Imperceptible Adversarial Examples by Spatial Chroma-Shift
暂无分享,去创建一个
Alptekin Temizel | Ayberk Aydin | Deniz Sen | Berat Tuna Karli | Oguz Hanoglu | Deniz Sen | A. Temi̇zel | Ayberk Aydin | Oguz Hanoglu | A. Aydin
[1] Eero P. Simoncelli,et al. Image Quality Assessment: Unifying Structure and Texture Similarity , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[4] Shiqi Wang,et al. Comparison of Full-Reference Image Quality Models for Optimization of Image Processing Systems , 2021, International Journal of Computer Vision.
[5] Nicola Pezzotti,et al. Differentiable Image Parameterizations , 2018, Distill.
[6] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[7] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Jitendra Malik,et al. View Synthesis by Appearance Flow , 2016, ECCV.
[9] James M. Kasson,et al. An analysis of selected computer interchange color spaces , 1992, TOGS.
[10] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[11] Lujo Bauer,et al. On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[12] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[13] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] M. Luo,et al. The development of the CIE 2000 Colour Difference Formula , 2001 .
[15] Mingyan Liu,et al. Spatially Transformed Adversarial Examples , 2018, ICLR.
[16] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Alptekin Temizel,et al. Attack Type Agnostic Perceptual Enhancement of Adversarial Images , 2019, ArXiv.
[18] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[19] W. Brendel,et al. Foolbox: A Python toolbox to benchmark the robustness of machine learning models , 2017 .
[20] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[21] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[22] Soheil Feizi,et al. Functional Adversarial Attacks , 2019, NeurIPS.
[23] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[24] Bo Li,et al. Big but Imperceptible Adversarial Perturbations via Semantic Manipulation , 2019, ArXiv.
[25] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[26] Alexandros G. Dimakis,et al. Quantifying Perceptual Distortion of Adversarial Examples , 2019, ArXiv.
[27] He Zhao,et al. Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions , 2019, ArXiv.
[28] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[29] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[30] Wei Liu,et al. Adversarial Perturbations Prevail in the Y-Channel of the YCbCr Color Space , 2020, ArXiv.
[31] Martha Larson,et al. Towards Large Yet Imperceptible Adversarial Image Perturbations With Perceptual Color Distance , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Aleksander Madry,et al. A Rotation and a Translation Suffice: Fooling CNNs with Simple Transformations , 2017, ArXiv.
[33] Terrance E. Boult,et al. Adversarial Diversity and Hard Positive Generation , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[34] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[35] Radha Poovendran,et al. Semantic Adversarial Examples , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[36] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[37] Andrea Cavallaro,et al. ColorFool: Semantic Adversarial Colorization , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Giovanni S. Alberti,et al. ADef: an Iterative Algorithm to Construct Adversarial Deformations , 2018, ICLR.
[39] Sabine Süsstrunk,et al. Measuring colorfulness in natural images , 2003, IS&T/SPIE Electronic Imaging.
[40] Chong Wang,et al. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin , 2015, ICML.
[41] Keith Jack,et al. Video Demystified: A Handbook for the Digital Engineer , 1993 .
[42] Alexei A. Efros,et al. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.