Funder
Japan Society for the Promotion of Science
Japan Science and Technology Agency
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference60 articles.
1. Goodfellow, I., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. In Proceedings of international conference on learning representations (ICLR), San Diego, CA, USA (pp. 1–11).
2. Moosavi-Dezfooli, S.-M., Fawzi, A., & Frossard, P. (2016). DeepFool: A simple and accurate method to fool deep neural networks. In Proceedings of IEEE conference on computer vision and pattern recognition (CVPR), Las Vegas, NV, USA (pp. 2574–2582).
3. Muñoz-González, L., Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., & Roli, F. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. In Proceedings of ACM workshop on artificial intelligence and security (AISec), Dallas, TX, USA (pp. 27–38).
4. Anderson, R., & Petitcolas, F. (1998). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474–481.
5. Bartolini, F., Tefas, A., Barni, M., & Pitas, I. (2001). Image authentication techniques for surveillance applications. Proceedings of the IEEE, 89(10), 1403–1418.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献