{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:25:10Z","timestamp":1725805510346},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534373","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"126-138","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["\ud835\udf00<\/i>\n -weakened robustness of deep neural networks"],"prefix":"10.1145","author":[{"given":"Pei","family":"Huang","sequence":"first","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Yuting","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, China"}]},{"given":"Minghao","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Fuqi","family":"Jia","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Feifei","family":"Ma","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Nicholas Carlini , and David A. Wagner . 2018. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan , Stockholm, Sweden , July 10-15, 2018 , Jennifer G. Dy and Andreas Krause (Eds.) (Proceedings of Machine Learning Research, Vol. 80). PMLR, 274\u2013283. Anish Athalye, Nicholas Carlini, and David A. Wagner. 2018. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018, Jennifer G. Dy and Andreas Krause (Eds.) (Proceedings of Machine Learning Research, Vol. 80). PMLR, 274\u2013283."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Logan Engstrom , Andrew Ilyas , and Kevin Kwok . 2018 . Synthesizing Robust Adversarial Examples . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan , Stockholm, Sweden , July 10-15, 2018, Jennifer G. Dy and Andreas Krause (Eds.) (Proceedings of Machine Learning Research, Vol. 80). PMLR, 284\u2013293. Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing Robust Adversarial Examples. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018, Jennifer G. Dy and Andreas Krause (Eds.) (Proceedings of Machine Learning Research, Vol. 80). PMLR, 284\u2013293."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354245"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_6_1","volume-title":"Dual Path Networks. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Chen Yunpeng","year":"2017","unstructured":"Yunpeng Chen , Jianan Li , Huaxin Xiao , Xiaojie Jin , Shuicheng Yan , and Jiashi Feng . 2017 . Dual Path Networks. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017 , 4-9 December 2017, Long Beach, CA, USA. 4467\u20134475. Yunpeng Chen, Jianan Li, Huaxin Xiao, Xiaojie Jin, Shuicheng Yan, and Jiashi Feng. 2017. Dual Path Networks. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4-9 December 2017, Long Beach, CA, USA. 4467\u20134475."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019","author":"Cohen Jeremy M.","year":"2019","unstructured":"Jeremy M. Cohen , Elan Rosenfeld , and J. Zico Kolter . 2019. Certified Adversarial Robustness via Randomized Smoothing . In Proceedings of the 36th International Conference on Machine Learning, ICML 2019 , 9-15 June 2019 , Long Beach, California, USA. 1310\u20131320. Jeremy M. Cohen, Elan Rosenfeld, and J. Zico Kolter. 2019. Certified Adversarial Robustness via Randomized Smoothing. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA. 1310\u20131320."},{"key":"e_1_3_2_1_8_1","volume-title":"NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings. 121\u2013138","author":"Dutta Souradeep","year":"2018","unstructured":"Souradeep Dutta , Susmit Jha , Sriram Sankaranarayanan , and Ashish Tiwari . 2018 . Output Range Analysis for Deep Feedforward Neural Networks. In NASA Formal Methods - 10th International Symposium , NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings. 121\u2013138 . Souradeep Dutta, Susmit Jha, Sriram Sankaranarayanan, and Ashish Tiwari. 2018. Output Range Analysis for Deep Feedforward Neural Networks. In NASA Formal Methods - 10th International Symposium, NFM 2018, Newport News, VA, USA, April 17-19, 2018, Proceedings. 121\u2013138."},{"key":"e_1_3_2_1_9_1","volume-title":"ATVA 2017, Pune, India, October 3-6, 2017, Proceedings. 269\u2013286","author":"Ehlers R\u00fcdiger","year":"2017","unstructured":"R\u00fcdiger Ehlers . 2017 . Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks. In Automated Technology for Verification and Analysis - 15th International Symposium , ATVA 2017, Pune, India, October 3-6, 2017, Proceedings. 269\u2013286 . R\u00fcdiger Ehlers. 2017. Formal Verification of Piece-Wise Linear Feed-Forward Neural Networks. In Automated Technology for Verification and Analysis - 15th International Symposium, ATVA 2017, Pune, India, October 3-6, 2017, Proceedings. 