共 62 条
[1]
Afchar D, 2018, IEEE INT WORKS INFOR
[2]
Bingen Li H.Z., 2021, UNSUPERVISEDMONOCULA
[3]
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020),
2020,
:2804-2813
[4]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[5]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[6]
Deep Colorization
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV),
2015,
:415-423
[7]
Xception: Deep Learning with Depthwise Separable Convolutions
[J].
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017),
2017,
:1800-1807
[9]
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:4307-4316
[10]
Boosting Adversarial Attacks with Momentum
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:9185-9193