共 54 条
[1]
Bai Y., 2020, ECCV 2020
[2]
Deep Cauchy Hashing for Hamming Space Retrieval
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:1229-1237
[3]
HashNet: Deep Learning to Hash by Continuation
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV),
2017,
:5609-5618
[4]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[5]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[6]
Chen W., 2020, ECCV
[7]
Deep Supervised Hashing with Anchor Graph
[J].
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019),
2019,
:9795-9803
[8]
Deep Hashing via Discrepancy Minimization
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:6838-6847
[9]
Chua T. -S., 2009, P ACM INT C IM VID R, V1, P9
[10]
Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:7706-7714