최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國軍事科學技術學會誌 = Journal of the KIMST, v.26 no.1, 2023년, pp.44 - 53
김정훈 (국방과학연구소 국방첨단과학기술연구원) , 양훈민 (국방과학연구소 국방첨단과학기술연구원) , 오세윤 (국방과학연구소 국방첨단과학기술연구원)
Adversarial attacks have received great attentions for their capacity to distract state-of-the-art neural networks by modifying objects in physical domain. Patch-based attack especially have got much attention for its optimization effectiveness and feasible adaptation to any objects to attack neural...
Rey Reza Wiyatno et al., "Adversarial Examples in?Modern Machine Learning: A Review," arXiv?preprint arXiv:1911.05268, 2019.
Eykholt, Kevin, et al., "Robust Physical-World?Attacks on Deep Learning Visual Classification,"?Proceedings of the IEEE Conference on Computer?Vision and Pattern Recognition, 2018.
Den Hollander, Richard, et al., "Adversarial Patch?Camouflage Against Aerial Detection," Artificial?Intelligence and Machine Learning in Defense?Applications II, Vol. 11543, International Society for?Optics and Photonics, 2020.
Zhang, Yang, et al., "CAMOU: Learning Physical?Vehicle Camouflages to Adversarially Attack?Detectors in the Wild," International Conference on?Learning Representations, 2018.
Wu, Tong, et al., "Physical Adversarial Attack on Vehicle Detector in the Carla Simulator," arXiv?preprint arXiv:2007.16118, 2020.
Duan, Ranjie, et al., "Adversarial Laser Beam:?Effective Physical-World Attack to DNNs in a?Blink," Proceedings of the IEEE/CVF Conference?on Computer Vision and Pattern Recognition, 2021.
Lovisotto, Giulio, et al., "SLAP: Improving Physical?Adversarial Examples with {Short-Lived} Adversarial?Perturbations," 30th USENIX Security Symposium?(USENIX Security 21). 2021.
Sayles, Athena, et al., "Invisible Perturbations:?Physical Adversarial Examples Exploiting the Rolling?Shutter Effect," Proceedings of the IEEE/CVF?Conference on Computer Vision and Pattern?Recognition, 2021.
Tu, James, et al., "Physically Realizable Adversarial?Examples for Lidar Object Detection," Proceedings?of the IEEE/CVF Conference on Computer Vision?and Pattern Recognition. 2020.
Mariani, Giorgio, et al., "Generating Adversarial?Surfaces via Band-Limited Perturbations," Computer?Graphics Forum, Vol. 39, No. 5, 2020.
Liu, Hsueh-Ti Derek, et al., "Adversarial Geometry?and Lighting Using a Differentiable Renderer,"?CoRR, abs/1808.02651, 2018.
Alexander Toet and Maarten A Hogervorst, "Review?of Camouflage Assessment Techniques," In Target?and Background Signatures VI, Volume 11536,?page 1153604. International Society for Optics and?Photonics, 2020.
Chiuhsiang Joe Lin, Chi-Chan Chang, and Yung-Hui?Lee, "Evaluating Camouflage Design Using Eye?Movement Data," Applied Ergonomics, 45(3):714-?723, 2014.
Chi-Chan Chang, Yung-Hui Lee, Chiuhsiang Joe?Lin, Bor-Shong Liu, and Yuh-Chuan Shih, "Visual?Assessment of Camouflaged Targets with Different?Background Similarities," Perceptual and Motor?Skills, 114(2):527-541, 2012.
Simen Thys, Wiebe Van Ranst, and Toon Goedem,?"Fooling Automated Surveillance Cameras:?Adversarial Patches to Attack Person Detection," In?Proceedings of the IEEE/CVF Conference on?Computer Vision and Pattern Recognition Workshops,?pages 0-0, 2019.
Kim, Jeonghun, et al., "Camouflaged Adversarial?Attack on Object Detector," 2021 21st International?Conference on Control, Automation and Systems?(ICCAS). IEEE, 2021.
Glenn Jocher, Alex Stoken, Jirka Borovec,?NanoCode012, ChristopherSTAN, Liu Changyu,?Laughing, tkianai, Adam Hogan, lorenzomammana,?yxNONG, AlexWang1900, Laurentiu Diaconu, Marc,?wanghaoyang0106, ml5ah, Doug, Francisco Ingham,?Frederik, Guilhen, Hatovix, Jake Poznanski, Jiacong?Fang, Lijun Yu, changyu98, Mingyu Wang, Naman?Gupta, Osama Akhtar, PetrDvoracek, and Prashant?Rai. ultralytics/yolov5: v3.1 - Bug Fixes and?Performance Improvements, October 2020.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.