共 20 条
[1]
LI H, HUANG H, CHEN L, Et al., Adversarial examples for CNN- based SAR image classification: an experience study, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 14, pp. 1333-1347, (2020)
[2]
ROY A M, BOSE R, BHADURI J., A fast accurate fine-grain object detection model based on YOLOv4 deep neural network, Neural Computing and Applications, 34, pp. 3895-3921, (2022)
[3]
LI L, MU X, LI S, Et al., A review of face recognition technology, IEEE Access, 8, pp. 139110-139120, (2020)
[4]
GOODFELLOW I J, SHLENS J, SZEGEDY C., Explaining and harnessing adversarial examples, (2014)
[5]
PAPERNOT N, MCDANIEL P, JHA S, Et al., The limitations of deep learning in adversarial settings, Proceedings of the IEEE European Symposium on Security and Privacy, pp. 372-387, (2016)
[6]
ZHENG H, ZHANG Z, GU J, Et al., Efficient adversarial training with transferable adversarial examples, Proceedings of Conference on Computer Vision and Pattern Recognition, pp. 1181-1190, (2020)
[7]
WANG X, HE X, WANG J, Et al., Admix: enhancing the transferability of adversarial attacks, Proceedings of the International Conference on Computer Vision, pp. 16158-16167, (2021)
[8]
DEMONTIS A, MELIS M, PINTOR M, Et al., Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks, Proceedings of the 28th USENIX Security Symposium, pp. 321-338, (2019)
[9]
WANG Z, GUO H, ZHANG Z, Et al., Feature importance-aware transferable adversarial attacks, Proceedings of the International Conference on Computer Vision, pp. 7639-7648, (2021)
[10]
YANG K Y, YAU J H, LI F F, Et al., A study of face obfuscation in imagenet, Proceedings of the 39th International Conference on Machine Learning, pp. 25313-25330, (2022)