Author:
Mi Jian-Xun,Zhao Xiangjin,Chen Yongtao,Cheng Xiao,Tian Peng,Lv Xiaohong,Zhong Jiayong
Publisher
Springer Nature Singapore
Reference17 articles.
1. Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: 6th International Conference on Learning Representations. (2018)
2. Carlini, N., Wagner, D.: Towards Evaluating the Robustness of Neural Networks. In: 2017 IEEE Symposium on Security and Privacy, pp. 39–57. IEEE Computer Society, San Jose, CA, USA (2017)
3. Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., Yuille, A.: Adversarial Examples for Semantic Segmentation and Object Detection. In: 2017 IEEE International Conference on Computer Vision, pp. 1378–1387. IEEE Computer Society, Venice, Italy (2017)
4. Wei, X., Liang, S., Chen, N., Cao, X.: Transferable adversarial attacks for image and video object detection. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 954–960. AAAI Press, Macao, China (2019)
5. Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. In: 5th International Conference on Learning Representations (2017)