Adversarial Examples Generation System Based on Gradient Shielding of Restricted Region
暂无分享,去创建一个
Zhaoquan Gu | Le Wang | Keke Tang | Weixiong Hu | Chuanjing Zhang | Zhaoquan Gu | Le Wang | Weixiong Hu | Chuanjing Zhang | Keke Tang
[1] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Slav Petrov,et al. Globally Normalized Transition-Based Neural Networks , 2016, ACL.
[3] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[4] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[5] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[6] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[9] Dejing Dou,et al. HotFlip: White-Box Adversarial Examples for Text Classification , 2017, ACL.
[10] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[11] Shen Su,et al. Dependency-Based Local Attention Approach To Neural Machine Translation , 2019 .
[12] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[13] Baoyu Ma,et al. A Novel Scene Text Recognition Method Based on Deep Learning , 2019 .
[14] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Feng Xu,et al. Investigation on the Chinese Text Sentiment Analysis Based on Convolutional Neural Networks in Deep Learning , 2019 .
[16] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[17] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[18] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[19] Alex Graves,et al. Recurrent Models of Visual Attention , 2014, NIPS.
[20] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[22] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).