Computer Science ›› 2025, Vol. 52 ›› Issue (10): 374-381.doi: 10.11896/jsjkx.241000030
• Information Security • Previous Articles Next Articles
WANG Liuyi1, ZHOU Chun2, ZENG Wenqiang2, HE Xingxing2, MENG Hua2
CLC Number:
[1]HE K,ZHANG X,REN S,et al.Deep residual learning for image recognition [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778. [2]HUANG G,LIU Z,VAN DER MAATEN L,et al.Densely con-nected convolutional networks [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:4700-4708. [3]WU W,SU Y,LYU M R,et al.Improving the transferability of adversarial samples with adversarial transformations [C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:9024-9033. [4]TAIGMAN Y,YANG M,RANZATO M A,et al.DeepFace:Closing the gap to human-level performance in face verification [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2014:1701-1708. [5]WANG H,WANG Y,ZHOU Z,et al.CosFace:Large margincosine loss for deep face recognition [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:5265-5274. [6]LIU A,LIU X,FAN J,et al.Perceptual-sensitive GAN for gene-rating adversarial patches [C]//Proceedings of the AAAI Conference on Artificial Intelligence.2019:1028-1035. [7]SALLAB A E L,ABDOU M,PEROT E,et al.Deep reinforcement learning framework for autonomous driving [J].Electronic Imaging,2017,29:70-76. [8]AKHTAR N,MIAN A.Threat of adversarial attacks on deep learning in computer vision:A survey [J].IEEE Access,2018,6:14410-14430. [9]COHEN J,ROSENFELD E,KOLTER Z.Certified adversarialrobustness via randomized smoothing [C]//International Conference on Machine Learning.PMLR,2019:1310-1320. [10]MADRY A,MAKELOV A,SCHMIDT L,et al.Towards deep learning models resistant to adversarial attacks [C]//International Conference on Learning Representations.2018. [11]TRAMÈR F,KURAKIN A,PAPERNOT N,et al.Ensembleadversarial training:Attacks and defenses [C]//International Conference on Learning Representations.2018. [12]WONG E,KOLTER Z.Provable defenses against adversarialexamples via the convex outer adversarial polytope [C]//International Conference on Machine Learning.PMLR,2018:5286-5295. [13]SHARIF M,BAUER L,REITER M K.On the suitability of lp-norms for creating and preventing adversarial examples [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern RecognitionWorkshops.2018:1605-1613. [14]LUO B,LIU Y,WEI L,et al.Towards imperceptible and robust adversarial example attacks against neural networks [C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018. [15]AKHTAR N,MIAN A.Threat of adversarial attacks on deep learning in computer vision:A survey [J].IEEE Access,2018,6:14410-14430. [16]GOODFELLOW I J,SHLENS J,SZEGEDY C.Explaining andharnessing adversarial examples[C]// International Conference on Learning Representations(Poster).2015. [17]KURAKIN A,GOODFELLOW I J,BENGIO S.Adversarial examples in the physical world [M]//Artificial Intelligence Safety and Security.Chapman and Hall/CRC,2018:99-112. [18]CARLINI N,WAGNER D.Towards evaluating the robustness of neural networks [C]//2017 IEEE Symposium on Security and Privacy(SP).IEEE,2017:39-57. [19]ZHAO Z,LIU Z,LARSON M.Towards large yet imperceptible adversarial image perturbations with perceptual color distance [C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:1039-1048. [20]LUO M R,CUI G,RIGG B.The development of the CIE 2000 colour-difference formula:CIEDE2000 [J].Color Research & Application,2001,26(5):340-350. [21]LUO C,LIN Q,XIE W,et al.Frequency-driven imperceptibleadversarial attack on semantic similarity [C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:15315-15324. [22]LIU J,LU B,XIONG M,et al.Low frequency sparse adversarial attack[J].Computers & Security,2023,132:103379. [23]ZHANG Y,TAN Y,SUN H,et al.Improving the invisibility of adversarial examples with perceptually adaptive perturbation[J].Information Sciences,2023,635:126-137. [24]LI C,LIU Y,ZHANG X,et al.Exploiting Frequency Characteristics for Boosting the Invisibility of Adversarial Attacks[J].Applied Sciences,2024,14(8):3315. [25]WANG H,WU X,HUANG Z,et al.High-frequency component helps explain the generalization of convolutional neural networks [C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8684-8694. [26]YIN