暂无分享,去创建一个
Xiaopei Zhu | Xiao Li | Jianmin Li | Zheyao Wang | Xiaolin Hu | Jianmin Li | Xiaolin Hu | Zheyao Wang | Xiao Li | Xiaopei Zhu
[1] Dacheng Tao,et al. Perceptual-Sensitive GAN for Generating Adversarial Patches , 2019, AAAI.
[2] Xiaolin Hu,et al. End-to-end face parsing via interlinked convolutional neural networks , 2020, Cognitive Neurodynamics.
[3] Chunxi Zhang,et al. Infrared Pedestrian Detection with Converted Temperature Map , 2019, 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[4] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[5] Mingyan Liu,et al. Generating Adversarial Examples with Adversarial Networks , 2018, IJCAI.
[6] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[7] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[8] Fei-Fei Li,et al. Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[9] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[10] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[11] Ali Farhadi,et al. YOLO9000: Better, Faster, Stronger , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Ross B. Girshick,et al. Focal Loss for Dense Object Detection , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Xiaofeng Wang,et al. Invisible Mask: Practical Attacks on Face Recognition with Infrared , 2018, ArXiv.
[14] Ali Farhadi,et al. YOLOv3: An Incremental Improvement , 2018, ArXiv.
[15] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[16] Peyman Milanfar,et al. Linear Support Tensor Machine With LSK Channels: Pedestrian Detection in Thermal Infrared Images , 2016, IEEE Transactions on Image Processing.
[17] Toon Goedemé,et al. Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[18] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[19] Miran Pobar,et al. Thermal Object Detection in Difficult Weather Conditions Using YOLO , 2020, IEEE Access.
[20] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[22] Quanfu Fan,et al. Evading Real-Time Person Detectors by Adversarial T-shirt , 2019, ArXiv.
[23] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[24] Nuno Vasconcelos,et al. Cascade R-CNN: Delving Into High Quality Object Detection , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[25] Lili Dong,et al. An Infrared Small Target Detection Algorithm Based on Peak Aggregation and Gaussian Discrimination , 2020, IEEE Access.
[26] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.