暂无分享,去创建一个
[1] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[3] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[4] Luiz Eduardo Soares de Oliveira,et al. Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[6] Gordon Wetzstein,et al. The Visual Computing of Projector‐Camera Systems , 2008, SIGGRAPH '08.
[7] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[8] M. Luo,et al. The development of the CIE 2000 Colour Difference Formula , 2001 .
[9] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[10] Tom Goldstein,et al. Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors , 2020, ECCV.
[11] Hao Yang,et al. Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[12] Ramesh Raskar,et al. Fast separation of direct and global components of a scene using high frequency illumination , 2006, SIGGRAPH 2006.
[13] Gang Wang,et al. Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks , 2019, AAAI.
[14] Jan Kautz,et al. Loss Functions for Image Restoration With Neural Networks , 2017, IEEE Transactions on Computational Imaging.
[15] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[16] Xiaofeng Wang,et al. Invisible Mask: Practical Attacks on Face Recognition with Infrared , 2018, ArXiv.
[17] J. Zico Kolter,et al. Adversarial camera stickers: A physical camera-based attack on deep learning systems , 2019, ICML.
[18] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Yang Liu,et al. Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems , 2020, ArXiv.
[20] Nicole Nichols,et al. Projecting Trouble: Light based Adversarial Attacks on Deep Learning Classifiers , 2018, AAAI Fall Symposium: ALEC.
[21] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[22] James Bailey,et al. Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Xiaojiang Du,et al. VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World , 2019, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[24] Chenxi Liu,et al. Adversarial Attacks Beyond the Image Space , 2017, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Sijia Liu,et al. On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[26] Rainer Storn,et al. Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..
[27] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[28] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[29] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[30] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[31] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[32] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[33] Martha Larson,et al. Towards Large Yet Imperceptible Adversarial Image Perturbations With Perceptual Color Distance , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Anselm Grundhöfer,et al. Robust, Error-Tolerant Photometric Projector Compensation , 2015, IEEE Transactions on Image Processing.
[35] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[36] Andrew Zisserman,et al. Spatial Transformer Networks , 2015, NIPS.
[37] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[38] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[39] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[40] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[41] Bingyao Huang,et al. CompenNet++: End-to-End Full Projector Compensation , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[42] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).