Biologically inspired protection of deep networks from adversarial attacks

# Biologically inspired protection of deep networks from adversarial attacks

## Abstract

Inspired by biophysical principles underlying nonlinear dendritic computation in neural circuits, we develop a scheme to train deep neural networks to make them robust to adversarial attacks. Our scheme generates highly nonlinear, saturated neural networks that achieve state of the art performance on gradient based adversarial examples on MNIST, despite never being exposed to adversarially chosen examples during training. Moreover, these networks exhibit unprecedented robustness to targeted, iterative schemes for generating adversarial examples, including second-order methods. We further identify principles governing how these networks achieve their robustness, drawing on methods from information geometry. We find these networks progressively create highly flat and compressed internal representations that are sensitive to very few input dimensions, while still solving the task. Moreover, they employ highly kurtotic weight distributions, also found in the brain, and we demonstrate how such kurtosis can protect even linear classifiers from adversarial attack.

## 1Introduction

Deep Neural Networks (DNNs) have demonstrated success in many machine learning tasks, including image recognition [12], speech recognition [7], and even modelling mathematical learning [18], among many other domains. However, recent work has exposed a remarkable weakness in deep neural networks [22] (see [23] for a survey), namely that very small perturbations to the input of a neural network can drastically change its output. In fact, in image classification tasks, it is possible to perturb the pixels in such a way that the perturbed image is indistinguishable from its original counterpart to a human observer, but the network’s class prediction is completely altered. These adversarial examples suggest that despite the above successes, machine learning models are not fundamentally understanding the tasks that they are trained to perform.

Furthermore, the imperceptibility of these adversarial perturbations to human observers suggests that these machine learning algorithms are performing computations that are vastly different from those performed by the human visual system. This discrepancy is of particular scientific concern as deep neural networks now form foundational models in neuroscience for the visual processing stream [24]. So their susceptibility to adversarial perturbations that are imperceptible to us suggest our models are missing a fundamental ingredient that is implemented in the brain. However, the existence of adversarial examples is also of particular technological concern in machine learning, as these adversarial examples generalize across architectures and training data, and can therefore be used to attack machine learning systems deployed in society, without requiring knowledge of their internal structure [16].

It is important to note that adversarial examples of this form are not limited to deep networks but are also an issue even in linear high dimensional classification and regression problems. A plausible explanation [4] for the existence of these adversarial examples lies in the idea that any algorithm that linearly sums its high dimensional input vectors with many small weights can be susceptible to an attacker that adversarially perturbs each of the individual inputs by a small amount so as to move the entire sum in a direction that would make an incorrect classification likely. This idea lead to a fast method to find adversarial examples which could then be used to explicitly train neural networks to be robust to their own adversarial examples [4].

However, it is unclear that biological circuits explicitly find their own adversarial examples by optimizing over inputs and training against them. Therefore, we are interested in guarding against adversarial examples in a more biologically plausible manner, without explicitly training on adversarial examples themselves. Of particular interest is isolating and exploiting fundamental regimes of operation in the brain that prevent the imperceptible perturbations that fool deep networks, from fooling us. In this paper, we take inspiration from one fundamental aspect of single neuron biophysics that is not often included in artificial deep neural networks, namely the existence of nonlinear computations in intricate, branched dendritic structures [21]. These nonlinear computations prevent biological neurons from performing weighted sums over many inputs, the key factor thought to lead to susceptibility to adversarial examples. Indeed, the biophysical mechanism for linear summation in neurons corresponds to the linear superposition of trans-membrane voltage signals as they passively propagate along dendrites. These voltage waves can linearly sum synaptic inputs. However, there is also a high density of active ionic conductances spread through the dendritic tree that can destroy this linear superposition property in purely passive dendrites, thereby limiting the number of synapses that can linearly sum to . These active conductances lead to high threshold, nonlinear switch like behavior for voltage signalling. As a result, many parts of the dendritic tree exist in voltage states that are either far below threshold, or far above, and therefore saturated. Thus biological circuits, due to the prevalence of active dendritic processing, may operate in a highly nonlinear switch-like regime in which it is very difficult for small input perturbations to propagate through the system to create large errors in output.