269\u2013286."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-018-9285-6"},{"key":"e_1_3_2_1_11_1","volume-title":"FAW 2015, Guilin, China, July 3-5, 2015, Proceedings. 52\u201365","author":"Ge Cunjing","year":"2015","unstructured":"Cunjing Ge and Feifei Ma . 2015 . A Fast and Practical Method to Estimate Volumes of Convex Polytopes. In Frontiers in Algorithmics - 9th International Workshop , FAW 2015, Guilin, China, July 3-5, 2015, Proceedings. 52\u201365 . Cunjing Ge and Feifei Ma. 2015. A Fast and Practical Method to Estimate Volumes of Convex Polytopes. In Frontiers in Algorithmics - 9th International Workshop, FAW 2015, Guilin, China, July 3-5, 2015, Proceedings. 52\u201365."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.10.019"},{"key":"e_1_3_2_1_13_1","volume-title":"2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings","author":"Gehr Timon","year":"2018","unstructured":"Timon Gehr , Matthew Mirman , Dana Drachsler-Cohen , Petar Tsankov , Swarat Chaudhuri , and Martin T. Vechev . 2018. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation . In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings , 21-23 May 2018 , San Francisco, California, USA. 3\u201318. Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, and Martin T. Vechev. 2018. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA. 3\u201318."},{"key":"e_1_3_2_1_14_1","volume-title":"Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00401"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016 , Las Vegas, NV, USA , June 27-30, 2016. 770\u2013778. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016. 770\u2013778."},{"key":"e_1_3_2_1_17_1","volume-title":"Science China Information Sciences, 63, 12","author":"Hu Shimin","year":"2020","unstructured":"Shimin Hu , Dun Liang , Guoye Yang , Guowei Yang , and Wenyang Zhou . 2020. Jittor:a novel deep learning framework with meta-operators and unified graph execution. Science China Information Sciences, 63, 12 ( 2020 ), 12, 114\u2013134. Shimin Hu, Dun Liang, Guoye Yang, Guowei Yang, and Wenyang Zhou. 2020. Jittor:a novel deep learning framework with meta-operators and unified graph execution. Science China Information Sciences, 63, 12 (2020), 12, 114\u2013134."},{"key":"e_1_3_2_1_18_1","volume-title":"Densely Connected Convolutional Networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017","author":"Huang Gao","year":"2017","unstructured":"Gao Huang , Zhuang Liu , Laurens van der Maaten, and Kilian Q. Weinberger. 2017 . Densely Connected Convolutional Networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017 , Honolulu, HI, USA , July 21-26, 2017 . 2261\u20132269. Gao Huang, Zhuang Liu, Laurens van der Maaten, and Kilian Q. Weinberger. 2017. Densely Connected Convolutional Networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, Honolulu, HI, USA, July 21-26, 2017. 2261\u20132269."},{"key":"e_1_3_2_1_19_1","volume-title":"CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I. 3\u201329","author":"Huang Xiaowei","year":"2017","unstructured":"Xiaowei Huang , Marta Kwiatkowska , Sen Wang , and Min Wu . 2017 . Safety Verification of Deep Neural Networks. In Computer Aided Verification - 29th International Conference , CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I. 3\u201329 . Xiaowei Huang, Marta Kwiatkowska, Sen Wang, and Min Wu. 2017. Safety Verification of Deep Neural Networks. In Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I. 3\u201329."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 6th Annual ACM Symposium on Theory of Computing","author":"John T.","year":"1974","unstructured":"John T. Gill III. 1974 . Computational Complexity of Probabilistic Turing Machines . In Proceedings of the 6th Annual ACM Symposium on Theory of Computing , April 30 - May 2, 1974, Seattle, Washington, USA, Robert L. Constable, Robert W. Ritchie, Jack W. Carlyle, and Michael A. Harrison (Eds.). ACM, 91\u201395. John T. Gill III. 1974. Computational Complexity of Probabilistic Turing Machines. In Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30 - May 2, 1974, Seattle, Washington, USA, Robert L. Constable, Robert W. Ritchie, Jack W. Carlyle, and Michael A. Harrison (Eds.). ACM, 91\u201395."},{"key":"e_1_3_2_1_21_1","volume-title":"8th International Conference on Learning Representations, ICLR 2020","author":"Jia Jinyuan","year":"2020","unstructured":"Jinyuan Jia , Xiaoyu Cao , Binghui Wang , and Neil Zhenqiang Gong . 