Author:
Xiang Yuexin,Li Tiantian,Ren Wei,He Jie,Zhu Tianqing,Choo Kim-Kwang Raymond
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference48 articles.
1. Intriguing properties of neural networks;Szegedy,2013
2. Explaining and harnessing adversarial examples;Goodfellow,2014
3. Moosavi-Dezfooli S-M, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016, p. 2574–82.
4. Maximal jacobian-based saliency map attack;Wiyatno,2018
5. Simple black-box adversarial perturbations for deep networks;Narodytska,2016