Rather than directly mimic this dendritic biophysics in artificial neural networks, here we take a more practical approach and take inspiration from this biophysics to train artificial networks into a highly nonlinear operating regime with many saturated neurons. We develop a simple training scheme to find this nonlinear regime, and we find, remarkably, that these networks achieve state of the art robustness to adversarial examples despite never having access to adversarial examples during training. Indeed we find 2-7% error rates on gradient-based adversarial examples generated on MNIST, with little to no degradation in the original test set performance.

Furthermore, we go beyond performance to scientifically understand which aspects of learned circuit computation confer such adversarial robustness. We find that our saturated networks, compared to unsaturated networks, have highly kurtotic weight distributions, a property that is shared by synaptic strengths in the brain [3]. Also, our networks progressively create across layers highly clustered internal representations of different image classes, with widely separated clusters for different classes. Furthermore we analyze the information geometry of our networks, finding that our saturated networks create highly flat input-output functions in which one can move large distances in pixel space without moving far in output probability space. Moreover, our saturated networks create highly compressed mappings that are typically sensitive to only one direction in input space. Both these properties make it difficult even for powerful adversaries capable of iterative computations to fool our networks, as we demonstrate. Finally, we show that the highly kurtotic weight distributions that are found both in our model and in biological circuits, can by themselves confer robustness to adversarial examples in purely linear classifiers.

We consider a feedforward network with layers of weights and layers of neural activity vectors , with neurons in each layer , so that and is an weight matrix. The feedforward dynamics elicited by an input are

where is a vector of biases, is the pattern of inputs to neurons at layer , and is a single neuron scalar nonlinearity that acts component-wise to transform inputs to activities . We take to be the class indicator vector generated from . We also denote by the network’s composite transformation from input to output.

For such networks, the essential idea underlying adversarial examples is to start with a test example that is correctly classified by the network with class indicator vector , and transform it through an additive perturbation into a new input that is incorrectly classified by the network as having a “goal” class label . Moreover, the perturbation should be of bounded norm so as to be largely imperceptible to a human observer. This idea leads naturally to an optimization problem:

However, as this is a complex optimization, many simpler methods have been proposed to efficiently generate adversarial examples (e.g. [4]). In particular, the fast gradient sign method of [4] is perhaps the most efficient method. Motivated by the notion that adversarial attacks can arise even in linear problems in high dimensional spaces, [4] linearized the input-output map around the test example and searched for bounded norm perturbations that maximize the network’s cost function over the linearized network. More precisely, suppose the cost function of the network is , then its linearization is

where is the Jacobian of . Then the bounded norm optimization that maximizes cost has the exact solution

If a network can be susceptible to these gradient-based adversaries, then we can choose to be small enough for the given dataset so it is imperceptible to human observers yet large enough for the network to misclassify. For MNIST, [4] took , since each pixel is in . We follow this prescription in our experiments.

With efficient methods of generating adversarial examples , [4] harnessed them to develop adversarial training, whereby the network is trained with the interpolated cost function:

As a result, the network is trained at every iteration on adversarial examples generated from the current version of the model. On maxout networks trained on MNIST, [4] found that they achieved an error rate of 89.4% on adversarial examples, and with adversarial training (where ), they were able to lower this to an error rate of 17.9%.

We now turn to ways to avoid training on adversarial examples, in order to have the networks be more intrinsically robust to their adversarial examples. [17] suggested knowledge distillation, which involves changing a temperature parameter on the final softmax output in order to ensure that the logits are more spread apart. However, the authors do not try their approach on adversarial examples generated by the fast gradient sign method, nor does this approach address the broader criticism of [4] that models susceptible to gradient-based adversaries operate heavily in the linear regime. We develop a method that strongly departs from the high dimensional linear regime in which adversarial examples abound. The basic idea is to force networks to operate in a nonlinear saturating regime.

