Publisher
Springer International Publishing
Reference31 articles.
1. Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems. tensorflow.org (2015). http://tensorflow.org/
2. Baluja, S., Fischer, I.: Learning to attack: adversarial transformation networks. In: Proceedings of AAAI (2018)
3. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);B Biggio,2013
4. Biggio, B., Fumera, G., Roli, F.: Pattern recognition systems under attack: design issues and research challenges. Int. J. Pattern Recogn. Artif. Intell. 28(07) (2014)
5. Chatfield, K., Simonyan, K., Vedaldi, A., Zisserman, A.: Return of the devil in the details: delving deep into convolutional nets. In: Proceedings of the British Machine Vision Conference (BMVC) (2014)
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DE-DFKD: diversity enhancing data-free knowledge distillation;Multimedia Tools and Applications;2024-09-14
2. A proxy-data-based hierarchical adversarial patch generation method;Computer Vision and Image Understanding;2024-09
3. Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift;2024 International Joint Conference on Neural Networks (IJCNN);2024-06-30
4. AdvOps: Decoupling adversarial examples;Pattern Recognition;2024-05
5. Investigating White-Box Attacks for On-Device Models;Proceedings of the IEEE/ACM 46th International Conference on Software Engineering;2024-04-12