暂无分享,去创建一个
Amit K. Roy-Chowdhury | Srikanth V. Krishnamurthy | M. Salman Asif | Mingjun Yin | Shasha Li | Chengyu Song | Zikui Cai | Xinxin Xie | A. Roy-Chowdhury | Chengyu Song | S. Krishnamurthy | Shasha Li | Mingjun Yin | Zikui Cai | Xinxin Xie
[1] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[2] Vincent Charvillat,et al. Context modeling in computer vision: techniques, implications, and applications , 2010, Multimedia Tools and Applications.
[3] Siwei Lyu,et al. Robust Adversarial Perturbation on Deep Proposal-based Models , 2018, BMVC.
[4] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Thomas M. Strat,et al. Context-Based Vision: Recognizing Objects Using Information from Both 2D and 3D Imagery , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[6] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[7] Yuning Jiang,et al. FoveaBox: Beyound Anchor-Based Object Detection , 2019, IEEE Transactions on Image Processing.
[8] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[9] Jun Zhu,et al. Improving Black-box Adversarial Attacks with a Transfer-based Prior , 2019, NeurIPS.
[10] Sanja Fidler,et al. The Role of Context for Object Detection and Semantic Segmentation in the Wild , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[11] Ali Farhadi,et al. YOLOv3: An Incremental Improvement , 2018, ArXiv.
[12] Ohad Ben-Shahar,et al. Exploring the Bounds of the Utility of Context for Object Detection , 2017, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Rongrong Ji,et al. FreeAnchor: Learning to Match Anchors for Visual Object Detection , 2019, NeurIPS.
[14] Sudipta Paul,et al. Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency , 2020, ECCV.
[15] Qi Li,et al. Towards Balanced Learning for Instance Recognition , 2021, International Journal of Computer Vision.
[16] Zhe Chen,et al. Context Refinement for Object Detection , 2018, ECCV.
[17] Alan L. Yuille,et al. Improving Transferability of Adversarial Examples With Input Diversity , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[19] Alan Yuille,et al. Robust Object Detection Under Occlusion With Context-Aware CompositionalNets , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Xiaochun Cao,et al. Transferable Adversarial Attacks for Image and Video Object Detection , 2018, IJCAI.
[21] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[22] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[23] Amit K. Roy-Chowdhury,et al. Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[24] Shuang Yang,et al. QEBA: Query-Efficient Boundary-Based Blackbox Attack , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[26] Bin Li,et al. Deformable DETR: Deformable Transformers for End-to-End Object Detection , 2020, ICLR.
[27] Luc Van Gool,et al. The Pascal Visual Object Classes (VOC) Challenge , 2010, International Journal of Computer Vision.
[28] Xin Liu,et al. DPATCH: An Adversarial Patch Attack on Object Detectors , 2018, SafeAI@AAAI.
[29] Alexei A. Efros,et al. An empirical study of context in object detection , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[30] Andrew Gordon Wilson,et al. Simple Black-box Adversarial Attacks , 2019, ICML.
[31] Tong Zhang,et al. Black-Box Adversarial Attack with Transferable Model-based Embedding , 2020, ICLR.
[32] L. Davis,et al. Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors , 2019, ECCV.
[33] Sanja Fidler,et al. Describing the scene as a whole: Joint object detection, scene classification and semantic segmentation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[34] Kun He,et al. Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks , 2019, ICLR.
[35] Serge J. Belongie,et al. Context based object categorization: A critical survey , 2010, Comput. Vis. Image Underst..
[36] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[37] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[38] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[39] Michael I. Jordan,et al. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[40] Ji Zhang,et al. Relationship Proposal Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[41] Xiaosen Wang,et al. Enhancing the Transferability of Adversarial Attacks through Variance Tuning , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[42] Huajun Feng,et al. Libra R-CNN: Towards Balanced Learning for Object Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[43] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[44] Ross B. Girshick,et al. Focal Loss for Dense Object Detection , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[45] Shiguang Shan,et al. Structure Inference Net: Object Detection Using Scene-Level Context and Instance-Level Relationships , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[46] Cheng Deng,et al. Towards Transferable Targeted Attack , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[47] Wenqi Wei,et al. Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems , 2020, 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
[48] Kavita Bala,et al. Inside-Outside Net: Detecting Objects in Context with Skip Pooling and Recurrent Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[49] Yuhang Zhao,et al. An adversarial attack on DNN-based black-box object detectors , 2020, J. Netw. Comput. Appl..
[50] Houqiang Li,et al. Contextual Adversarial Attacks For Object Detection , 2020, 2020 IEEE International Conference on Multimedia and Expo (ICME).
[51] Nicolas Usunier,et al. End-to-End Object Detection with Transformers , 2020, ECCV.
[52] Antonio Torralba,et al. Contextual Models for Object Detection Using Boosted Random Fields , 2004, NIPS.
[53] Akshayvarun Subramanya,et al. Role of Spatial Context in Adversarial Robustness for Object Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).