최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.6, 2023년, pp.907 - 917
Recently, a self-driving car have applied deep learning technology to advanced driver assistance system can provide convenience to drivers, but it is shown deep that learning technology is vulnerable to adversarial evasion attacks. In this paper, we performed five adversarial evasion attacks, includ...
I. Goodfellow, J. Shlens and C.?Szegedy, "Explaining and Harnessing?Adversarial Examples," In International Conference on Learning?Representations(ICLR'15), pp. 7-9,?Mar. 2015.
N. Akhtar and A. Mian, "Threat of?adversarial attacks on deep learning in computer vision: A survey," IEEE Access, Vol. 6, pp. 14410-14430, Feb.2018.
N. Carlini and D. Wagner. "Towards evaluating the robustness of neural?networks," IEEE Symposium on Security and Privacy(SP'17), pp. 39-57, Jun. 2017.
W. Zhao, S. Alwidian and Q.H. Mahmoud, "Adversarial Training Methods for Deep Learning: A Systematic Review," Journal of?Algorithms, Vol. 15, Issue 8(283), Aug. 2022.
N. Papernot, P. McDaniel, X. Wu, S. Jha and A. Swami, "Distillation as a defense to adversarial perturbations against deep neural networks," IEEE Symposium on Security and Privacy(SP'16), pp. 582-597, Aug. 2016.
S. Zheng, Y. Song, T. Leung and I. Goodfellow, "Improving the robustness of deep neural networks via stability training," IEEE Conference on Computer Vision and Pattern Recognition(CVPR'16), pp. 4480-4488,2016
W. Xu, D. Evans, and Y. Qi, "Feature squeezing: Detecting adversarial examples in deep neural networks,"?Network and Distributed System Security Symposium(NDSS'18), pp.1-15, Feb. 2018.
Y. Lee and Y. Kim, "Comparison of?CNN and YOLO for Object Detection, "Journal of the semiconductor &display technology, Vol. 19. No. 1, pp.85-92, Mar. 2020.
J. Redmon, S. Divvala, R. Cirshick and A. Farhadi, "You only look once: Unified, real-time object detection," IEEE Conference on Computer Vision?and Pattern Recognition(CVPR'16),?pp. 779-788, 2016.
Y. Zhang, Z. Guo, J. Wu, Y. Tian H.?Tang and X. Guo, "Real-Time Vehicle?Detection Based on Improved?YOLOv5," J. of Sustainability, Vol.?14, Issue 19, pp. 1-19, Sep. 2022
T. Mostafam, J. Chowdhury, K.?Rhaman and R. Alam. "Occluded?Object Detection for Autonomous?Vehicles Employing YOLOv5, YOLOX?and Faster R-CNN," Proceedings of?the IEEE conference on Information?Technology,Electronics and Mobile?Communication Conference, pp.?0405-0410, Oct. 2022
Y. Dong, F. Liao, T. Pang and H. su,?J. Zhu, X. Hu and J. Li, "Boosting?adversarial attacks with momentum,"?Proceedings of the IEEE conference?on computer vision and pattern?recognition. pp. 9185-9193, Jun. 2018.
A. Madry, A. Makelov, L. Schmidt, D.?Tsipras, and A. Vladu, "Towards deep?learning models resistant to?adversarial attacks," In International?Conference on Learning?Representations(ICLR'18), 2018.
S. Moosavi-Dezfooli, A. Fawzi, and P.?Frossard. "Deepfool: a simple and?accurate method to fool deep neural?networks," IEEE Conference on?Computer Vision and Pattern?Recognition(CVPR'16), pp. 2574-2582,?Jun. 2016
X. Liu, Y. LI, C. Wu and C.J. Hsieh,?"ADV-BNN:Improved adversarial?defense through robust Bayesian?neural network," In International?Conference on Learning?Representations(ICLR'19), pp. 1-13,?May. 2019.
A. Athalye, N. Carilni and D. Wagner, "Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples, "Proceedings of the 35th International?Conference on Machine Learning(ICML'18), pp. 274-283, 2018.
Akhtar, Naveed, and M. Ajmal. "Threat of adversarial attacks on deep learning in computer vision,"?Proceedings of the IEEE conference, Vol. 6, pp. 14410-14430, Feb. 2018
P. Samangouei, M. Kabcab and R. Chellappa, "Defense-gan:Protecting classifiers against adversarial attacksusing generative models," Proceedings of ICLR, pp. 1-17, May. 2018.
M. Dongyu and C. Hao. "Magnet:two-pronged defense against adversarial?examples," Proceedings of the ACMSIGSAC, pp. 135-147, Oct. 2017.
A.N. Evans and X.U. Liu, "A morphological gradient approach tocolor edge detection," IEEE Trans. on Image Processing, Vol. 15, No. 6, pp.1454-1463, May. 2006.
T.U. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollar, and C.L. Zitnick, "Microsoft coco: Common objects in context," In European Conference on Computer Vision, Vol. 8693, pp. 740-755, Sep.2014.
J. Choi and A. Tian, "Adversarial?attack and defense of YOLO detectors in autonomous driving scenarios, "IEEE Intelligent Vehicles Symposium(IV), pp. 1011-1017, Jul. 2022.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.