[1] |
HOLI G , JAIN D K . Convolutional neural network approach for extraction and recognition of digits from bank cheque images[M]// Emerging Research in Electronics,Computer Science and Technology. 2019: 331-341.
|
[2] |
FOMIN I S , BAKHSHIEV A V . Research on convolutional neural network for object classification in outdoor video surveillance system[C]// International Conference on Neuroinformatics. 2019: 221-229.
|
[3] |
BUYVAL A , GABDULLIN A , LYUBIMOV M . Road sign detection and localization based on camera and lidar data[C]// Eleventh International Conference on Machine Vision (ICMV 2018). 2019:1104125.
|
[4] |
SZEGEDY C , ZAREMBA W , SUTSKEVER I ,et al. Intriguing properties of neural networks[J]. arXiv preprint arXiv:1312.6199, 2013.
|
[5] |
GOODFELLOW I J , SHLENS J , SZEGEDY C . Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572, 2014.
|
[6] |
MADRY A , MAKELOV A , SCHMIDT L ,et al. Towards deep learning models resistant to adversarial attacks[J]. arXiv preprint arXiv:1706.06083, 2017.
|
[7] |
SENGUPTA S , CHAKRABORTI T , KAMBHAMPATI S . MTDeep:moving target defense to boost the security of deep neural nets against adversarial attacks[M]. Proc GameSec, 2019.
|
[8] |
ZHUANG R , DELOACH S A , OU X . Towards a theory of moving target defense[C]// Proceedings of the First ACM Workshop on Moving Target Defense. 2014: 31-40.
|
[9] |
RUSSAKOVSKY O , DENG J , SU H ,et al. ImageNet large scale visual recognition challenge[J]. International Journal of Computer Vision, 2015,115(3): 211-252.
|
[10] |
DONG Y , LIAO F , PANG T ,et al. Boosting adversarial attacks with momentum[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018: 9185-9193.
|
[11] |
XIE C , ZHANG Z , ZHOU Y ,et al. Improving transferability of adversarial examples with input diversity[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2019: 2730-2739.
|
[12] |
PARUCHURI P , PEARCE J P , TAMBE M ,et al. An efficient heuristic approach for security against multiple adversaries[C]// In AAMAS. 2007.
|
[13] |
PARUCHURI P , PEARCE J P , MARECKI J ,et al. Playing games for security:an efficient exact algorithm for solving Bayesian-Stackelberg games[C]// Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems- Volume 2. 2008: 895-902.
|
[14] |
DENG J , DONG W , SOCHER R ,et al. ImageNet:a large-scale hierarchical image database[C]// IEEE Conference on Computer Vision & Pattern Recognition. IEEE, 2009.
|
[15] |
SZEGEDY C , LIU W , JIA Y ,et al. Going deeper with convolutions[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2015: 1-9.
|
[16] |
SIMONYAN K , ZISSERMAN A . Very deep convolutional networks for large-scale image recognition[J]. arXiv preprint arXiv:1409.1556, 2014.
|
[17] |
HE K , ZHANG X , REN S ,et al. Deep residual learning for image recognition[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016: 770-778.
|