2020 . Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing . In 8th International Conference on Learning Representations, ICLR 2020 , Addis Ababa, Ethiopia , April 26-30, 2020. Jinyuan Jia, Xiaoyu Cao, Binghui Wang, and Neil Zhenqiang Gong. 2020. Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2016.09.010"},{"volume-title":"CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I. 97\u2013117","author":"Katz Guy","key":"e_1_3_2_1_23_1","unstructured":"Guy Katz , Clark W. Barrett , David L. Dill , Kyle Julian , and Mykel J. Kochenderfer . 2017. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In Computer Aided Verification - 29th International Conference , CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I. 97\u2013117 . Guy Katz, Clark W. Barrett, David L. Dill, Kyle Julian, and Mykel J. Kochenderfer. 2017. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part I. 97\u2013117."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4271\/2019-01-0123"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020","author":"Kumar Aounon","year":"2020","unstructured":"Aounon Kumar , Alexander Levine , Tom Goldstein , and Soheil Feizi . 2020 . Curse of Dimensionality on Randomized Smoothing for Certifiable Robustness . In Proceedings of the 37th International Conference on Machine Learning, ICML 2020 , 13-18 July 2020, Virtual Event. 5458\u20135467. Aounon Kumar, Alexander Levine, Tom Goldstein, and Soheil Feizi. 2020. Curse of Dimensionality on Randomized Smoothing for Certifiable Robustness. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13-18 July 2020, Virtual Event. 5458\u20135467."},{"key":"e_1_3_2_1_27_1","volume-title":"Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Lee Kimin","year":"2018","unstructured":"Kimin Lee , Kibok Lee , Honglak Lee , and Jinwoo Shin . 2018 . A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks . In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018 , NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada, Samy Bengio, Hanna M. Wallach, Hugo Larochelle, Kristen Grauman, Nicol\u00f2 Cesa-Bianchi, and Roman Garnett (Eds.). 7167\u20137177. Kimin Lee, Kibok Lee, Honglak Lee, and Jinwoo Shin. 2018. A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada, Samy Bengio, Hanna M. Wallach, Hugo Larochelle, Kristen Grauman, Nicol\u00f2 Cesa-Bianchi, and Roman Garnett (Eds.). 7167\u20137177."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu , HI, USA","author":"Liu Sheng","year":"2011","unstructured":"Sheng Liu and Jian Zhang . 2011 . Program analysis: from qualitative analysis to quantitative analysis . In Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu , HI, USA , May 21-28, 2011. 956\u2013959. Sheng Liu and Jian Zhang. 2011. Program analysis: from qualitative analysis to quantitative analysis. In Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011. 956\u2013959."},{"key":"e_1_3_2_1_29_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Ma Xingjun","year":"2018","unstructured":"Xingjun Ma , Bo Li , Yisen Wang , Sarah M. Erfani , Sudanthi N. R. Wijewickrema , Grant Schoenebeck , Dawn Song , Michael E. Houle , and James Bailey . 2018. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality . In 6th International Conference on Learning Representations, ICLR 2018 , Vancouver, BC , Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview .net. Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi N. R. Wijewickrema, Grant Schoenebeck, Dawn Song, Michael E. Houle, and James Bailey. 2018. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net."},{"key":"e_1_3_2_1_30_1","volume-title":"6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net."},{"key":"e_1_3_2_1_31_1","volume-title":"Designing Network Design Spaces. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020","author":"Radosavovic Ilija","year":"2020","unstructured":"Ilija Radosavovic , Raj Prateek Kosaraju , Ross B. Girshick , Kaiming He , and Piotr Doll\u00e1r . 2020 . Designing Network Design Spaces. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020 , Seattle, WA, USA , June 13-19, 2020. 10425\u201310433. Ilija Radosavovic, Raj Prateek Kosaraju, Ross B. Girshick, Kaiming He, and Piotr Doll\u00e1r. 2020. Designing Network Design Spaces. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020. 10425\u201310433."