## 3Saturating Networks

A natural starting point to achieve adversarial robustness is to ensure that each element of the Jacobian of the model, , is sufficiently small, so that the model is not sensitive to perturbations in its inputs. Jacobian regularization is therefore the most direct method of attaining this goal; however, for sufficiently large networks, it is computationally expensive to regularize the Jacobian as its dimensions can become cumbersome to store in memory.

An immediate alternative would be to use a contractive penalty as in [6], whereby the Frobenius norm of the layer-wise Jacobian is penalized:

where each . For element-wise nonlinearities, [20] show that this penalty can be computed in time, where denotes the length (number of units).

While indirectly encouraging the activations to be pushed in the saturating regime of the nonlinearity, this contractive penalty can nonetheless be practically difficult to compute efficiently for networks with a large number of hidden units per layer, and also tends to limit the model’s capacity to learn from data, degrading test set accuracy.

Saturating autoencoders were introduced by [5] as a means of explicitly encouraging activations to be in the saturating regime of the nonlinearity, in order to limit the autoencoder’s ability to reconstruct points that are not close by on the data manifold. Their penalty takes the following form for a given activation and ,

where the complementary function is defined as:

and reflects the distance of any individual activation to the nearest saturation region. Not only is this penalty simple, but it can be cheaply computed in time.

## 4Experiments and Results

Here we adapt the above regularization, originally designed for autoencoders, to protect against adversarial examples in supervised classification networks. We found that applying this regularization to every network layer, including the readout layer prior to the softmax output, worked best against adversarial examples generated by the fast gradient sign method. Thus, our penalty took the following form:

Observe that for a ReLU function, the complementary function in is itself, so . While the definition in can also be intricately extended to differentiable functions (as is done in [5]), for a sigmoid function we can simply take , since the sigmoid is a monotonic function.

We used TensorFlow for all of our models [1], and we trained both 3 layer multilayer perceptrons (MLPs) with sigmoid and ReLU nonlinearities, as well as convolutional neural networks (CNNs) on 10-class MNIST. For comparison, we trained the adversarially trained networks as in , finding that gave the best performance. Each network was optimized for performance separately, and we varied the number of hidden units for the MLPs to be between 200-2000 to choose the architecture that provided the best performance. Our CNN architecture is detailed in Table ?, and we used the stronger penalty only at the last layer of the CNN. We used Adam [8] as our optimizer.

In order to effectively train with the saturating penalty in , we found that annealing during training was essential. Starting with , this was progressively increased to in steps of size 0.001 for the sigmoidal MLP, in steps of size for the ReLU MLP, and in steps of size for the CNN. We ultimately found that the CNN was easier to find an annealing schedule for than the MLPs, further suggesting the viability of this approach in practice.

We list above our results in Table ?. As can be seen, for each model class, we are able to maintain (with little degradation) the original test set accuracy of the network’s vanilla counterpart, while also outperforming the adversarially trained counterpart on the adversarial set generated from the test set. We now turn to analyzing the source of adversarial robustness in our networks.

## 5Internal Representation Analysis

We now examine the internal representations learned by saturating networks (in particular the MLPs) and compare them to those learned by their vanilla counterparts, to gain insight into distinguishing features that make saturating networks intrinsically robust to adversarial examples.

In Figure 1, we compare the weight distributions of the vanilla MLP to the saturating MLP. The saturating MLP weights take on values in a larger range, with a tail that tends to extreme values in the saturating regime of the nonlinearity. For the sigmoid, this leads to extreme weight values on both ends, while for the saturating ReLU MLP, this leads to extreme negative values. A particularly dramatic change in the weight distribution is a much larger positive excess kurtosis for saturating versus vanilla networks. Indeed, high kurtosis is a property shared by weight distributions in biological networks [3], raising the question of whether or not it plays a functional role in protection against adversarial examples. In §8, we will demonstrate that highly kurtotic weight distributions can act as a linear mechanism to protect against adversarial examples, in addition to the nonlinear mechanism of saturation.

