[1] |
HINTON G, DENG L, YU D, et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups[J]. IEEE Signal Processing Magazine, 2012,29(6):82-97.
doi: 10.1109/MSP.2012.2205597
URL
|
[2] |
SUTSKEVER I, VINYALS O, LE Q V. Sequence to Sequence Learning with Neural Networks[EB/OL]. http://de.arxiv.org/pdf/1409.3215, 2020-05-11.
|
[3] |
ACKERMAN E. How Drive.ai is Mastering Autonomous Driving With Deep Learning[EB/OL] https://spectrum.ieee.org/cars-that-think/transportation/self-driving/+how-driveai-is-mastering-autonomous-driving-with-deep-learning, 2020-08-10.
|
[4] |
SZEGEDY C, ZAREMBA W, SUTSKEVER I, et al. Intriguing Properties of Neural Networks[EB/OL]. http://arxiv.org/abs/1312.6199, 2020-08-03.
|
[5] |
GOODFELLOW I J, SHLENS J, SZEGEDY C. Explaining and Harnessing Adversarial Examples[EB/OL]. http://arxiv.org/abs/1412.6572, 2020-08-03.
|
[6] |
PAPERNOT N, MCDANIEL P, GOODFELLOW I, et al. Practical Black-box Attacks against Machine Learning[EB/OL]. http://arxiv.org/abs/1602.02697, 2020-08-05.
|
[7] |
KURAKIN A, GOODFELLOW I, BENGIO S. Adversarial Examples in the Physical World[EB/OL]. http://arxiv.org/abs/1607.02533, 2020-08-03.
|
[8] |
SHARIF M, BHAGAVATULA S, BAUER L, et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-art Face Recognition [C]//ACM. 2016 ACM SIGSAC Conference on Computer and Communications Security, October 24-28, 2016, Vienna, Austria. New York: ACM, 2016: 1528-1540.
|
[9] |
MOOSAVI-DEZFOOLI S M, FAWZI A, FROSSARD P. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks [C]//IEEE. 2016 IEEE Conference on Computer Vision and Pattern Recognition, June 27-30, 2016, Las Vegas, NV, USA. New Jersey: IEEE, 2016: 2574-2582.
|
[10] |
CARLINI N, WAGNER D. Towards Evaluating the Robustness of Neural Networks [C]//IEEE. 2017 IEEE Symposium on Security and Privacy, May 22-26, 2017, San Jose, CA, USA. New Jersey: IEEE, 2017: 39-57.
|
[11] |
CHEN Pinyu, SHARMA Y, ZHANG Huan, et al. EAD: Elastic-net Attacks to Deep Neural Networks via Adversarial Examples[EB/OL]. http://arxiv.org/abs/1709.04114, 2020-08-03.
|
[12] |
ROZSA A, RUDD E M, BOULT T E. Adversarial Diversity and Hard Positive Generation [C]//IEEE. 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, June 26-July 1, 2016, Las Vegas, NV, USA. New Jersey: IEEE, 2016: 410-417.
|
[13] |
ENGSTROM L, TRAN B, TSIPRAS D, et al. Exploring the Landscape of Spatial Robustness[EB/OL]. http://arxiv.org/abs/1712.02779, 2020-08-03.
|