Adversarial T-Shirt! Evading Person Detectors in a Physical World
暂无分享,去创建一个
Pin-Yu Chen | Quanfu Fan | Yanzhi Wang | Sijia Liu | Hongge Chen | Xue Lin | Kaidi Xu | Gaoyuan Zhang | Mengshu Sun | Mengshu Sun
[1] Fred L. Bookstein,et al. Principal Warps: Thin-Plate Splines and the Decomposition of Deformations , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Zhengyou Zhang,et al. A Flexible New Technique for Camera Calibration , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Anand Rangarajan,et al. Non-rigid point matching: algorithms, extensions and applications , 2001 .
[4] Serge J. Belongie,et al. Approximate Thin Plate Spline Mappings , 2002, ECCV.
[5] Andreas Geiger,et al. Automatic camera and range sensor calibration using a single shot , 2012, 2012 IEEE International Conference on Robotics and Automation.
[6] Martin J. Wainwright,et al. Randomized Smoothing for Stochastic Optimization , 2011, SIAM J. Optim..
[7] Trevor Darrell,et al. Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[9] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[11] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[12] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[13] Andrew Zisserman,et al. Spatial Transformer Networks , 2015, NIPS.
[14] Wei Liu,et al. SSD: Single Shot MultiBox Detector , 2015, ECCV.
[15] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[16] Atul Prakash,et al. Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.
[17] Ali Farhadi,et al. YOLO9000: Better, Faster, Stronger , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Jiajun Lu,et al. Adversarial Examples that Fool Detectors , 2017, ArXiv.
[19] Dawn Song,et al. Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.
[20] Prateek Mittal,et al. Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos , 2018, ArXiv.
[21] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[22] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[23] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[24] Dawn Song,et al. Physical Adversarial Examples for Object Detectors , 2018, WOOT @ USENIX Security Symposium.
[25] Duen Horng Chau,et al. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector , 2018, ECML/PKDD.
[26] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[27] M. Fardad,et al. Towards A Unified Min-Max Framework for Adversarial Exploration and Robustness , 2019 .
[28] Chuang Gan,et al. Interpreting Adversarial Examples by Activation Promotion and Suppression , 2019, ArXiv.
[29] Hassan Foroosh,et al. CAMOU: Learning Physical Vehicle Camouflages to Adversarially Attack Detectors in the Wild , 2018, ICLR.
[30] Sijia Liu,et al. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective , 2019, IJCAI.
[31] Luyu Wang,et al. On the Sensitivity of Adversarial Robustness to Input Data Distributions , 2018, ICLR.
[32] Toon Goedemé,et al. Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[33] Deniz Erdogmus,et al. Structured Adversarial Attack: Towards General Implementation and Better Interpretability , 2018, ICLR.
[34] Ruigang Yang,et al. Adversarial Objects Against LiDAR-Based Autonomous Driving Systems , 2019, ArXiv.
[35] Chun-Liang Li,et al. Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer , 2018, ICLR.
[36] Yanzhi Wang,et al. ADMM attack: an enhanced adversarial attack for deep neural networks with undetectable distortions , 2019, ASP-DAC.
[37] J. Zico Kolter,et al. Adversarial camera stickers: A physical camera-based attack on deep learning systems , 2019, ICML.
[38] Song Han,et al. Defensive Quantization: When Efficiency Meets Robustness , 2019, ICLR.
[39] Bo Li,et al. Beyond Adversarial Training: Min-Max Optimization in Adversarial Attack and Defense , 2019, ArXiv.
[40] James Bailey,et al. Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).