Moreover, in Figure 2, we see that the pre-nonlinearity activations at each layer across all 10,000 test examples also tend to extreme values, as expected, validating that these models are indeed operating in the saturating regime of their respective nonlinearities.

Beyond examining the weights and the activations, we also examine the global structure of internal representations by constructing, for each network and layer, the representational dissimilarity matrix (RDM) of its activities [11]. For each of the 10 classes, we chose 100 test set examples at random, and computed the pairwise squared distance matrix,

between all pairs and of the 1000 test examples. Here and are the hidden unit activations at layer on inputs and , respectively.

As shown in Figure 3, a distinguishing feature emerges between the RDMs of the vanilla network and the saturated network. At every layer, while within class dissimilarity, in the diagonal blocks, is close to zero for both networks, between class dissimilarities in the off-diagonal blocks are much larger in the saturated network than in the vanilla network. Moreover, this dissimilarity is progressively enhanced in saturating networks as one traverses deeper into the network towards the final output. Thus while both networks form internal representations in which images from each class are mapped to tight clusters in internal representation space, these internal clusters are much further apart from each other for saturating networks. This increased cluster separation likely contributes to adversarial robustness because it necessitates larger norm input perturbations to move representations in deeper layers across decision boundaries, not only in the output layer, but also in intermediate layers.

## 6The geometry of saturating networks

While the RDM analysis above showed increased cluster separation in internal representations, we would like to understand better the geometry of the network input-output map and how it contributes to adversarial robustness. To this end, we seek to understand how motions in input space are transformed to motions in the output space of probability distributions over class labels.

To do so, we rely on the framework of information geometry and Fisher information [2]. In particular, the network output, as a probability distribution over class labels, is endowed with a natural Riemannian metric, given by the Fisher information. We can think of the 10 dimensional vector of inputs in the final layer, as coordinates on this space of distributions (modulo the irrelevant global scaling ). In terms of these coordinates, the actual probabilities are determined through the softmax function: where . The Fisher information metric on the space is then given by

In turn, this metric on induces a metric on input space via the pullback operation on metrics. The resultant metric on input space is given by

where is the Jacobian from input space to layer . Geometrically, if one moves a small amount from to , the resultant distance one moves in output probability space, as measured by the Fisher information metric, is given by

Thus the metric assigns lengths to curves in input space according to how far they induce motions in output space. Also, the Jacobian is of independent geometric interest. As a local linearization of the input-output map, the number of non-trivially large singular values of determine how many directions in input space the network’s input-output map is locally sensitive to.

To explore the geometric structure of both vanilla and saturating deep network maps, we move continuously in input space between the most confident images in a given source class, , and a target class, along a simple linear interpolation path in pixel space:

As we move along this path, in Figure 5, we plot the length element in , the induced trajectory in output probability space, and the spectrum of singular values of the Jacobian . As expected, the length element increases precisely when the output trajectory in probability space makes large transitions. At these points, one or more singular values of also inflate.

Several distinguishing features arise in the geometry of vanilla versus saturated networks in Figure 5. The first is that the length element is more smooth and continuous for the vanilla network, but locally flat with sharp peaks when class probabilities transition for the saturating network. Thus for saturating networks, one can move long distances in input space without moving much at all in output space. This property likely confers robustness to gradient-based adversaries, which would have difficulty traversing input space under such constant, or flat input-output maps.

A second distinguishing feature is that, in vanilla networks, at probabilistic transition points, multiple singular values inflate, while in saturating networks, only one singular value does so. This implies that vanilla networks are sensitive to multiple dimensions, while saturating networks perform extremely robust and rapid transitions between distinct probabilistic outputs in a way that sensitivity to input perturbations in all directions orthogonal to the transition are strongly suppressed. This property again likely confers robustness to adversaries, as it strongly constrains the number of directions of expansion that an adversary can exploit in order to alter output probabilities.

