共 56 条
- [1] Krizhevsky A, Sutskever I, Hinton GE., ImageNet classification with deep convolutional neural networks, Proc. of the 25th Int’l Conf. on Neural Information Processing Systems, pp. 1097-1105, (2012)
- [2] Collobert R, Weston J, Bottou L, Karlen M, Kavukcuoglu K, Kuksa P., Natural language processing (almost) from scratch, The Journal of Machine Learning Research, 12, 12, pp. 2493-2537, (2011)
- [3] Dahl GE, Yu D, Deng L, Acero A., Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition, IEEE Trans. on Audio, Speech, and Language Processing, 20, 1, pp. 30-42, (2012)
- [4] Gu TY, Liu K, Dolan-Gavitt B, Garg S., BadNets: Evaluating backdooring attacks on deep neural networks, IEEE Access, 7, pp. 47230-47244, (2019)
- [5] Liu YF, Ma XJ, Bailey J, Lu F., Reflection backdoor: A natural backdoor attack on deep neural networks, Proc. of the 16th European Conf. on Computer Vision, pp. 182-199, (2020)
- [6] Li YM, Zhai TQ, Jiang Y, Li ZF, Xia ST., Backdoor attack in the physical world, (2021)
- [7] Croce F, Hein M., Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks, Proc. of the 37th Int’l Conf. on Machine Learning. PMLR, pp. 2206-2216, (2020)
- [8] Goodfellow IJ, Shlens J, Szegedy C., Explaining and harnessing adversarial examples, Proc. of the 3rd Int’l Conf. on Learning Representations, (2015)
- [9] Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A., Towards deep learning models resistant to adversarial attacks, Proc. of the 6th Int’l Conf. on Learning Representations, (2018)
- [10] Bai JW, Chen B, Li YM, Wu DX, Guo WW, Xia ST, Yang EH., Targeted attack for deep hashing based retrieval, Proc. of the 16th European Conf. on Computer Vision, pp. 318-364, (2020)