Computer Science ›› 2021, Vol. 48 ›› Issue (10): 258-265.doi: 10.11896/jsjkx.200800222
• Information Security • Previous Articles Next Articles
XU Xing, SUN Jia-liang, WANG Zheng, YANG Yang
CLC Number:
[1]FILIP R,AHMET I,GIORGOS T,et al.Revisiting Oxford and Paris:Large-Scale Image Retrieval Benchmarking [C]//IEEE International Conference on Computer Vision and Pattern Re-cognition (CVPR).2018:5706-5715. [2]RADENOVIC F,TOLIAS G,AND O C.Fine-Tuning CNNImage Retrieval with No Human Annotation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2018,41(7):1655-1668. [3]CHRISTIAN S,WOJCIECH Z,ILYA S,et al.Intriguing pro-perties of neural networks[C]//International Conference on Learning Representation.2014. [4]LIU Z R,ZHAO Z Y,MARTHA L.Who's Afraid of Adversa-rial Queries? The Impact of Image Modifications on Content-based Image Retrieval[C]//International Conference on Multimedia Retrieval.2019:578-586. [5]GIORGOS T,FILIP R,ONDREJ C.Targeted Mismatch Adversarial Attack:Query With a Flower to Retrieve the Tower[C]//IEEE/CVF International Conference on Computer Vision.2019:5036-5045. [6]LI J,JI R,LIU H,et al.Universal perturbation attack against image retrieval[C]//Proceedings of the IEEE International Conference on Computer Vision.2019:4899-4908. [7]JOSEF S,ANDREW Z.Video Google:A Text Retrieval Ap-proach to Object Matching in Videos[C]//IEEE International Conference on Computer Vision.2003:1470-1477. [8]JAMES P,ONDREJ C,MICHAEL I,et al.Object retrieval with large vocabularies and fast spatial matching[C]//IEEE International Conference on Computer Vision and Pattern Recognition.2007:1533-1540. [9]ONDREJ C,JAMES P,JOSEF S,et al.Total Recall:Automatic Query Expansion with a Generative Feature Model for Object Retrieval[C]//IEEE International Conference on Computer Vision.2007:1-8. [10]HERVÉ J,MATTHIJS D,CORDELIA S.Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search[C]//European Conference on Computer Vision.2008:304-317. [11]ZHANG S S,ZUO X,LIU J W.The Problem of the Adversarial Examples in Deep Learning[J].Chinese Journal of Computers,2019,42(8):1886-1904. [12]IAN G,JONATHON S,CHRISTIAN S.Explaining and Harnessing Adversarial Examples[C]//International Conference on Learning Representations.2015:1-12. [13]HYEONWOO N,ANDRE A,JACK S,et al.Large-Scale Image Retrieval With Attentive Deep Local Features[C]//The IEEE International Conference on Computer Vision (ICCV).2017:567-575. [14]FROSSARD P,MOSSAVI-DEZFOOLI S M,FAWZI A,et al.DeepFool:A Simple and Accurate Method to Fool Deep Neural Networks[C]//IEEE Conference on Computer Vision and Pattern Recognition,CVPR.2016:2574-2582. [15]NICHOLAS C,DAVID A,WAGNE R.Towards Evaluating the Robustness of Neural Networks[C]//IEEE Symposium on Security and Privacy.2017:1-16. [16]NICOLAS P,PATRICK D,MCDANIEL P,et al.PracticalBlack-Box Attacks against Machine Learning[C]//Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.2017:506-519. [17]CHEN P Y,ZHANG H,YASH S,et al.ZOO:Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models[C]//Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security.2017:15-26. [18]MOOSAVI-DEZFOOLI S M,FAWZI A,FAWII O,et al.Universal Adversarial Perturbations[C]//The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).2017:445-452. [19] ZHENG Z D,ZHENG L,HU Z L,et al.Open Set Adversarial Examples[OL].CoRR abs/1809.02681.https://www.resear-chgate.net/publication/327570780_Open_Set_Adversarial_Examples. [20]HE Y Z,HU X B,HE J W,et al.Privacy and Security Issues in Machine Learning Systems:A Survey[J].Journal of Computer Research and Development,2019,56(10):2049-2070. [21] YUAN X Y,HE P,ZHU Q L,et al.Adversarial Examples:Attacks and Defenses for Deep Learning[J].IEEE Transactions on Neural Networks and Learning Systems,2019,30(9):2805-2824. [22]CHUAN G,MAYANK R,MOUSTAPHA C,et al.CounteringAdversarial Images using Input Transformations[C]//International Conference on Learning Representations.2018:1-12. [23]JAN H M,TIM G,VOLKER F,et al.On Detecting Adversarial Perturbations[C]//International Conference on Learning Representations.2017:1-12. [24]MADRY A,ALEKSANDAR M,LUDWIG S,et al.TowardsDeep Learning Models Resistant to Adversarial Attacks[C]//International Conference on Learning Representations.2018:1-10. [25]GUY K,CLARK W,BARRETT C,et al.Towards Proving the Adversarial Robustness of Deep Neural Networks[C]//Proceedings First Workshop on Formal Verification of Autonomous Vehicles.2017:19-26. [26]KONG R,CAI J C,HUANG G.Defense to Adversarial Attack with Generative Adversarial Network [J/OL].Acta Automatica Sinica.https://doi.org/10.16383/j.aas.c200033. [27]DIEDERIK K,JIMMY B.ADAM:a method for stochastic optimization[C]//International Conference on Learning Representations.2015:1-10. [28]ALEX K,ILYA S,GEOFFREY E H.ImageNet Classification with Deep Convolutional Neural Networks[C]//Neural Information Processing Systems(NIPS).2012:1106-1114. [29]LEONID R,STANLEY O,EMAD F.Nonlinear total variation based noise removal algorithms[J].Physica D:Nonlinear Phenomena,1992,60(1/2/3/4):259-268. [30]ALEXEI A,EFRO S,WILLIAM F.Image quilting for texture synthesis and transfer[C]//Special Interest Group on Computer Graphics and Interactive(SIGGRAPH).2001:341-346. [31]YURI B,OLGA V,RAMIN Z.Fast approximate energy minimization via graph cuts[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2001,23(11):1222-1239. [32]ALI S R,JOSEPHINE S,ATSUTO M,et al.Visual Instance Retrieval with Deep Convolutional Networks[C]//International Conference on Learning Representations.2016:1-10. [33]BABENKO A,LEMPITSKY V.Aggregating Deep Convolu-tional Features for Image Retrieval[C]//International Con-ference on Computer Vision.2015:1246-1254. [34]YANNIS K,CLAYTON M,SIMON O.Cross-DimensionalWeighting for Aggregated Deep Convolutional Features[C]//European Conference on Computer Vision Workshops.2016:685-701. [35]DENG J,WEI D,RICHARD S,et al.Imagenet:a large-scalehierarchical image database[C]//IEEE Conference on Computer Vision and Pattern Recognition.2009:1573-1580. [36]SCHONBERGER L,FILIP R,ONDREJ C,et al.From single image query to detailed 3d reconstruction[C]//Computer Vision and Pattern Recognition.2015:485-492. [37]ATHALYE A,ENGSTROM L,ILYAS A,et al.Synthesizing robust adversarial examples[C]//International Conference on Machine Learning.PMLR,2018:284-293. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[8] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[9] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[10] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[11] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[12] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[13] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[14] | ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383. |
[15] | WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423. |
|