共 44 条
- [11] Wang B H, Li Y Q, Zhou P., Bandits for structure perturbation-based black-box attacks to graph neural networks with theoretical guarantees, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13369-13377, (2022)
- [12] Jia X J, Zhang Y, Wu B Y, Ma K, Wang J, Cao X C., LAS-AT: Adversarial training with learnable attack strategy, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13388-13398, (2022)
- [13] Li T, Wu Y W, Chen S Z, Fang K, Huang X L., Subspace adversarial training, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13399-13408, (2022)
- [14] Xu C K, Zhang C J, Yang Y W, Yang H Z, Bo Y J, Li D Y, Et al., Accelerate adversarial training with loss guided propagation for robust image classification, Information Processing & Management, 60, 1, (2023)
- [15] Chen Z Y, Li B, Xu J H, Wu S, Ding S H, Zhang W Q., Towards practical certifiable patch defense with vision transformer, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15127-15137, (2022)
- [16] Suryanto N, Kim Y, Kang H, Larasati H T, Yun Y, Le T T H, Et al., DTA: Physical camouflage attacks using differentiable transformation network, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15284-15293, (2022)
- [17] Zhong Y Q, Liu X M, Zhai D M, Jiang J J, Ji X Y., Shadows can be dangerous: Stealthy and effective physical-world adversarial attack by natural phenomenon, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15324-15333, (2022)
- [18] Chen P Y, Zhang H, Sharma Y, Yi J F, Hsieh C J., ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models, Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 15-26, (2017)
- [19] Ilyas A, Engstrom L, Athalye A, Lin J., Black-box adversarial attacks with limited queries and information, Proceedings of the 35th International Conference on Machine Learning (ICML), pp. 2137-2146, (2018)
- [20] Uesato J, O'donoghue B, Kohli P, Oord A., Adversarial risk and the dangers of evaluating against weak attacks, Proceedings of the 35th International Conference on Machine Learning (ICML), pp. 5025-5034, (2018)