共 21 条
[1]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[2]
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:4307-4316
[3]
Boosting Adversarial Attacks with Momentum
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:9185-9193
[4]
Goodfellow R, 2015, OIL AND GAS PIPELINES: INTEGRITY AND SAFETY HANDBOOK, P3
[5]
He K., P IEEE C COMP VIS PA, P770, DOI [10.1007/978-3-319-46493-0_38, DOI 10.1007/978-3-319-46493-0_38]
[6]
Identity Mappings in Deep Residual Networks
[J].
COMPUTER VISION - ECCV 2016, PT IV,
2016, 9908
:630-645
[7]
Kurakin A., 2018, Artificial Intelligence Safety and Security, P99, DOI [10.1201/9781351251389, DOI 10.1201/9781351251389]
[8]
Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:1778-1787
[9]
Lin Jiadong, 2020, 8 INT C LEARN REPR
[10]
Liu Y., 2017, 5 INT C LEARN REPR I