共 20 条
[1]
Alzantot M., 2018, NIPS 2017 Machine Deception Workshop
[2]
On the Robustness of Semantic Segmentation Models to Adversarial Attacks
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:888-897
[3]
Biggio B., 2013, Lecture Notes in Comput Sci, DOI [10.1007/978-3-642-40994-325, DOI 10.1007/978-3-642-40994-325, DOI 10.1007/978-3-642-40994-3_25]
[4]
Carlini M, 2018, UPDATES SURG SER, P1, DOI 10.1007/978-88-470-3955-1
[5]
Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
[6]
Chow B, 2017, PERFORMANCE AND PROFESSIONAL WRESTLING, P1
[7]
Dalvi N.N., 2004, P 10 ACM SIGKDD INT, P99, DOI [10.1145/ 1014052.1014066, 10.1145/1014052.1014066, DOI 10.1145/1014052.1014066]
[8]
Goodfellow Ian J., 2015, 3 INT C LEARN REPR I