Towards practical robustness analysis for DNNs based on PAC-model learning
To analyse local robustness properties of deep neural networks (DNNs), we present a practical
framework from a model learning perspective. Based on black-box model learning with …
framework from a model learning perspective. Based on black-box model learning with …
Prodeep: a platform for robustness verification of deep neural networks
Deep neural networks (DNNs) have been applied in safety-critical domains such as self driving
cars, aircraft collision avoidance systems, malware detection, etc. In such scenarios, it is …
cars, aircraft collision avoidance systems, malware detection, etc. In such scenarios, it is …
Improving neural network verification through spurious region guided refinement
We propose a spurious region guided refinement approach for robustness verification of
deep neural networks. Our method starts with applying the DeepPoly abstract domain to …
deep neural networks. Our method starts with applying the DeepPoly abstract domain to …
Towards good practices in evaluating transfer adversarial attacks
Transfer adversarial attacks raise critical security concerns in real-world, black-box
scenarios. However, the actual progress of this field is difficult to assess due to two common …
scenarios. However, the actual progress of this field is difficult to assess due to two common …
Enhancing robustness verification for deep neural networks via symbolic propagation
Deep neural networks (DNNs) have been shown lack of robustness, as they are vulnerable
to small perturbations on the inputs. This has led to safety concerns on applying DNNs to …
to small perturbations on the inputs. This has led to safety concerns on applying DNNs to …
Revisiting transferable adversarial image examples: Attack categorization, evaluation guidelines, and new insights
Transferable adversarial examples raise critical security concerns in real-world, black-box
attack scenarios. However, in this work, we identify two main problems in common evaluation …
attack scenarios. However, in this work, we identify two main problems in common evaluation …
Out-of-bounding-box triggers: A stealthy approach to cheat object detectors
In recent years, the study of adversarial robustness in object detection systems, particularly
those based on deep neural networks (DNNs), has become a pivotal area of research. …
those based on deep neural networks (DNNs), has become a pivotal area of research. …
Reach-avoid analysis for stochastic discrete-time systems
Stochastic discrete-time systems, ie, discrete-time dynamic systems subject to stochastic
disturbances, are an essential modelling tool for many engineering systems, and reach-avoid …
disturbances, are an essential modelling tool for many engineering systems, and reach-avoid …
3D digitization and its applications in cultural heritage
3D digitizing technology has a variety of applications including reverse engineering, quality
control, virtual reality and digital heritage. Recently, great development in 3D digitizing …
control, virtual reality and digital heritage. Recently, great development in 3D digitizing …
Automated markerless registration of point clouds from TLS and structured light scanner for heritage documentation
Three-dimensional (3D) model is a major form of cultural heritage documentation. In most
cases, the properties of digital artefacts (eg readability, coverage) are affected by the …
cases, the properties of digital artefacts (eg readability, coverage) are affected by the …