275. [8]WANG J,ZHAN N J,FENG X Y,et al.Overview of formalmethods[J].Ruan Jian Xue Bao/Journal of Software,2019,30(1):33-61. [9]LIU C,ARNON T,LAZARUS C,et al.Algorithms for verifying deep neural networks[J].Foundations and Trends© in Optimization,2021,4(3/4):244-404. [10]PULINA L,TACCHELLA A.An abstraction-refinement ap-proach to verification of artificial neural networks[C]//International Conference on Computer Aided Verification.Berlin:Springer,2010:243-257. [11]XIANG W,TRAN H D,JOHNSON T T.Reachable set computation and safety verification for neural networks with relu activations[J].arXiv:1712.08163,2017. [12]XIANG W,TRAN H D,JOHNSON T T.Output reachable set estimation and verification for multilayer neural networks[J].IEEE Transactions on Neural Networks and Learning Systems,2018,29(11):5777-5783. [13]SINGH G,GEHR T,MIRMAN M,et al.Fast and effective robustness certification[C]//Proceedings of the 32nd International Conference on Neural Information Processing Systems(NIPS’18).2018:10825-10836. [14]SINGH G,GEHR T,PÜSCHEL M,et al.An abstract domain for certifying neural networks [C]//Proceedings of the 32nd International Conference on Neural Information Processing Systems(NIPS ’18).2018:10825-10836. [15]DVIJOTHAM K,STANFORTH R,GOWAL S,et al.A Dual Approach to Scalable Verification of Deep Networks[C]//UAI.2018:3. [16]RAGHUNATHAN A,STEINHARDT J,LIANG P.Certified defenses against adversarial examples[J].arXiv:1801.09344,2018. [17]ASHOK P,HASHEMI V,KŘETÍNSKÝ J,et al.Deepab-stract:Neural network abstraction for accelerating verification[C]//International Symposium on Automated Technology for Verification and Analysis.Cham:Springer,2020:92-107. [18]GEHR T,MIRMAN M,DRACHSLER-COHEN D,et al.Ai2:Safety and robustness certification of neural networks with abstract interpretation[C]//2018 IEEE Symposium on Security and Privacy(SP).IEEE,2018:3-18. [19]TRAN H D,MANZANAS LOPEZ D,MUSAU P,et al.Star-based reachability analysis of deep neural networks[C]//International Symposium on Formal Methods.Cham:Springer,2019:670-686. [20]ZHANG H,WENG T W,CHEN P Y,et al.Efficient neural network robustness certification with general activation functions[J/OL].Advances in Neural Information Processing Systems,2018,31.https://dl.acm.org/doi/abs/10.5555/3327345.3327402. [21]XU K,ZHANG H,WANG S,et al.Fast and complete:Enabling complete neural network verification with rapid and massively parallel incomplete verifiers[J].arXiv:2011.13824,2020. [22]WANG S,ZHANG H,XU K,et al.Beta-crown:Efficient bound propagation with per-neuron split constraints for neural network robustness verification[J].Advances in Neural Information Processing Systems,2021,34:29909-29921. [23]DE PALMA A,BUNEL R,DESMAISON A,et al.Improvedbranch and bound for neural network verification via lagrangian decomposition[J].arXiv:2104.06718,2021. [24]BUNEL R,MUDIGONDA P,TURKASLAN I,et al.Branchand bound for piecewise linear neural network verification[J/OL].Journal of Machine Learning Research,2020,21(2020).https://dl.acm.org/doi/10.5555/3455716.3455758. [25]LI J,LIU J,YANG P,et al.Analyzing deep neural networks with symbolic propagation:Towards higher precision and faster verification[C]//International Static Analysis Symposium.Cham:Springer,2019:296-319. [26]LIN W,YANG Z,CHEN X,et al.Robustness verification ofclassification deep neural networks via linear programming[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:11418-11427. [27]YANG P,LI R,LI J,et al.Improving neural network verification through spurious region guided refinement[C]//International Conference on Tools and Algorithms for the Construction and Analysis of Systems.Cham:Springer,2021:389-408. |
[1] | LU Yuhan, CHEN Liquan, WANG Yu, HU Zhiyuan. Efficient Encrypted Image Content Retrieval System Based on SecureCNN [J]. Computer Science, 2023, 50(9): 26-34. |
[2] | WANG Zibo, ZHANG Yaofang, CHEN Yilu, LIU Hongri, WANG Bailing, WANG Chonghua. Hierarchical Task Network Planning Based Attack Path Discovery [J]. Computer Science, 2023, 50(9): 35-43. |
[3] | LI Ke, YANG Ling, ZHAO Yanbo, CHEN Yonglong, LUO Shouxi. EGCN-CeDML:A Distributed Machine Learning Framework for Vehicle Driving Behavior Prediction [J]. Computer Science, 2023, 50(9): 318-330. |
[4] | HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang. Research Progress of Backdoor Attacks in Deep Neural Networks [J]. Computer Science, 2023, 50(9): 52-61. |
[5] | WANG Yao, LI Yi. Termination Analysis of Single Path Loop Programs Based on Iterative Trajectory Division [J]. Computer Science, 2023, 50(9): 108-116. |
[6] | YI Qiuhua, GAO Haoran, CHEN Xinqi, KONG Xiangjie. Human Mobility Pattern Prior Knowledge Based POI Recommendation [J]. Computer Science, 2023, 50(9): 139-144. |
[7] | LI Haiming, ZHU Zhiheng, LIU Lei, GUO Chenkai. Multi-task Graph-embedding Deep Prediction Model for Mobile App Rating Recommendation [J]. Computer Science, 2023, 50(9): 160-167. |
[8] | ZHU Ye, HAO Yingguang, WANG Hongyu. Deep Learning Based Salient Object Detection in Infrared Video [J]. Computer Science, 2023, 50(9): 227-234. |
[9] | YI Liu, GENG Xinyu, BAI Jing. Hierarchical Multi-label Text Classification Algorithm Based on Parallel Convolutional Network Information Fusion [J]. Computer Science, 2023, 50(9): 278-286. |
[10] | HENG Hongjun, MIAO Jing. Fusion of Semantic and Syntactic Graph Convolutional Networks for Joint Entity and Relation Extraction [J]. Computer Science, 2023, 50(9): 295-302. |
[11] | LIU Xiang, ZHU Jing, ZHONG Guoqiang, GU Yongjian, CUI Liyuan. Quantum Prototype Clustering [J]. Computer Science, 2023, 50(8): 27-36. |
[12] | TANG Shaosai, SHEN Derong, KOU Yue, NIE Tiezheng. Link Prediction Model on Temporal Knowledge Graph Based on Bidirectionally Aggregating Neighborhoods and Global Aware [J]. Computer Science, 2023, 50(8): 177-183. |
[13] | MA Weiwei, ZHENG Qinhong, LIU Shanshan. Study and Evaluation of Spiking Neural Network Model Based on Bee Colony Optimization [J]. Computer Science, 2023, 50(8): 221-225. |
[14] | LI Qiaojun, ZHANG Wen, YANG Wei. Fusion Neural Network-based Method for Predicting LncRNA-disease Association [J]. Computer Science, 2023, 50(8): 226-232. |
[15] | XIE Tonglei, DENG Li, YOU Wenlong, LI Ruilong. Analysis and Prediction of Cloud VM CPU Load Based on EMPC-BCGRU [J]. Computer Science, 2023, 50(8): 243-250. |
|