TY - STD TI - C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, R. Fergus, Intriguing properties of neural networks (2013). arXiv:1312.6199. ID - ref1 ER - TY - STD TI - A. Kurakin, I. Goodfellow, S. Bengio, Y. Dong, F. Liao, M. Liang, T. Pang, J. Zhu, X. Hu, C. Xie, J. Wang, Z. Zhang, Z. Ren, A. Yuille, S. Huang, Y. Zhao, Y. Zhao, Z. Han, J. Long, Y. Berdibekov, T. Akiba, S. Tokui, M. Abe, Adversarial attacks and defences competition (2018). arXiv:1804.00097. ID - ref2 ER - TY - STD TI - M. Sharif, L. Bauer, M. K. Reiter, On the suitability of lp-norms for creating and preventing adversarial examples (2018). arXiv:1802.09653. ID - ref3 ER - TY - STD TI - S. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, P. Frossard, in CVPR. Universal adversarial perturbations (IEEE, 2017), pp. 86–94. ID - ref4 ER - TY - STD TI - Z. Zhao, D. Dua, S. Singh, in ICLR. Generating natural adversarial examples, (2018). https://doi.org/10.18653/v1/d18-1316. ID - ref5 ER - TY - STD TI - W. Heng, S. Zhou, T. Jiang, Harmonic adversarial attack method (2018). arXiv:1807.10590. ID - ref6 ER - TY - STD TI - C. Guo, J. S. Frank, K. Q. Weinberger, Low frequency adversarial perturbation (2018). arXiv:1809.08758. ID - ref7 ER - TY - STD TI - N. Carlini, D. Wagner, in IEEE Symp. on Security and Privacy. Towards evaluating the robustness of neural networks, (2017). https://doi.org/10.1109/sp.2017.49. ID - ref8 ER - TY - STD TI - I. J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples (2014). arXiv:1412.6572. ID - ref9 ER - TY - STD TI - A. Kurakin, I. Goodfellow, S. Bengio, Adversarial examples in the physical world (2016). arXiv:1607.02533. ID - ref10 ER - TY - STD TI - S. -M. Moosavi-Dezfooli, A. Fawzi, P. Frossard, in CVPR. Deepfool: a simple and accurate method to fool deep neural networks, (2016). https://doi.org/10.1109/cvpr.2016.282. ID - ref11 ER - TY - JOUR AU - Crammer, K. AU - Singer, Y. PY - 2001 DA - 2001// TI - On the algorithmic implementation of multiclass kernel-based vector machines JO - J. Mach. Learn. Res VL - 2 ID - Crammer2001 ER - TY - STD TI - D. Kingma, J. Ba, Adam: a method for stochastic optimization (2015). arXiv:1412.6980. ID - ref13 ER - TY - CHAP AU - Zhou, W. AU - Hou, X. AU - Chen, Y. AU - Tang, M. AU - Huang, X. AU - Gan, X. AU - Yang, Y. PY - 2018 DA - 2018// TI - Transferable adversarial perturbations BT - ECCV PB - Springer International Publishing CY - Cham ID - Zhou2018 ER - TY - STD TI - E. Quiring, D. Arp, K. Rieck, in 2018 IEEE European Symposium on Security and Privacy (EuroS P). Forgotten siblings: unifying attacks on machine learning and digital watermarking, (2018), pp. 488–502. https://doi.org/10.1109/EuroSP.2018.00041. ID - ref15 ER - TY - STD TI - I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalker, Digital Watermarking, 2nd edn. (Elsevier, 2008). ID - ref16 ER - TY - STD TI - F. Luan, S. Paris, E. Shechtman, K. Bala, in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Deep Photo Style Transfer, (2017). ID - ref17 ER - TY - STD TI - G. Puy, P. Pérez, A flexible convolutional solver with application to photorealistic style transfer (2018). arXiv:1806.05285. ID - ref18 ER - TY - STD TI - Y. Li, M. -Y. Liu, X. Li, M. -H. Yang, J. Kautz, A closed-form solution to photorealistic image stylization (2018). arXiv:1802.06474. ID - ref19 ER - TY - STD TI - J. Su, D. Vargas, K. Sakurai, One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. (2019). https://doi.org/10.1109/tevc.2019.2890858. ID - ref20 ER - TY - STD TI - D. Zhou, O. Bousquet, T. N. Lal, J. Weston, B. Schölkopf, in NIPS. Learning with local and global consistency (MIT Press, 2003), pp. 321–328. ID - ref21 ER - TY - STD TI - T. H. Kim, K. M. Lee, S. U. Lee, in ECCV. Generative image segmentation using random walks with restart, (2008). https://doi.org/10.1007/978-3-540-88690-7_20. ID - ref22 ER - TY - STD TI - A. Sandryhaila, J. M. Moura, Discrete signal processing on graphs. IEEE Trans. Sig. Process.61(7) (2013). https://doi.org/10.1109/tsp.2013.2238935. ID - ref23 ER - TY - STD TI - D. I. Shuman, S. K. Narang, P. Frossard, A. Ortega, P. Vandergheynst, The emerging field of signal processing on graphs: extending high-dimensional data analysis to networks and other irregular domains. IEEE Sig. Process. Mag.30(3) (2013). https://doi.org/10.1109/msp.2012.2235192. ID - ref24 ER - TY - STD TI - A. Iscen, Y. Avrithis, G. Tolias, T. Furon, O. Chum, in CVPR. Fast spectral ranking for similarity search, (2018). https://doi.org/10.1109/cvpr.2018.00796. ID - ref25 ER - TY - JOUR AU - Grady, L. PY - 2006 DA - 2006// TI - Random walks for image segmentation JO - IEEE Trans. PAMI VL - 28 UR - https://doi.org/10.1109/TPAMI.2006.233 DO - 10.1109/TPAMI.2006.233 ID - Grady2006 ER - TY - STD TI - P. Vernaza, M. Chandraker, in CVPR. Learning random-walk label propagation for weakly-supervised semantic segmentation, (2017). https://doi.org/10.1109/cvpr.2017.315. ID - ref27 ER - TY - STD TI - X. Zhu, Z. Ghahramani, J. Lafferty, in ICML. Semi-supervised learning using Gaussian fields and harmonic functions, (2003), pp. 912–919. ID - ref28 ER - TY - STD TI - D. Zhou, J. Weston, A. Gretton, O. Bousquet, B. Schölkopf, in NIPS. Ranking on data manifolds (MIT Press, 2003), pp. 169–176. http://papers.nips.cc/paper/2447-ranking-on-data-manifolds.pdf. UR - http://papers.nips.cc/paper/2447-ranking-on-data-manifolds.pdf ID - ref29 ER - TY - STD TI - A. Iscen, G. Tolias, Y. Avrithis, T. Furon, O. Chum, in CVPR. Efficient diffusion on region manifolds: recovering small objects with compact CNN representations, (2017). https://doi.org/10.1109/cvpr.2017.105. ID - ref30 ER - TY - STD TI - Y. Lecun, L. Bottou, Y. Bengio, P. Haffner, Gradient-based learning applied to document recognition. Proc. IEEE. 86(11) (1998). https://doi.org/10.1109/5.726791. ID - ref31 ER - TY - STD TI - J. Nocedal, S. Wright, Numerical Optimization (Springer, 2006). https://doi.org/10.1007/978-3-540-35447-5. ID - ref32 ER - TY - STD TI - S. Chandra, I. Kokkinos, in ECCV. Fast, exact and multi-scale inference for semantic image segmentation with deep Gaussian CRFs, (2016). https://doi.org/10.1007/978-3-319-46478-7_25. ID - ref33 ER - TY - STD TI - S. A. Fezza, Y. Bakhti, W. Hamidouche, O. Déforges, in 2019 Eleventh International Conference on Quality of Multimedia Experience (QoMEX). Perceptual evaluation of adversarial attacks for CNN-based image classification, (2019), pp. 1–6. https://doi.org/10.1109/QoMEX.2019.8743213. ID - ref34 ER - TY - JOUR AU - Larson, E. C. AU - Chandler, D. M. PY - 2010 DA - 2010// TI - Most apparent distortion: full-reference image quality assessment and the role of strategy JO - J. Electron. Imaging VL - 19 UR - https://doi.org/10.1117/1.3267105 DO - 10.1117/1.3267105 ID - Larson2010 ER - TY - STD TI - Y. LeCun, C. Cortes, C. Burges, MNIST handwritten digit database. 2: (2010). AT&T Labs [Online]. Available: http://yann.lecun.com/exdb/mnist. Accessed 30 June 2020. UR - http://yann.lecun.com/exdb/mnist ID - ref36 ER - TY - STD TI - A. Kurakin, I. Goodfellow, S. Bengio, Y. Dong, F. Liao, M. Liang, T. Pang, J. Zhu, X. Hu, C. Xie, et al., Adversarial attacks and defences competition (2018). arXiv:1804.00097. ID - ref37 ER - TY - STD TI - J. Deng, W. Dong, R. Socher, L. -J. Li, K. Li, L. Fei-Fei, in CVPR. Imagenet: a large-scale hierarchical image database (Ieee, 2009), pp. 248–255. https://doi.org/10.1109/cvpr.2009.5206848. ID - ref38 ER - TY - STD TI - C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, Z. Wojna, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Rethinking the inception architecture for computer vision, (2016), pp. 2818–2826. https://doi.org/10.1109/cvpr.2016.308. ID - ref39 ER - TY - CHAP AU - He, K. AU - Zhang, X. AU - Ren, S. AU - Sun, J. ED - Leibe, B. ED - Matas, J. ED - Sebe, N. ED - Welling, M. PY - 2016 DA - 2016// TI - Identity Mappings in Deep Residual Networks BT - Computer Vision – ECCV 2016 PB - Springer International Publishing CY - Cham UR - https://doi.org/10.1007/978-3-319-46493-0_38 DO - 10.1007/978-3-319-46493-0_38 ID - He2016 ER - TY - STD TI - I. J. Goodfellow, J. Shlens, C. Szegedy, in 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. Explaining and harnessing adversarial examples, (2015). http://arxiv.org/abs/1412.6572. ID - ref41 ER - TY - STD TI - N. Papernot, F. Faghri, N. Carlini, I. Goodfellow, R. Feinman, A. Kurakin, C. Xie, Y. Sharma, T. Brown, A. Roy, A. Matyasko, V. Behzadan, K. Hambardzumyan, Z. Zhang, Y. -L. Juang, Z. Li, R. Sheatsley, A. Garg, J. Uesato, W. Gierke, Y. Dong, D. Berthelot, P. Hendricks, J. Rauber, R. Long, Technical report on the cleverhans v2.1.0 adversarial examples library (2018). arXiv:1610.00768. ID - ref42 ER - TY - STD TI - I. Loshchilov, F. Hutter, Fixing weight decay regularization in adam. CoRR. abs/1711.05101: (2017). ID - ref43 ER - TY - STD TI - C. Tomasi, R. Manduchi, in ICCV. Bilateral filtering for gray and color images, (1998). https://doi.org/10.1109/iccv.1998.710815. ID - ref44 ER -