1. Ho Bae Jaehee Jang Dahuin Jung Hyemi Jang Heonseok Ha Hyungyu Lee and Sungroh Yoon. 2018. Security and privacy issues in deep learning. arXiv preprint arXiv:1807.11655(2018). Ho Bae Jaehee Jang Dahuin Jung Hyemi Jang Heonseok Ha Hyungyu Lee and Sungroh Yoon. 2018. Security and privacy issues in deep learning. arXiv preprint arXiv:1807.11655(2018).
2. Effective Universal Unrestricted Adversarial Attacks Using a MOE Approach
3. Anand Bhattad Min Jin Chong Kaizhao Liang Bo Li and David A. Forsyth. 2019. Big but Imperceptible Adversarial Perturbations via Semantic Manipulation. CoRR abs/1904.06347(2019). Anand Bhattad Min Jin Chong Kaizhao Liang Bo Li and David A. Forsyth. 2019. Big but Imperceptible Adversarial Perturbations via Semantic Manipulation. CoRR abs/1904.06347(2019).
4. Nicholas Carlini and D. Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. IEEE Symp. on Security and Privacy(2017) , 39–57. Nicholas Carlini and D. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. IEEE Symp. on Security and Privacy(2017), 39–57.
5. Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs/1412.6572(2015). Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs/1412.6572(2015).