Finally, it is interesting to compare the geometry of these trained networks to the Riemannian geometry of random neural networks which often arise in initial conditions before training. An extensive analysis of this geometry, performed by [19], revealed the existence of two phases in deep networks: a chaotic (ordered) phase when the random weights have high (low) variance. In the chaotic (ordered) phase the network locally expands (contracts) input space everywhere. In contrast, trained networks flexibly deploy both ordered and chaotic phases differentially across input space; they contract space at the center of decision volumes and expand space in the vicinity of decision boundaries. Saturating networks, however, do this in a much more extreme manner than vanilla networks.

One can construct more powerful adversaries than the fast sign gradient method by iteratively finding sensitive directions in the input-output map and moving along them. How robust are saturating networks to these types of adversaries? From the information-geometric standpoint described above, given the local flatness of the input-output map, as quantified by our Riemannian geometric analysis, an iterative gradient-based adversary may still encounter difficulty with the saturated network, especially since the number of directions of expansion are additionally constrained by the compressive nature of the map.

We first created adversaries via iterative first order methods. For each chosen source image and its associated correct source class , we chose a target class, . We then attempted to find adversarial perturbations that cause the network to misclassify as belonging to class . To do so, starting from , we iteratively minimized the cross entropy loss via gradient descent:

This procedure adjusts the adversarial example so as to make the incorrect label more likely. We used Adam [8] so that the learning rate would be adaptive at each iteration . For a given source class, we started with the source image the network was either least or most confident on.

Although we were able to get the vanilla network to misclassify in either case (usually within less than 10 iterations), there were several cases (such as when the source class was a 3 and the target class was a 7) where we were unable to get the saturated network to misclassify, even in the most extreme case where we ran Adam for 30 million iterations. Although the image was changing at each iteration and the mean pixel distance from the starting image was steadily increasing and converged, the resultant image did not cause the saturated network to misclassify.

As a result, we moved onto second order adversaries, as [22] had similarly considered. Thus, we considered quasi-Newton methods such as L-BFGS where we would minimize the cross entropy loss as follows:

where is the approximate Hessian at iteration and the learning rate is obtained by performing a line search in the direction where .

In Figure 6, we ran L-BFGS for 1000 iterations on both the vanilla network and the saturated network, starting with a source image that each network correctly classified but had the lowest softmax probability in that class (lowest confidence). In Figure 9 in the Supplementary Material (SM), we also include the same analysis, but starting with the most confident source image in each class.

Regardless of whether we start with a source image with the least or highest confidence in that class, we can always find an adversarial image to fool the vanilla network to misclassify as the intended target class (and usually within 1-2 iterations). However, for the saturated network, even starting with the least confident source image, we were, in the majority of cases, unable to fool the network. Moreover, as depicted in Figure 9 in the Supplementary Material (SM), it was even more difficult to fool the saturated network with the most confident source image, resulting in only 5 such cases, even after 1000 iterations.

## 8Role of weight kurtosis: a linear mechanism for robustness to adversaries

As we observed in §5, saturating networks had high kurtosis weight distributions in every layer when compared to their vanilla counterparts. Indeed, such kurtotic weight distributions are prevalent in biological neural networks [3]. Here we demonstrate that high kurtosis weight distributions can act as a linear mechanism to guard against adversarial examples.

Indeed, sensitivity to adversarial examples is not unique to neural networks, but arises in many machine learning methods, including linear classification. Consider for example a classification problem with two cluster prototypes with weight vectors and . For simplicity, we assume and lie in orthogonal directions, so . An input is classified as class 1 if , otherwise is classified as class . Now consider a test example that is the cluster prototype for class 1, i.e. . Let us further consider an adversarial perturbation . This perturbed input will be misclassified if and only if . Following the fast sign gradient method, we can choose to be the maximum perturbation under the constraint in . This optimal perturbation is . In order to have this bounded norm perturbation cause a misclassification, we must then have the condition

Here, recall we are assuming for simplicity. Thus if the norm in the denominator is small, then the network is adversarially robust in the sense that a large perturbation is required to cause a misclassification, whereas if the norm is large, then it is not.

