Author:
Zhang Haodong,Pun Chi-Man,Du Xia
Reference12 articles.
1. IEEE Transactions on Information Forensics and Security
2. Explaining and harnessing adversarial examples;Goodfellow;arXiv preprint arXiv:1412.6572,2014
3. IEEE/ACM Transactions on Audio, Speech, and Language Processing
4. Reversible attack based on local visual adversarial perturbation;Chen;arXiv e-prints, arXiv–2110,2021
5. Unauthorized AI cannot recognize me: Reversible adversarial example