Zhang et al., 2023 - Google Patents
A novel noise injection-based training scheme for better model robustnessZhang et al., 2023
View PDF- Document ID
- 8940538993727980240
- Author
- Zhang Z
- Jiang J
- Chen M
- Wang Z
- Peng Y
- Yu Z
- Publication year
- Publication venue
- arXiv preprint arXiv:2302.10802
External Links
Snippet
Noise injection-based method has been shown to be able to improve the robustness of artificial neural networks in previous work. In this work, we propose a novel noise injection- based training scheme for better model robustness. Specifically, we first develop a likelihood …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/08—Learning methods
- G06N3/082—Learning methods modifying the architecture, e.g. adding or deleting nodes or connections, pruning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6296—Graphical models, e.g. Bayesian networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Halbouni et al. | CNN-LSTM: hybrid deep neural network for network intrusion detection system | |
Kang et al. | Stable neural ode with lyapunov-stable equilibrium points for defending against adversarial attacks | |
Sarkar et al. | UPSET and ANGRI: Breaking high performance image classifiers | |
CN110334742B (en) | Graph confrontation sample generation method based on reinforcement learning and used for document classification and adding false nodes | |
Nishida et al. | Multimodal gesture recognition using multi-stream recurrent neural network | |
Sameera et al. | Deep transductive transfer learning framework for zero-day attack detection | |
CN111192576B (en) | Decoding method, voice recognition device and system | |
CN112861945B (en) | Multi-mode fusion lie detection method | |
WO2019045802A1 (en) | Distance metric learning using proxies | |
Nida et al. | Instructor activity recognition through deep spatiotemporal features and feedforward extreme learning machines | |
Joudar et al. | An adaptive Drop method for deep neural networks regularization: Estimation of DropConnect hyperparameter using generalization gap | |
WO2023000165A1 (en) | Method and apparatus for classifying nodes of a graph | |
Ibitoye et al. | Differentially private self-normalizing neural networks for adversarial robustness in federated learning | |
Zhang et al. | Learning ordered top-k adversarial attacks via adversarial distillation | |
Shen et al. | Regularizing variational autoencoder with diversity and uncertainty awareness | |
Yin et al. | Metric-learning-assisted domain adaptation | |
Ren et al. | Bayesian neural networks avoid encoding complex and perturbation-sensitive concepts | |
Guo et al. | ELAA: An efficient local adversarial attack using model interpreters | |
Saealal et al. | Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance | |
Zhang et al. | A novel noise injection-based training scheme for better model robustness | |
Putra et al. | Multilevel neural network for reducing expected inference time | |
US11687777B2 (en) | Certifiably robust interpretation | |
Gaur et al. | Development of Image Translating Model to Counter Adversarial Attacks | |
Sharma et al. | Towards secured image steganography based on content-adaptive adversarial perturbation | |
Niyomugabo et al. | A modified Adaboost algorithm to reduce false positives in face detection |