Now in high dimensional spaces, norms can be quite large relative to norms. In particular for any unit norm vector , we have , where the upper bound is realized by a dense uniform vector with each entry and the lower bound is realized by a coordinate vector with one nonzero entry equal to . Both these vectors are on the ball of radius , but this ball intersects the circumscribing ball of radius at the former vector, and the inscribing ball of radius at the latter vector. This intersection of and balls of very different radii in a high dimensional space likely contributes to the prevalence of adversarial examples in high dimensional linear classification problems by allowing the denominator in to be large and the numerator to be small.

However, we can avoid the bad regime of dense uniform vectors with large norm if the weights are sampled from a kurtotic distribution. In this case, we may then expect that the numerator in would be large as we are likely to sample from extreme values, but that the denominator would be small due to the peak of the distribution near 0. To test this idea, we sampled unit norm random vectors of dimension 20000, so that . We sampled their values iid from a Pearson Type VII distribution, with density function given by

where , is the Euler Beta function, and denotes the excess kurtosis of the distribution. In Figure 9, we computed the ratio in and scaled it by the input intensity, which is given by the average absolute value of a nonzero component of . The resultant scaled ratio was then computed for each value of . Note that a standard Gaussian has an excess kurtosis of 0, which serves as a baseline. Hence, increasing the excess kurtosis via, for example, a Pearson Type VII density, increases the scaled ratio by almost from the Gaussian baseline. In fact, if we sample, via inverse transform sampling, from the weight distribution of the saturated network at a given layer, then the scaled ratio can increase by as much as from when we sample from the distribution of the weights in that same layer for the vanilla network. Thus even in the case of linear classification, kurtotic weight distributions, including the weight distributions learned by our saturating networks, can improve robustness to adversarial examples.

## 9Discussion

In summary, we have shown that a simple, biologically inspired strategy for finding highly nonlinear networks operating in a saturated regime provides interesting mechanisms for guarding DNNs against adversarial examples without ever computing them. Not only do we gain improved performance over adversarially trained networks on adversarial examples generated by the fast gradient sign method, but our saturating networks are also relatively robust against iterative, targeted methods including second-order adversaries. We additionally move beyond empirical results to analyze the sources of intrinsic robustness to adversarial perturbations. Our information geometric analyses reveal several important features, including highly flat and low dimensional internal representations that nevertheless widely separate images from different classes. Moreover, we have demonstrated that the highly kurtotic weight distributions found both in our networks and in our brains, can act as a linear mechanism against adversarial examples. Overall, we hope our results can aid in combining theory and experiment to form the basis of a general theory of biologically plausible mechanisms for adversarial robustness.

## Acknowledgements

We thank Ben Poole and Niru Maheswaranathan for helpful comments on the manuscript, and the ONR, and Burroughs Welcome, Simons, McKnight, and James. S. McDonnell foundations for support.

