Chen, P.-Y., Sharma, Y., Zhang, H., Yi, J., and Hsieh, C.-J.
(2018). Ead: Elastic-net attacks to deep neural net-
works via adversarial examples. In AAAI Conference
on Artificial Intelligence.
Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., and Li,
J. (2018). Boosting adversarial attacks with momen-
tum. In IEEE Conference on Computer Vision and
Pattern Recognition.
Girshick, R. (2015). Fast r-cnn. In IEEE International Con-
ference on Computer Vision.
Goodfellow, I. J., Shlens, J., and Szegedy, C. (2015). Ex-
plaining and harnessing adversarial examples. In In-
ternational Conference on Learning Representations.
Gu, S., Yi, P., Zhu, T., Yao, Y., and Wang, W. (2019). De-
tecting adversarial examples in deep neural networks
using normalizing filters. In International Confer-
ence on Agents and Artificial Intelligence - Volume 2:
ICAART.
He, K., Zhang, X., Ren, S., and Sun, J. (2016). Deep resid-
ual learning for image recognition. In IEEE Confer-
ence on Computer Vision and Pattern Recognition.
Kurakin, A., Goodfellow, I., and Bengio, S. (2016). Ad-
versarial examples in the physical world. In arXiv
preprint arXiv:1607.02533.
Kurakin, A., Goodfellow, I., and Bengio, S. (2017). Ad-
versarial machine learning at scale. In International
Conference on Learning Representations (ICLR).
Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S.,
C.-Y.Fu, and Berg, A. C. (2016). Ssd: Single shot
multibox detector. In European Conference on Com-
puter Vision.
Machado, G., Goldschmidt, R., and Silva, E. (2019). Mul-
timagnet: A non-deterministic approach based on the
formation of ensembles for defending against adver-
sarial images. In International Conference on Enter-
prise Information Systems - Volume 1: ICEIS.
Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and
Vladu, A. (2018). Towards deep learning models re-
sistant to adversarial attacks. In International Confer-
ence on Learning Representations.
Modas, A., Moosavi-Dezfooli, S.-M., and Frossard, P.
(2019). Sparsefool: a few pixels make a big differ-
ence. In IEEE Conference on Computer Vision and
Pattern Recognition (CVPR).
Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P.
(2016). Deepfool: a simple and accurate method to
fool deep neural networks. In IEEE Conference on
Computer Vision and Pattern Recognition.
Papernot, N., Mcdaniel, P., Jha, S., Fredrikson, M., Celik,
Z. B., and Swami, A. (2016). The limitations of deep
learning in adversarial settings. In IEEE Symposium
on Security and Privacy.
Prakash, A., Moran, N., Garber, S., DiLillo, A., and Storer,
J. (2018). Protecting jpeg images against adversarial
attacks. In Data Compression Conference.
Redmonand, J., Divvala, S. K., Girshick, R. B., and Farhadi,
A. (2016). You only look once: Unified, real-time
object detection. In IEEE Conference on Computer
Vision and Pattern Recognition.
Rony, J., Hafemann, L. G., Oliveira, L. S., Ayed, I. B.,
Sabourin, R., and Granger, E. (2019). Decoupling di-
rection and norm for efficient gradient-based l2 adver-
sarial attacks and defenses. In IEEE/CVF Conference
on Computer Vision and Pattern Recognition (CVPR),
pages 4317–4325.
Shafahi, A., Najibi, M., Ghiasi, A., Xu, Z., Dickerson, J.,
Studer, C., Davis, L. S., Taylor, G., and Goldstein,
T. (2019). Adversarial training for free! In Neural
Information Processing Systems (NeurIPS).
Simonyan, K. and Zisserman, A. (2015). Very deep con-
volutional networks for large-scale image recognition.
In International Conference on Learning Representa-
tions.
Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S.,
Anguelov, D., Erhan, D., Vanhoucke, V., and Rabi-
novich, A. (2015). Going deeper with convolutions.
In IEEE Conference on Computer Vision and Pattern
Recognition.
Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., and Wojna,
Z. (2016). Rethinking the inception architecture for
computer vision. In IEEE Conference on Computer
Vision and Pattern Recognition.
Szegedy, H., Zaremba, W., Sutskever, I., Bruna, J., Erhan,
D., Goodfellow, I., and Fergus, R. (2013). Intriguing
properties of neural networks. In International Con-
ference on Learning Representations.
Uesato, J., O’Donoghue, B., van den Oord, A., and
Kohli, P. (2018). Adversarial risk and the dangers
of evaluating against weak attacks. In arXiv preprint
arXiv:1802.05666.
Wong, E., Rice, L., and Kolter, J. (2020). Fast is better than
free: Revisiting adversarial training. In International
Conference on Learning Representations.
Xie, C., Tan, M., Gong, B., Wang, J., Yuille, A. L., and Le,
Q. V. (2020). Adversarial examples improve image
recognition. In IEEE Conference on Computer Vision
and Pattern Recognition.
Zagoruyko, S. and Komodakis, N. (2016). Wide residual
networks. In Proceedings of the British Machine Vi-
sion Conference.
Zheng, H., Zhang, Z., Gu, J., Lee, H., and Prakash, A.
(2020). Efficient adversarial training with transferable
adversarial examples. In IEEE Conference on Com-
puter Vision and Pattern Recognition(CVPR).
ICPRAM 2021 - 10th International Conference on Pattern Recognition Applications and Methods
24