共 58 条
[1]
Brendel W., 2018, INT C LEARN REPR ICL
[2]
On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box Attacks
[J].
2022 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2022),
2022,
:3819-3828
[3]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[4]
Amplitude-Phase Recombination: Rethinking Robustness of Convolutional Neural Networks in Frequency Domain
[J].
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021),
2021,
:448-457
[5]
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1277-1294
[6]
RayS: A Ray Searching Method for Hard-label Adversarial Attack
[J].
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING,
2020,
:1739-1747
[7]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[8]
Chen YX, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2667
[9]
Cheng M., 2019, P ICLR
[10]
Cheng M., 2020, P ICLR