[1] JORDAN M I, MITCHELL T M.Machine learning:trends, perspectives, and prospects[J].Science, 2015, 349(6245):255-260. [2] 陈晓楠, 胡建敏, 张本俊, 等.基于模型间迁移性的黑盒对抗攻击起点提升方法[J].计算机工程, 2021, 47(8):162-169. CHEN X N, HU J M, ZHANG B J, et al.Black-box adversarial attack starting point improvement method based on migration between models[J].Computer Engineering, 2021, 47(8):162-169.(in Chinese) [3] LI X Y, ZHU Q S, ZHU M Z, et al.Machine learning study of the relationship between the geometric and entropy discord[J].Europhysics Letters, 2019, 127(2):20009. [4] QU Z G, CHEN S Y, WANG X J.A secure controlled quantum image steganography algorithm[J].Quantum Information Processing, 2020, 19(10):1-25. [5] AKHTAR N, MIAN A.Threat of adversarial attacks on deep learning in computer vision:a survey[J].IEEE Access, 2018, 6:14410-14430. [6] 姜妍, 张立国.面向深度学习模型的对抗攻击与防御方法综述[J].计算机工程, 2021, 47(1):1-11. JIANG Y, ZHANG L G.Survey of adversarial attacks and defense methods for deep learning model[J].Computer Engineering, 2021, 47(1):1-11.(in Chinese). [7] ZHENG D S, RAN Z Y, LIU Z F, et al.An efficient bar code image recognition algorithm for sorting system[J].Computers, Materials & Continua, 2020, 64(3):1885-1895. [8] TRAMÈR F, KURAKIN A, PAPERNOT N, et al.Ensemble adversarial training:attacks and defenses[EB/OL].[2020-12-08].https://arxiv.org/abs/1705.07204. [9] PAPERNOT N, MCDANIEL P, WU X, et al.Distillation as a defense to adversarial perturbations against deep neural networks[C]//Proceedings of 2016 IEEE Symposium on Security and Privacy.Washington D.C., USA:IEEE Press, 2016:582-597. [10] LI X Y, ZHU Q S, HUANG Y M, et al.Research on the freezing phenomenon of quantum correlation by machine learning[J].Computers, Materials & Continua, 2020, 65(3):2143-2151. [11] DAS N, SHANBHOGUE M, CHEN S T, et al.Keeping the bad guys out:protecting and vaccinating deep learning with JPEG compression[EB/OL].[2020-12-08].https://arxiv.org/abs/1705.02900. [12] NICOLAE M I, SINN M, TRAN M N, et al.Adversarial robustness toolbox v0.2.2[EB/OL].[2020-12-08].https://arxiv.org/abs/1807.01069v1. [13] SONG Y, KIM T, NOWOZIN S, et al.PixelDefend:leveraging generative models to understand and defend against adversarial examples[EB/OL].[2020-12-08].https://arxiv.org/abs/1710.10766. [14] XIE C H, WU Y X, MAATEN L V D, et al.Feature denoising for improving adversarial robustness[C]//Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2019:501-509. [15] GOODFELLOW I J, SHLENS J, SZEGEDY C.Explaining and harnessing adversarial examples[EB/OL].[2020-12-08].https://arxiv.org/abs/1412.6572. [16] DONG Y P, LIAO F Z, PANG T, et al.Boosting adversarial attacks with momentum[C]//Proceedings of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2018:9185-9193. [17] TASHIRO Y, SONG Y, ERMON S.Output diversified initialization for adversarial attacks[EB/OL].[2020-12-08].https://arxiv.org/abs/2003.06878v1#. [18] MOOSAVI-DEZFOOLI S M, FAWZI A, FROSSARD P.DeepFool:a simple and accurate method to fool deep neural networks[C]//Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2016:2574-2582. [19] CARLINI N, WAGNER D.Towards evaluating the robustness of neural networks[C]//Proceedings of 2017 IEEE Symposium on Security and Privacy.Washington D.C., USA:IEEE Press, 2017:39-57. [20] XU W L, EVANS D, QI Y J.FeatureSqueezing:detecting adversarial examples in deep neural networks[C]//Proceedings of 2018 Network and Distributed System Security Symposium.Washington D.C., USA:IEEE Press, 2018:1-10. [21] JIA X J, WEI X X, CAO X C, et al.ComDefend:an efficient image compression model to defend adversarial examples[C]//Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2019:6077-6085. [22] RONNEBERGER O, FISCHER P, BROX T.U-Net:convolutional networks for biomedical image segmentation[C]//Proceedings of 2015 International Conference on Medical Image Computing and Computer-Assisted Intervention.Berlin, Germany:Springer, 2015:234-241. [23] WENG Y, ZHOU T B, LI Y J, et al.NAS-Unet:neural architecture search for medical image segmentation[J].IEEE Access, 2019, 7:44247-44257. [24] ZENG Z T, XIE W H, ZHANG Y Z, et al.RIC-Unet:an improved neural network based on Unet for nuclei segmentation in histology images[J].IEEE Access, 2019, 7:21420-21428. [25] JIN Q G, MENG Z P, SUN C M, et al.RA-UNet:a hybrid deep attention-aware network to extract liver and tumor in CT scans[J].Frontiers in Bioengineering and Biotechnology, 2020, 8:605132. [26] HE K M, ZHANG X Y, REN S Q, et al.Deep residual learning for image recognition[C]//Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2016:770-778. [27] TARG S, ALMEIDA D, LYMAN K.Resnet in Resnet:generalizing residual architectures[EB/OL].[2020-12-08].https://arxiv.org/abs/1603.08029. [28] HU J, SHEN L, SUN G.Squeeze-and-excitation networks[C]//Proceedings of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2018:7132-7141. [29] YAN W S, HUA Y Q.Deep residual SENet for foliage recognition[M].Berlin, Germany:Springer, 2020. [30] LEDIG C, THEIS L, HUSZÁR F, et al.Photo-realistic single image super-resolution using a generative adversarial network[C]//Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition.Washington D.C., USA:IEEE Press, 2017:105-114. |