|
[1]
|
Krizhevsky, A., Sutskever, I. and Hinton, G. (2012) ImageNet Classification with Deep Convolutional Neural Networks. 26th Annual Conference on Neural Information Processing Systems 2012, Lake Tahoe, 3-6 December 2012, 110-117.
|
|
[2]
|
陈晓楠, 胡建敏, 张本俊, 等. 基于模型间迁移性的黑盒对抗攻击起点提升方法[J]. 计算机工程, 2021, 47(8): 162-169.
|
|
[3]
|
Madry, A., Makelov, A., Schmidt, L., Tsipras, D. and Vladu, A. (2017) Towards Deep Learning Models Resistant to Adversarial Attacks.
|
|
[4]
|
Goodfellow, I.J., Shlens, J. and Szegedy, C. (2018) Explaining and Harnessing Adversarial Examples.
https://arxiv.org/abs/1412.6572
|
|
[5]
|
Kurakin, A., Goodfellow, I. and Bengio, S. (2017) Adversarial Examples in the Physical World.
https://arxiv.org/abs/1607.02533v4
|
|
[6]
|
Dong, Y.P., Liao, F.Z., et al. (2018) Boosting Adversarial Attacks with Momentum. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 9185-9193. [Google Scholar] [CrossRef]
|
|
[7]
|
Liu, Y.P., Chen, X.Y., Liu, C. and Song, D. (2021) Delving into Transferable Adversarial Examples and Black-Box Attacks. https://arxiv.org/abs/1611.02770
|
|
[8]
|
Carlini, N. and Wagner, D. (2017) Towards Evaluating the Robustness of Neural Networks. 2017 IEEE Symposium on Security and Privacy (SP), San Jose, 22-26 May 2017, 39-57. [Google Scholar] [CrossRef]
|
|
[9]
|
Wang, X.S., He, X.R., Wang, J.D., et al. (2021) Admix: Enhancing the Transferability of Adversarial Attacks.
http://arxiv.org/abs/2102.00436V3
|
|
[10]
|
Tramer, F., Kurakin, A., Papernot, N., et al. (2020) Ensemble Adversarial Training: Attacks and Defenses.
https://arxiv.org/abs/1705.07204v5
|
|
[11]
|
Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I. and Fergus, R. (2014) Intriguing Properties of Neural Networks. International Conference on Learning Representations.
|
|
[12]
|
Wang, G., Yan, H., Guo, Y., et al. (2021) Improving Adversarial Transferability with Gradient Refining. Computer Vision and Pattern Recognition.
|
|
[13]
|
Guo, C., Rana, M., Cisse, M., et al. (2018) Countering Adversarial Images Using Input Transformations.
https://arxiv.org/abs/1711.00117v3
|
|
[14]
|
Xie, C., Wang, J., Zhang, Z., et al. (2017) Mitigating Adversarial Effects through Randomization. ICLR 2018 Conference Track. 6th International Conference on Learning Representations, Vancouver, 30 April-3 May 2018, 1-16.
|
|
[15]
|
Prakash, A., Moran, N., Garber, S., et al. (2018) Deflecting Adversarial Attacks with Pixel Deflection. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 8571-8580. [Google Scholar] [CrossRef]
|
|
[16]
|
杨博, 张恒巍, 李哲铭, 等. 基于图像翻转变换的对抗样本生成算法[J]. 计算机应用, 2022, 42(8): 2319-2325.
|
|
[17]
|
Szegedy, C., Vanhoucke, V., Loffe, S., et al. (2016) Rethinking the Inception Architecture for Computer Vision. Proceedings of 2016 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Las Vegas, 27-30 June 2016, 2818-2826. [Google Scholar] [CrossRef]
|
|
[18]
|
Szegedy, C., Loffe, S., Vanhoucke, V., et al. (2017) Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning. Proceedings of the AAAI Conference on Artificial Intelligence, 31, 4278-4284. [Google Scholar] [CrossRef]
|
|
[19]
|
He, K.M., Zhang, X.Y., Ren, S.Q., et al. (2016) Identity Mappings in Deep Residual Networks. Proceedings of the 2016 European Conference on Computer Vision, Amsterdam, 11-14 October 2016, 630-645. [Google Scholar] [CrossRef]
|