{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:31:06Z","timestamp":1730341866063,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T00:00:00Z","timestamp":1654646400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T00:00:00Z","timestamp":1654646400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,8]]},"DOI":"10.23919\/acc53348.2022.9867244","type":"proceedings-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:24:10Z","timestamp":1662409450000},"page":"1535-1542","source":"Crossref","is-referenced-by-count":0,"title":["Practical Convex Formulations of One-hidden-layer Neural Network Adversarial Training"],"prefix":"10.23919","author":[{"given":"Yatong","family":"Bai","sequence":"first","affiliation":[{"name":"University of California,Department of Mechanical Engineering,Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tanmay","family":"Gautam","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering and Computer Science,Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yu","family":"Gai","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering and Computer Science,Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Somayeh","family":"Sojoudi","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering and Computer Science,Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref32","article-title":"Implicit convex regularizers of CNN architectures: Convex optimization of two- and three-layer networks in polynomial time","author":"ergen","year":"2021","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref31","article-title":"Vector-output ReLU neural network problems are copositive programs: Convex analysis of two layer networks and polynomial-time algorithms","author":"sahiner","year":"2021","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref30","article-title":"Global optimality beyond two layers: Training deep ReLU networks via convex programs","author":"ergen","year":"2021","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"year":"2020","author":"anderson","article-title":"Data-driven assessment of deep neural networks with random input uncertainty","key":"ref10"},{"key":"ref11","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2017","journal-title":"5th International Conference on Learning Representations (ICLR)"},{"key":"ref12","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"year":"2022","author":"bai","article-title":"Avoiding the accuracyrobustness trade-off of classifiers via local adaptive smoothing","key":"ref13"},{"key":"ref14","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"2018","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"key":"ref15","article-title":"Certified adversarial robustness via randomized smoothing","author":"cohen","year":"2019","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"key":"ref16","article-title":"Certified robustness via locally biased randomized smoothing","author":"anderson","year":"2022","journal-title":"Learning for Dynamics and Control Conference"},{"key":"ref17","article-title":"Certified defenses against adversarial examples","author":"raghunathan","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref18","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","author":"wong","year":"2018","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"key":"ref19","article-title":"The hidden convex optimization landscape of regularized two-layer reLU networks: an exact characterization of optimal solutions","author":"wang","year":"2022","journal-title":"International Conference on Learning Representations"},{"year":"2019","journal-title":"The MOSEK optimization toolbox for MATLAB manual Version 9 0","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-642-57760-4"},{"year":"2014","author":"grant","article-title":"CVX: Matlab software for disciplined convex programming, version 2.1","key":"ref27"},{"key":"ref3","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref6","first-page":"39:1","article-title":"End-to-end training of deep visuomotor policies","volume":"17","author":"levine","year":"2016","journal-title":"Journal of Machine Learning Research"},{"year":"2012","author":"krizhevsky","journal-title":"Learning multiple layers of features from tiny images","key":"ref29"},{"key":"ref5","article-title":"High-dimensional continuous control using generalized advantage estimation","author":"schulman","year":"2016","journal-title":"4th International Conference on Learning Representations"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CDC42340.2020.9303750"},{"key":"ref7","article-title":"Adversarial attacks on neural network policies","author":"huang","year":"2017","journal-title":"5th International Conference on Learning Representations (ICLR)"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CVPR.2016.282"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/DSAA53316.2021.9564161"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref20","article-title":"Gradient descent provably optimizes over-parameterized neural networks","author":"du","year":"2019","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref22","article-title":"Convex neural networks","author":"bengio","year":"2006","journal-title":"Advances in neural information processing systems"},{"key":"ref21","first-page":"1","article-title":"Breaking the curse of dimensionality with convex neural networks","volume":"18","author":"bach","year":"2017","journal-title":"Journal of Machine Learning Research"},{"key":"ref24","article-title":"Practical convex formulations of one-hidden-layer neural network adversarial training","author":"bai","year":"2021","journal-title":"Technical Report"},{"key":"ref23","article-title":"Neural networks are convex regularizers: Exact polynomial-time convex optimization formulations for two-layer networks","author":"pilanci","year":"2020","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1017\/CBO9780511804441"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/s10107-003-0499-y"}],"event":{"name":"2022 American Control Conference (ACC)","start":{"date-parts":[[2022,6,8]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9866948\/9867142\/09867244.pdf?arnumber=9867244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T20:38:08Z","timestamp":1664829488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9867244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/acc53348.2022.9867244","relation":{},"subject":[],"published":{"date-parts":[[2022,6,8]]}}}