D,GONTIJO LOPES R,SHLENS J,et al.A Fourier perspective on model robustness in computer vision [C]//Procee-dings of the 33rd Conference on Neural Information Processing Systems.2019. [27]SUBRAMANIAN A,SIZIKOVA E,MAJAJ N,et al.Spatial-frequency channels,shape bias,and adversarial robustness [C]//NeurIPS 2023.2023. [28]AHMED N,NATARAJAN T,RAO K R.Discrete cosine transform [J].IEEETransactions on Computers,1974,c-23(1):90-93. [29]RUSSAKOVSKY O,DENG J,SU H,et al.ImageNet large scale visual recognition challenge [J].International Journal of Computer Vision,2015,115:211-252. [30]KRIZHEVSKY A.Learning multiple layers of features from tiny images [D].Toronto:University of Toronto,2009. [31]WANG X,HE K.Enhancing the transferability of adversarialattacks through variance tuning [C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:1924-1933. [32]ZHANG R,ISOLA P,EFROS A A,et al.The unreasonable effectiveness of deep features as a perceptual metric [C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:586-595. [33]XU W,EVANS D,QI Y.Feature squeezing:Detecting adversarial examples in deep neural networks [C]//Proceedings of the 2018 Network and Distributed System Security Symposium.Internet Society.2018. [34]DAS N,SHANBHOGUE M,CHEN S T,et al.Shield:Fast,practical defense and vaccination for deep learning using JPEG compression [C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mi-ning.2018:196-204. [35]SELVARAJU R R,COGSWELL M,DAS A,et al.Grad-CAM:Visual explanations from deep networks via gradient-based localization [J].International Journal of Computer Vision,2020,128:336-359. |
[1] | WANG Yongxin, XU Xin, ZHU Hongbin. Survey of Tabular Data Generation Techniques [J]. Computer Science, 2025, 52(10): 3-12. |
[2] | LI Ao, BAI Xueru, JIANG Jiali, QIAO Ye. Group Cross Adversarial Application in Stock Price Prediction [J]. Computer Science, 2025, 52(10): 22-32. |
[3] | LIU Yuting, GU Jingjing, ZHOU Qiang. Urban Flow Prediction Method Based on Structural Causal Model [J]. Computer Science, 2025, 52(10): 70-78. |
[4] | LEI Ershuai, YU Suping, FAN Hong, XU Wujun. Spatial-Temporal Propagation Graph Neural Network for Traffic Prediction [J]. Computer Science, 2025, 52(10): 90-97. |
[5] | ZHAO Chen, PENG Jian, HUANG Junhao. Spatial-Temporal Joint Mapping for Skeleton-based Action Recognition [J]. Computer Science, 2025, 52(10): 106-114. |
[6] | LI Siqi, YU Kun, CHEN Yuhao. Prediction of Resource Usage on High-performance Computing Platforms Based on ARIMAand LSTM [J]. Computer Science, 2025, 52(9): 178-185. |
[7] | WANG Limei, HAN Linrui, DU Zuwei, ZHENG Ri, SHI Jianzhong, LIU Yiqun. Privacy Policy Compliance Detection Method for Mobile Application Based on Large LanguageModel [J]. Computer Science, 2025, 52(8): 1-16. |
[8] | GUO Husheng, ZHANG Xufei, SUN Yujie, WANG Wenjian. Continuously Evolution Streaming Graph Neural Network [J]. Computer Science, 2025, 52(8): 118-126. |
[9] | YU Shihai, HU Bin. Bio-inspired Neural Network with Visual Invariant Response to Moving Pedestrian [J]. Computer Science, 2025, 52(7): 170-188. |
[10] | LI Bo, MO Xian. Application of Large Language Models in Recommendation System [J]. Computer Science, 2025, 52(6A): 240400097-7. |
[11] | SHI Xincheng, WANG Baohui, YU Litao, DU Hui. Study on Segmentation Algorithm of Lower Limb Bone Anatomical Structure Based on 3D CTImages [J]. Computer Science, 2025, 52(6A): 240500119-9. |
[12] | CHEN Shijia, YE Jianyuan, GONG Xuan, ZENG Kang, NI Pengcheng. Aircraft Landing Gear Safety Pin Detection Algorithm Based on Improved YOlOv5s [J]. Computer Science, 2025, 52(6A): 240400189-7. |
[13] | LIU Bingzhi, CAO Yin, ZHOU Yi. Distillation Method for Text-to-Audio Generation Based on Balanced SNR-aware [J]. Computer Science, 2025, 52(6A): 240900125-5. |
[14] | ZHANG Hang, WEI Shoulin, YIN Jibin. TalentDepth:A Monocular Depth Estimation Model for Complex Weather Scenarios Based onMultiscale Attention Mechanism [J]. Computer Science, 2025, 52(6A): 240900126-7. |
[15] | CHENG Yan, HE Huijuan, CHEN Yanying, YAO Nannan, LIN Guobo. Study on interpretable Shallow Class Activation Mapping Algorithm Based on Spatial Weights andInter Layer Correlation [J]. Computer Science, 2025, 52(6A): 240500140-7. |
|