共 62 条
- [21] Goodfellow IJ, Shlens J, Szegedy C., Explaining and harnessing adversarial examples, Proc. of the 3rd Int’l Conf. on Learning Representations, (2015)
- [22] Moosavi-Dezfooli SM, Fawzi A, Frossard P., DeepFool: A simple and accurate method to fool deep neural networks, Proc. of the 2016 IEEE Conf. on Computer Vision and Pattern Recognition, pp. 2574-2582, (2016)
- [23] Carlini N, Wagner D., Towards evaluating the robustness of neural networks, Proc. of the 2017 IEEE Symp. on Security and Privacy, pp. 39-57, (2017)
- [24] Dong YP, Liao FZ, Pang TY, Su H, Zhu J, Hu XL, Li JG., Boosting adversarial attacks with momentum, Proc. of the 2018 IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 9185-9193, (2018)
- [25] Xie CH, Wang JY, Zhang ZS, Zhou YY, Xie LX, Yuille A., Adversarial examples for semantic segmentation and object detection, Proc. of the 2017 IEEE Int’l Conf. on Computer Vision, pp. 1378-1387, (2017)
- [26] Li YZ, Tian D, Chang MC, Bian X, Lyu S., Robust adversarial perturbation on deep proposal-based models, Proc. of the 2018 British Machine Vision Conf, (2018)
- [27] Chow KH, Liu L, Loper M, Bae J, Gursoy ME, Truex S, Wei WQ, Wu YZ., Adversarial objectness gradient attacks in real-time object detection systems, Proc. of the 2nd IEEE Int’l Conf. on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 263-272, (2020)
- [28] Baluja S, Fischer I., Adversarial transformation networks: Learning to generate adversarial examples, (2017)
- [29] Poursaeed O, Katsman I, Gao BC, Belongie S., Generative adversarial perturbations, Proc. of the 2018 IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 4422-4431, (2018)
- [30] Naseer M, Khan S, Khan MH, Khan FS, Porikli F., Cross-domain transferability of adversarial perturbations, Proc. of the 33rd Int’l Conf. on Neural Information Processing Systems, (2019)