共 49 条
[31]
Mhaskar H, 2017, AAAI CONF ARTIF INTE, P2343
[32]
DeepFool: a simple and accurate method to fool deep neural networks
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:2574-2582
[33]
Netzer Y., 2011, NIPS WORKSH DEEP LEA, V2011, P4
[34]
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:582-597
[35]
The Limitations of Deep Learning in Adversarial Settings
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:372-387
[37]
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1528-1540
[38]
Szegedy C, 2014, Arxiv, DOI arXiv:1312.6199
[39]
TramŠr F, 2017, Arxiv, DOI arXiv:1704.03453
[40]
van der Maaten L, 2008, J MACH LEARN RES, V9, P2579