[1] |
SZEGEDY C , ZAREMBA W , SUTSKEVER I ,et al. Intriguing properties of neural networks[J]. arXiv Preprint arXiv:13126199, 2013.
|
[2] |
潘文雯, 王新宇, 宋明黎 ,等. 对抗样本生成技术综述[J]. 软件学报, 2020,31(1): 67-81.
|
|
PAN W W , WANG X Y , SONG M L ,et al. Survey on generating adversarial examples[J]. Journal of Software, 2020,31(1): 67-81.
|
[3] |
马钰锡, 张全新, 谭毓安 ,等. 面向智能攻击的行为预测研究[J]. 软件学报, 2020,32(5): 1526-1546.
|
|
MA Y Xi , ZHANG Q X , TAN Y A ,et al. Research on behavior-prediction for intelligent attacks[J]. Journal of Software, 2020,32(5): 1526-1546.
|
[4] |
陈晋音, 沈诗婧, 苏蒙蒙 ,等. 车牌识别系统的黑盒对抗攻击[J]. 自动化学报, 2021,47(1): 121-135.
|
|
CHEN J Y , SHEN S J , SU M M ,et al. Black-box adversarial attack on license plate recognition system[J]. Acta Automatica Sinica, 2021,47(1): 121-135.
|
[5] |
BIGGIO B , CORONA I , MAIORCA D ,et al. Evasion attacks against machine learning at test time[C]// Machine Learning and Knowledge Discovery in Databases:European Conference,ECML PKDD 2013,Prague,Czech Republic, 2013: 387-402.
|
[6] |
GOODFELLOW I J , SHLENS J , SZEGEDY C . Explaining and harnessing adversarial examples[J]. arXiv Preprint arXiv:14126572, 2014.
|
[7] |
MOOSAVI-DEZFOOLI S M , FAWZI A , FROSSARD P . Deepfool:a simple and accurate method to fool deep neural networks[C]// Proceedings of the IEEE conference on computer vision and pattern recognition,Las Vegas,America, 2016: 2574-2582.
|
[8] |
CARLINI N , WAGNER D . Towards evaluating the robustness of neural networks[C]// 2017 ieee symposium on security and privacy (sp),San Jose,CA,USA, 2017: 39-57.
|
[9] |
BROWN T B , MANé D , ROY A ,et al. Adversarial patch[J]. arXiv Preprint arXiv:171209665, 2017.
|
[10] |
EYKHOLT K , EVTIMOV I , FERNANDES E ,et al. Robust physical-world attacks on deep learning visual classification[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018: 1625-1634.
|
[11] |
ATHALYE A , ENGSTROM L , ILYAS A ,et al. Synthesizing robust adversarial examples[C]// International Conference on Machine Learning. 2018: 284-293.
|
[12] |
MOOSAVI-DEZFOOLI S M , FAWZI A , FAWZI O ,et al. Universal adversarial perturbations[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2017: 1765-1773.
|
[13] |
TSAI T , YANG K , HO T Y ,et al. Robust adversarial objects against deep learning models[C]// Proceedings of the AAAI Conference on Artificial Intelligence,Hilton New York Midtown, 2020: 954-962.
|
[14] |
CHEN S T , CORNELIUS C , MARTIN J ,et al. Shapeshifter:Robust physical adversarial attack on faster R-CNN object detector[C]// Machine Learning and Knowledge Discovery in Databases:European Conference,ECML PKDD 2018,Dublin,Ireland, 2018: 52-68.
|
[15] |
REN S , HE K , GIRSHICK R ,et al. Faster R-CNN:Towards real-time object detection with region proposal networks[J]. Advances in Neural Information Processing Systems, 2015,28.
|
[16] |
REDMON J , FARHADI A . YOLO9000:better,faster,stronger[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017: 7263-7271.
|
[17] |
THYS S , VAN R W , GOEDEMé T . Fooling automated surveillance cameras:adversarial patches to attack person detection[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. 2019.
|
[18] |
XU K , ZHANG G , LIU S ,et al. Adversarial t-shirt! evading person detectors in a physical world[C]// Computer Vision–ECCV 2020:16th European Conference. 2020: 665-681.
|
[19] |
KAZIAKHMEDOV E , KIREEV K , MELNIKOV G ,et al. Real-world attack on MTCNN face detection system[C]// 2019 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON). 2019: 422-427.
|
[20] |
HUANG L , GAO C , ZHOU Y ,et al. Universal physical camouflage attacks on object detectors[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020: 720-729.
|
[21] |
ZHU X , LI X , LI J ,et al. Fooling thermal infrared pedestrian detectors in real world using small bulbs[C]// Proceedings of the AAAI Conference on Artificial Intelligence. 2021: 3616-3624.
|
[22] |
HU Y C T , KUNG B H , TAN D S ,et al. Naturalistic physical adversarial patch for object detectors[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision. 2021: 7848-7857.
|
[23] |
HU Z , HUANG S , ZHU X ,et al. Adversarial texture for fooling person detectors in the physical world[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition,New Orleans Ernest N. 2022: 13307-13316.
|
[24] |
WANG J , LIU A , YIN Z ,et al. Dual attention suppression attack:Generate adversarial camouflage in physical world[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2021: 8565-8574.
|
[25] |
DU A , CHEN B , CHIN T J ,et al. Physical adversarial attacks on an aerial imagery object detector[C]// Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision,New Orleans Ernest N. 2022: 1796-1806.
|
[26] |
WANG D , JIANG T , SUN J ,et al. Fca:Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack[C]// Proceedings of the AAAI Conference on Artificial Intelligence. , 2022: 2414-2422.
|
[27] |
REDMON J , FARHADI A . Yolov3:An incremental improvement[J]. arXiv Preprint arXiv:180402767, 2018.
|
[28] |
SURYANTO N , KIM Y , KANG H ,et al. Dta:Physical camouflage attacks using differentiable transformation network[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022: 15305-15314.
|
[29] |
BOCHKOVSKIY A , WANG C Y , LIAO H Y M . Yolov4:Optimal speed and accuracy of object detection[J]. arXiv Preprint arXiv:200410934, 2020.
|
[30] |
PURKAIT P , ZHAO C , ZACH C . SPP-Net:Deep absolute pose regression with synthetic views[J]. arXiv Preprint arXiv:171203452, 2017.
|
[31] |
LIU S , QI L , QIN H ,et al. Path aggregation network for instance segmentation[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018: 8759-8768.
|
[32] |
PARISI R , DI CLAUDIO E D , LUCARELLI G ,et al. Car plate recognition by neural networks and image processing[C]// 1998 IEEE International Symposium on Circuits and Systems (ISCAS). 1998: 195-198.
|
[33] |
QIAN Y , MA D , WANG B ,et al. Spot evasion attacks:Adversarial examples for license plate recognition systems with convolutional neural networks[J]. Computers & Security, 2020,95:101826.
|
[34] |
KWON H , BAEK J W . Adv-plate attack:adversarially perturbed plate for license plate recognition system[J]. Journal of Sensors, 2021,2021: 1-10.
|
[35] |
WANG C Y , LIAO H Y M , WU Y H ,et al. CSPNet:A new backbone that can enhance learning capability of CNN[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops: 390-391.
|