},{"key":"e_1_3_2_1_32_1","volume-title":"Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Raghunathan Aditi","year":"2018","unstructured":"Aditi Raghunathan , Jacob Steinhardt , and Percy Liang . 2018 . Semidefinite relaxations for certifying robustness to adversarial examples . In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018 , NeurIPS 2018, 3-8 December 2018, Montr\u00e9al, Canada. 10900\u201310910. Aditi Raghunathan, Jacob Steinhardt, and Percy Liang. 2018. Semidefinite relaxations for certifying robustness to adversarial examples. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, 3-8 December 2018, Montr\u00e9al, Canada. 10900\u201310910."},{"key":"e_1_3_2_1_33_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Shafahi Ali","year":"2019","unstructured":"Ali Shafahi , Mahyar Najibi , Amin Ghiasi , Zheng Xu , John P. Dickerson , Christoph Studer , Larry S. Davis , Gavin Taylor , and Tom Goldstein . 2019 . Adversarial training for free! . In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019 , NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada. 3353\u20133364. Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John P. Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, and Tom Goldstein. 2019. Adversarial training for free!. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada. 3353\u20133364."},{"key":"e_1_3_2_1_34_1","volume-title":"How to compute the","author":"Simonovits Mikl\u00f3s","year":"2003","unstructured":"Mikl\u00f3s Simonovits . 2003. How to compute the volume in high dimension? Mathematical programming, 97 , 1-2 ( 2003 ), 337\u2013374. Mikl\u00f3s Simonovits. 2003. How to compute the volume in high dimension? Mathematical programming, 97, 1-2 (2003), 337\u2013374."},{"key":"e_1_3_2_1_35_1","volume-title":"3rd International Conference on Learning Representations, ICLR","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition . In 3rd International Conference on Learning Representations, ICLR 2015 , San Diego, CA , USA, May 7-9, 2015, Conference Track Proceedings . Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings."},{"key":"e_1_3_2_1_36_1","volume-title":"Fast and Effective Robustness Certification. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Singh Gagandeep","year":"2018","unstructured":"Gagandeep Singh , Timon Gehr , Matthew Mirman , Markus P\u00fcschel , and Martin T. Vechev . 2018 . Fast and Effective Robustness Certification. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018 , NeurIPS 2018 , 3-8 December 2018, Montr\u00e9al, Canada. 10825\u201310836. Gagandeep Singh, Timon Gehr, Matthew Mirman, Markus P\u00fcschel, and Martin T. Vechev. 2018. Fast and Effective Robustness Certification. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, 3-8 December 2018, Montr\u00e9al, Canada. 10825\u201310836."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. ACM Program. Lang., 3, POPL","author":"Singh Gagandeep","year":"2019","unstructured":"Gagandeep Singh , Timon Gehr , Markus P\u00fcschel , and Martin T. Vechev . 2019. An abstract domain for certifying neural networks . Proc. ACM Program. Lang., 3, POPL ( 2019 ), 41:1\u201341:30. Gagandeep Singh, Timon Gehr, Markus P\u00fcschel, and Martin T. Vechev. 2019. An abstract domain for certifying neural networks. Proc. ACM Program. Lang., 3, POPL (2019), 41:1\u201341:30."},{"key":"e_1_3_2_1_38_1","volume-title":"Disentangling Adversarial Robustness and Generalization. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019","author":"Stutz David","year":"2019","unstructured":"David Stutz , Matthias Hein , and Bernt Schiele . 2019 . Disentangling Adversarial Robustness and Generalization. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019 , Long Beach, CA, USA , June 16-20, 2019. 6976\u20136987. David Stutz, Matthias Hein, and Bernt Schiele. 2019. Disentangling Adversarial Robustness and Generalization. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, Long Beach, CA, USA, June 16-20, 2019. 6976\u20136987."},{"key":"e_1_3_2_1_39_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian J. Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings."},{"key":"e_1_3_2_1_40_1","volume-title":"Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020","author":"Tram\u00e8r Florian","year":"2020","unstructured":"Florian Tram\u00e8r , Nicholas Carlini , Wieland Brendel , and Aleksander Madry . 