Author:
Xiang Yuexin,Li Tiantian,Ren Wei,He Jie,Zhu Tianqing,Choo Kim-Kwang Raymond
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference48 articles.
1. Intriguing properties of neural networks;Szegedy,2013
2. Explaining and harnessing adversarial examples;Goodfellow,2014
3. Moosavi-Dezfooli S-M, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016, p. 2574–82.
4. Maximal jacobian-based saliency map attack;Wiyatno,2018
5. Simple black-box adversarial perturbations for deep networks;Narodytska,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Semantic Security: A Digital Watermark Method for Image Semantic Preservation;ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2024-04-14