FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
暂无分享,去创建一个
Shouling Ji | Jinyin Chen | Haibin Zheng | Ruoxi Chen | Hui Xiong | Tianyu Du | Zhen Hong | S. Ji | Jinyin Chen | Haibin Zheng | Tianyu Du | Ruoxi Chen | Hui Xiong | Zhen Hong
[1] Chunming Wu,et al. Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study , 2019, IEEE Transactions on Dependable and Secure Computing.
[2] Jinyin Chen,et al. MAG-GAN: Massive attack generator via GAN , 2020, Inf. Sci..
[3] Jinyin Chen,et al. RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours , 2020, Comput. Secur..
[4] Jinyin Chen,et al. DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection , 2019, Science China Information Sciences.
[5] Dacheng Tao,et al. Perceptual-Sensitive GAN for Generating Adversarial Patches , 2019, AAAI.
[6] Hui Xiong,et al. POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm , 2019, Comput. Secur..
[7] Ting Wang,et al. DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[8] Han Zhang,et al. Self-Attention Generative Adversarial Networks , 2018, ICML.
[9] Yao Zhao,et al. Secure Detection of Image Manipulation by Means of Random Feature Selection , 2018, IEEE Transactions on Information Forensics and Security.
[10] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[11] Yongdong Zhang,et al. APE-GAN: Adversarial Perturbation Elimination with GAN , 2017, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Shin Ishii,et al. Virtual Adversarial Training: A Regularization Method for Supervised and Semi-Supervised Learning , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Ki-Woong Park,et al. Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier , 2018, Comput. Secur..
[14] U. Raghavendra,et al. A deep learning approach for Parkinson’s disease diagnosis from EEG signals , 2018, Neural Computing and Applications.
[15] Alan R. Dennis,et al. Security on Autopilot: Why Current Security Theories Hijack our Thinking and Lead Us Astray , 2018, DATB.
[16] Jiansheng Chen,et al. Rethinking Feature Distribution for Loss Functions in Image Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[17] Li Chen,et al. SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression , 2018, KDD.
[18] Colin Raffel,et al. Thermometer Encoding: One Hot Way To Resist Adversarial Examples , 2018, ICLR.
[19] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[20] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[21] Matthias Bethge,et al. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models , 2017, ICLR.
[22] Xiaolin Hu,et al. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[23] Andrew Slavin Ross,et al. Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing their Input Gradients , 2017, AAAI.
[24] Jian Liu,et al. Defense Against Universal Adversarial Perturbations , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[25] Quoc V. Le,et al. Intriguing Properties of Adversarial Examples , 2017, ICLR.
[26] Chang Zhou,et al. ATRank: An Attention-Based User Behavior Modeling Framework for Recommendation , 2017, AAAI.
[27] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[28] Erik Cambria,et al. Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..
[29] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[30] Jun Zhu,et al. Towards Robust Detection of Adversarial Examples , 2017, NeurIPS.
[31] Daniel Cullina,et al. Enhancing robustness of machine learning systems via data transformations , 2017, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[32] Terrance E. Boult,et al. Towards Robust Deep Neural Networks with BANG , 2016, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).
[33] Moustapha Cissé,et al. Countering Adversarial Images using Input Transformations , 2018, ICLR.
[34] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[35] Ya Wang,et al. Face recognition in real-world surveillance videos with deep learning method , 2017, 2017 2nd International Conference on Image, Vision and Computing (ICIVC).
[36] Hao Chen,et al. MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.
[37] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[38] Xiaogang Wang,et al. Residual Attention Network for Image Classification , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[39] Beilun Wang,et al. DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples , 2017, ICLR.
[40] Sandy H. Huang,et al. Adversarial Attacks on Neural Network Policies , 2017, ICLR.
[41] Tat-Seng Chua,et al. SCA-CNN: Spatial and Channel-Wise Attention in Convolutional Networks for Image Captioning , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[42] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[43] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[44] Abhishek Das,et al. Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[45] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[46] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[47] Andrew M. Dai,et al. Adversarial Training Methods for Semi-Supervised Text Classification , 2016, ICLR.
[48] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[49] Facebook,et al. Houdini : Fooling Deep Structured Visual and Speech Recognition Models with Adversarial Examples , 2017 .
[50] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[51] Diyi Yang,et al. Hierarchical Attention Networks for Document Classification , 2016, NAACL.
[52] Yang Song,et al. Improving the Robustness of Deep Neural Networks via Stability Training , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[53] Jian Sun,et al. Identity Mappings in Deep Residual Networks , 2016, ECCV.
[54] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[55] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[56] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[57] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[58] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[59] Alexander J. Smola,et al. Stacked Attention Networks for Image Question Answering , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[60] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[61] Yoshua Bengio,et al. Show, Attend and Tell: Neural Image Caption Generation with Visual Attention , 2015, ICML.
[62] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[63] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[64] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[65] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[66] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[67] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[68] Lawrence D. Jackel,et al. Backpropagation Applied to Handwritten Zip Code Recognition , 1989, Neural Computation.