[1] |
Akhtar N,Mian A.Threat of adversarial attacks on deep learning in computer vision: A survey[J].IEEE Access,2018,6: 14410-14430.
|
[2] |
Szegedy C,Zaremba W,Sutskever I,et al.Intriguing properties of neural networks[J].arXiv:1312.6199,2013.
|
[3] |
Goodfellow I J,Shlens J,Szegedy C.Explaining and harnessing adversarial examples[J].arXiv:1412.6572,2014.
|
[4] |
Kurakin A,Goodfellow I,Bengio S.Adversarial examples in the physical world[J].arXiv:1607.02533,2016.
|
[5] |
Moosavi-Dezfooli S M, Fawzi A,Frossard P.DeepFool:A simple and accurate method to fool deep neural networks[C]∥Proc of the IEEE Conference on Computer Vision and Pattern Recognition,2016: 2574-2582.
|
[6] |
Su J,Vargas D V,Sakurai K.One pixel attack for fooling deep neural networks[J].IEEE Transactions on Evolutionary Computation,2019,23(5): 828-841.
|
[7] |
Jia X,Wei X,Cao X,et al.Adv-watermark: A novel watermark perturbation for adversarial examples[C]∥Proc of the 28th ACM International Conference on Multimedia,2020: 1579-1587.
|
[8] |
Jiang H,Yang J T,Hua G,et al.FAWA: Fast adversarial watermark attack[J].IEEE Transactions on Computers,2021,1(1):1-14.
|
[9] |
Xie C,Wang J,Zhang Z,et al.Adversarial examples for semantic segmentation and object detection[C]∥Proc of the IEEE International Conference on Computer Vision,2017: 1369-1378.
|
[10] |
Papernot N,McDaniel P,Wu X,et al.Distillation as a defense to adversarial perturbations against deep neural networks[C]∥Proc of 2016 IEEE Symposium on Security and Privacy,2016: 582-597.
|
[11] |
Wang Q, Guo W, Zhang K, et al. Learning adversary- resistant deep neural networks[J].arXiv:1612.01401,2016.
|
[12] |
Braudaway G W.Protecting publicly-available images with an invisible image watermark[C]∥Proc of International Conference on Image Processing,1997:524-527.
|
[13] |
Kankanhalli M S,Ramakrishnan K R.Adaptive visible watermarking of images[C]∥Proc of IEEE International Conference on Multimedia Computing and Systems,1999:568-573.
|
[14] |
Shen B,Sethi I K,Bhaskaran V.DCT domain alpha blending[C]∥Proc of 1998 International Conference on Image Processing,1998:857-861.
|
[15] |
Duchi J,Hazan E,Singer Y.Adaptive subgradient methods for online learning and stochastic optimization[J].Journal of Machine Learning Research,2011,12(7):2121-2159.
|
[16] |
Kingma D P,Ba J.Adam: A method for stochastic optimization[J].arXiv:1412.6980,2014.
|
[17] |
Li S, Li D, Zhang Y. Incorporating Nesterov’s momentum into distributed adaptive gradient method for online optimization[C]∥Proc of 2021 China Automation Congress, 2021:7338-7343.
|
[18] |
Colorni A,Dorigo M,Maniezzo V.Distributed optimization by ant colonies[C]∥Proc of the 1st European Conference on Artificial Life,1991:134-142.
|
[19] |
Forrest S. Genetic algorithms[J].ACM Computing Surveys, 1996,28(1): 77-80.
|
[20] |
Kennedy J,Eberhart R.Particle swarm optimization[C]∥Proc of International Conference on Neural Networks,1995: 1942-1948.
|
[21] |
严健武.使用Alpha-Blending技术实现图片水印效果[J].现代计算机(专业版),2009(9):78-80.
|
|
Yan Jian-wu.Implementation of watermark effect of picture with Alpha-Blending[J].Modern Computer (Professional Edition),2009(9):78-80.
|
[22] |
Brendel W,Rauber J,Bethge M.Decision-based adversarial attacks: Reliable attacks against black-box machine learning models[J].arXiv:1712.04248,2017.
|