2020 . On Adaptive Attacks to Adversarial Example Defenses . In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020 , NeurIPS 2020, December 6-12, 2020, virtual, Hugo Larochelle, Marc\u2019Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.). Florian Tram\u00e8r, Nicholas Carlini, Wieland Brendel, and Aleksander Madry. 2020. On Adaptive Attacks to Adversarial Example Defenses. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual, Hugo Larochelle, Marc\u2019Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.)."},{"key":"e_1_3_2_1_41_1","volume-title":"7th International Conference on Learning Representations, ICLR 2019","author":"Webb Stefan","year":"2019","unstructured":"Stefan Webb , Tom Rainforth , Yee Whye Teh , and M. Pawan Kumar . 2019. A Statistical Approach to Assessing Neural Network Robustness . In 7th International Conference on Learning Representations, ICLR 2019 , New Orleans, LA, USA , May 6-9, 2019 . OpenReview.net. Stefan Webb, Tom Rainforth, Yee Whye Teh, and M. Pawan Kumar. 2019. A Statistical Approach to Assessing Neural Network Robustness. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Weng Tsui-Wei","year":"2018","unstructured":"Tsui-Wei Weng , Huan Zhang , Hongge Chen , Zhao Song , Cho-Jui Hsieh , Luca Daniel , Duane S. Boning , and Inderjit S. Dhillon . 2018. Towards Fast Computation of Certified Robustness for ReLU Networks . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan , Stockholm, Sweden , July 10-15, 2018 . 5273\u20135282. Tsui-Wei Weng, Huan Zhang, Hongge Chen, Zhao Song, Cho-Jui Hsieh, Luca Daniel, Duane S. Boning, and Inderjit S. Dhillon. 2018. Towards Fast Computation of Certified Robustness for ReLU Networks. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018. 5273\u20135282."},{"key":"e_1_3_2_1_43_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Weng Tsui-Wei","year":"2018","unstructured":"Tsui-Wei Weng , Huan Zhang , Pin-Yu Chen , Jinfeng Yi , Dong Su , Yupeng Gao , Cho-Jui Hsieh , and Luca Daniel . 2018. Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach . In 6th International Conference on Learning Representations, ICLR 2018 , Vancouver, BC , Canada, April 30 - May 3, 2018, Conference Track Proceedings . Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, and Luca Daniel. 2018. Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Wong Eric","year":"2018","unstructured":"Eric Wong and J. Zico Kolter . 2018. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan , Stockholm, Sweden , July 10-15, 2018 . 5283\u20135292. Eric Wong and J. Zico Kolter. 2018. Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018. 5283\u20135292."},{"key":"e_1_3_2_1_45_1","volume-title":"8th International Conference on Learning Representations, ICLR 2020","author":"Wong Eric","year":"2020","unstructured":"Eric Wong , Leslie Rice , and J. Zico Kolter . 2020. Fast is better than free: Revisiting adversarial training . In 8th International Conference on Learning Representations, ICLR 2020 , Addis Ababa, Ethiopia , April 26-30, 2020 . Eric Wong, Leslie Rice, and J. Zico Kolter. 2020. Fast is better than free: Revisiting adversarial training. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020."},{"key":"e_1_3_2_1_46_1","volume-title":"Feifei Ma, and Jian Zhang.","author":"Yang Yuting","year":"2022","unstructured":"Yuting Yang , Pei Huang , Juan Cao , Jintao Li , Yun Lin , Jin Song Dong , Feifei Ma, and Jian Zhang. 2022 . A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement . arXiv preprint arXiv:2203.10714. Yuting Yang, Pei Huang, Juan Cao, Jintao Li, Yun Lin, Jin Song Dong, Feifei Ma, and Jian Zhang. 2022. A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement. arXiv preprint arXiv:2203.10714."},{"key":"e_1_3_2_1_47_1","unstructured":"Yuting Yang Pei Huang FeiFei Ma Juan Cao Meishan Zhang Jian Zhang and Jintao Li. 2022. Quantifying Robustness to Adversarial Word Substitutions. arXiv preprint arXiv:2201.03829. \t\t\t\t\t Yuting Yang Pei Huang FeiFei Ma Juan Cao Meishan Zhang Jian Zhang and Jintao Li. 2022. Quantifying Robustness to Adversarial Word Substitutions. arXiv preprint arXiv:2201.03829."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464822"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Virtual South Korea","acronym":"ISSTA '22"},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T19:14:00Z","timestamp":1700939640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":48,"alternative-id":["10.1145\/3533767.3534373","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534373","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}