### References

1. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015.
Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G. S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I. J., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Mané, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Viégas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., and Zheng, X. URL http://tensorflow.org/.
2. Methods of information geometry.
Amari, S. and Nagaoka, H. In Kobayashi, S. and Takesaki, M. (eds.), Translations of Mathematical Monographs, volume 191. American Mathematical Society, Providence, RI, 1993.
3. The log-dynamic brain: how skewed distributions affect network operations.
Buzsáki, G. and Mizuseki, K. Nature Reviews Neuroscience
4. Explaining and harnessing adversarial examples.
Goodfellow, I. J., Shlens, J., and Szegedy, C. In International Conference on Learning Representations (ICLR 2015), 2015.
5. Saturating auto-encoders.
Goroshin, R. and LeCun, Y. In International Conference on Learning Representations (ICLR 2013), 2013.
6. Towards deep neural network architectures robust to adversarial examples.
Gu, S. and Rigazio, L. In International Conference on Learning Representations (ICLR 2015), 2015.
7. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups.
Hinton, G., Deng, L., Yu, D., Dahl, G., Mohamed, A., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T., and Kingsbury, B. IEEE Signal Processing Magazine
8. Adam: A method for stochastic optimization.
Kingma, D. P. and Ba, J. In International Conference on Learning Representations (ICLR 2015), 2015.
9. Biophysics of computation: Information processing in single neurons.
Koch, C. Oxford University Press, New York, NY, 1999.
10. Deep neural networks: A new framework for modeling biological vision and brain information processing.
Kriegeskorte, N. Annual Review of Vision Science
11. Representational similarity analysis – connecting the branches of systems neuroscience.
Kriegeskorte, N., Mur, M., and Bandettini, P. Frontiers in Systems Neuroscience
12. Imagenet classification with deep convolutional neural networks.
Krizhevsky, A., Sutskever, I., and Hinton, G. In Advances in Neural Information Processing Systems (NIPS 2012), pp. 1097–1105, 2012.
13. Dendritic computation.
London, M. and Häusser, M. Annual Review of Neuroscience
14. Deep learning models of the retinal response to natural scenes.
McIntosh, L. T., Maheswaranathan, N., Nayebi, A., Ganguli, S., and Baccus, S. In Advances in Neural Information Processing Systems (NIPS 2016), pp. 1369–1377, 2016.
15. Distributional smoothing with virtual adversarial training.
Miyato, T., Maeda, S., Koyama, M., Nakae, K., and Ishii, S. In International Conference on Learning Representations (ICLR 2016), 2016.
16. The limitations of deep learning in adversarial settings.
Papernot, N., McDaniel, P., S. Jha, M. Fredrikson, Celik, Z. B., and Swami, A. In Proceedings of the 1st IEEE European Symposium on Security and Privacy, pp. 372–387, 2016a.
17. Distillation as a defense to adversarial perturbations against deep neural networks.
Papernot, N., McDaniel, P., Wu, X., Jha, S., and Swami, A. In 37th IEEE Symposium on Security & Privacy, pp. 582–597, 2016b.
18. Deep knowledge tracing.
Piech, C., Bassen, J., Huang, J., Ganguli, S., Sahami, M., Guibas, L., and Sohl-Dickstein, J. In Advances in Neural Information Processing Systems (NIPS 2015), pp. 505–513, 2015.
19. Exponential expressivity in deep neural networks through transient chaos.
Poole, B., Lahiri, S., Raghu, M., Sohl-Dickstein, J., and Ganguli, S. In Advances in Neural Information Processing Systems (NIPS 2016), pp. 3360–3368, 2016.
20. Contractive auto-encoders: Explicit invariance during feature extraction.
Rifai, S., Vincent, P., Muller, X., Glorot, X., and Bengio, Y. In International Conference on Machine Learning (ICML 2011), 2011.
21. Dendrites (3rd ed).
Stuart, G., Spruston, N., and Häusser, M. Oxford University Press, Oxford, U.K., 2016.
22. Intriguing properties of neural networks.
Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I. J., and Fergus, R. In International Conference on Learning Representations (ICLR 2014), 2014.
23. Adversarial perturbations of deep neural networks.
Warde-Farley, D. and Goodfellow, I. J. In Hazan, T., Papandreou, G., and Tarlow, D. (eds.), Perturbations, Optimization, and Statistics, chapter 1, pp. 1–32. MIT Press, Cambridge, MA, 2016.
24. Performance-optimized hierarchical models predict neural responses in higher visual cortex.
Yamins, D. L. K., Hong, H., Cadieu, C. F., Solomon, E., Seibert, D., and DiCarlo, J. J. Proceedings of the National Academy of Sciences of the United States of America
12169