共 46 条
[1]
[Anonymous], 2016, Found. Trends Optim., DOI DOI 10.1561/2400000013
[2]
Bhagoji A. N., 2017, arXiv
[3]
Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms
[J].
COMPUTER VISION - ECCV 2018, PT XII,
2018, 11216
:158-174
[4]
Brendel W, 2018, Arxiv, DOI arXiv:1712.04248
[5]
Che ZH, 2020, AAAI CONF ARTIF INTE, V34, P3405
[6]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[7]
Cheng SY, 2019, ADV NEUR IN, V32
[8]
Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
[9]
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[10]
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:4307-4316