Author:
Yang Jin,Li Zhi,Liu Shuaiwei,Hong Bo,Wang Weidong
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference56 articles.
1. He K, Zhang X, Ren S., Sun J (2016) Deep residual learning for image recognition. In: Conference on computer vision and pattern recognition, pp 770–778
2. Ren H, Huang T, Yan H (2021) Adversarial examples: attacks and defenses in the physical world. Int J Mach Learn Cybern 12(11):3325–3336
3. Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow IJ, Fergus R (2014) Intriguing properties of neural networks. In: International Conference on Learning Representations
4. Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In International conference on learning representations
5. Xu K, Zhang G, Liu S, Fan Q, Sun M, Chen H, Chen P-Y, Wang Y, Lin X (2020) Adversarial t-shirt! evading person detectors in a physical world. In: European conference on computer vision. Springer, pp 665-681