最新综述:图像分类中的对抗机器学习

论坛 期权论坛     
选择匿名的用户   2021-5-23 01:23   170   0
<p id="main-toc"><strong>目录</strong></p>
<p id="1.%E5%BC%95%E8%A8%80-toc" style="margin-left:0px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#1.%E5%BC%95%E8%A8%80">1.引言</a></p>
<p id="2.%E8%AE%BA%E6%96%87%E8%B4%A1%E7%8C%AE-toc" style="margin-left:0px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#2.%E8%AE%BA%E6%96%87%E8%B4%A1%E7%8C%AE">2.论文贡献</a></p>
<p id="3.%E5%8D%B7%E7%A7%AF%E7%A5%9E%E7%BB%8F%E7%BD%91%E7%BB%9C%E7%AE%80%E4%BB%8B-toc" style="margin-left:0px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#3.%E5%8D%B7%E7%A7%AF%E7%A5%9E%E7%BB%8F%E7%BD%91%E7%BB%9C%E7%AE%80%E4%BB%8B">3.卷积神经网络简介</a></p>
<p id="4.%E5%AF%B9%E6%8A%97%E6%A0%B7%E6%9C%AC%E5%92%8C%E5%AF%B9%E6%8A%97%E6%94%BB%E5%87%BB-toc" style="margin-left:0px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.%E5%AF%B9%E6%8A%97%E6%A0%B7%E6%9C%AC%E5%92%8C%E5%AF%B9%E6%8A%97%E6%94%BB%E5%87%BB">4.对抗样本和对抗攻击</a></p>
<p id="4.1.1%20%E5%AF%B9%E6%8A%97%E6%89%B0%E5%8A%A8%E8%8C%83%E5%9B%B4-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.1.1%20%E5%AF%B9%E6%8A%97%E6%89%B0%E5%8A%A8%E8%8C%83%E5%9B%B4">4.1.1 对抗扰动范围</a></p>
<p id="4.1.2%20%E5%AF%B9%E6%8A%97%E6%89%B0%E5%8A%A8%E7%9A%84%E5%8F%AF%E8%A7%81%E6%80%A7-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.1.2%20%E5%AF%B9%E6%8A%97%E6%89%B0%E5%8A%A8%E7%9A%84%E5%8F%AF%E8%A7%81%E6%80%A7">4.1.2 对抗扰动的可见性</a></p>
<p id="4.1.3%20%E5%AF%B9%E6%8A%97%E6%89%B0%E5%8A%A8%E7%9A%84%E6%B5%8B%E9%87%8F-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.1.3%20%E5%AF%B9%E6%8A%97%E6%89%B0%E5%8A%A8%E7%9A%84%E6%B5%8B%E9%87%8F">4.1.3 对抗扰动的测量</a></p>
<p id="4.2%20%E5%AF%B9%E6%8A%97%E6%94%BB%E5%87%BB%E7%9A%84%E5%88%86%E7%B1%BB-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.2%20%E5%AF%B9%E6%8A%97%E6%94%BB%E5%87%BB%E7%9A%84%E5%88%86%E7%B1%BB">4.2 对抗攻击的分类</a></p>
<p id="4.2.1%20%E6%94%BB%E5%87%BB%E8%80%85%E7%9A%84%E5%BD%B1%E5%93%8D%E5%8A%9B-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.2.1%20%E6%94%BB%E5%87%BB%E8%80%85%E7%9A%84%E5%BD%B1%E5%93%8D%E5%8A%9B">4.2.1 攻击者的影响力</a></p>
<p id="4.2.2%20%E6%94%BB%E5%87%BB%E8%80%85%E7%9A%84%E7%9F%A5%E8%AF%86-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.2.2%20%E6%94%BB%E5%87%BB%E8%80%85%E7%9A%84%E7%9F%A5%E8%AF%86">4.2.2 攻击者的知识</a></p>
<p id="4.2.3%20%E5%AE%89%E5%85%A8%E5%85%A5%E4%BE%B5-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.2.3%20%E5%AE%89%E5%85%A8%E5%85%A5%E4%BE%B5">4.2.3 安全入侵</a></p>
<p id="4.2.4%20%E6%94%BB%E5%87%BB%E7%9A%84%E7%89%B9%E5%BC%82%E6%80%A7-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.2.4%20%E6%94%BB%E5%87%BB%E7%9A%84%E7%89%B9%E5%BC%82%E6%80%A7">4.2.4 攻击的特异性</a></p>
<p id="4.2.5%20%E6%94%BB%E5%87%BB%E6%96%B9%E6%B3%95-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#4.2.5%20%E6%94%BB%E5%87%BB%E6%96%B9%E6%B3%95">4.2.5 攻击方法</a></p>
<p id="5.2%20%E9%98%B2%E5%BE%A1%E6%96%B9%E6%B3%95-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2%20%E9%98%B2%E5%BE%A1%E6%96%B9%E6%B3%95">5.2 防御方法</a></p>
<p id="5.2.1%20%E6%A2%AF%E5%BA%A6%E6%8E%A9%E8%94%BD-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2.1%20%E6%A2%AF%E5%BA%A6%E6%8E%A9%E8%94%BD">5.2.1 梯度掩蔽</a></p>
<p id="5.2.2%20%E5%AF%B9%E6%8A%97%E8%AE%AD%E7%BB%83-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2.2%20%E5%AF%B9%E6%8A%97%E8%AE%AD%E7%BB%83">5.2.2 对抗训练</a></p>
<p id="5.2.3%20%E9%98%B2%E5%BE%A1%E8%92%B8%E9%A6%8F-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2.3%20%E9%98%B2%E5%BE%A1%E8%92%B8%E9%A6%8F">5.2.3 防御蒸馏</a></p>
<p id="5.2.4%20%E7%89%B9%E5%BE%81%E5%8E%8B%E7%BC%A9-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2.4%20%E7%89%B9%E5%BE%81%E5%8E%8B%E7%BC%A9">5.2.4 特征压缩</a></p>
<p id="5.2.5%20%E5%88%86%E7%B1%BB%E5%99%A8%E9%9B%86%E5%90%88-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2.5%20%E5%88%86%E7%B1%BB%E5%99%A8%E9%9B%86%E5%90%88">5.2.5 分类器集合</a></p>
<p id="5.2.6%20%E8%BF%91%E9%82%BB%E6%B5%8B%E9%87%8F-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#5.2.6%20%E8%BF%91%E9%82%BB%E6%B5%8B%E9%87%8F">5.2.6 近邻测量</a></p>
<p id="6.1%20%E9%AB%98%E5%BA%A6%E9%9D%9E%E7%BA%BF%E6%80%A7%E5%8C%96%E5%81%87%E8%AE%BE-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/weixin_43135178/article/details/109404719#6.1%20%E9%AB%98%E5%BA%A6%E9%9D%9E%E7%BA%BF%E6%80%A7%E5%8C%96%E5%81%87%E8%AE%BE">6.1 高度非线性化假设</a></p>
<p id="6.2%20%E7%BA%BF%E6%80%A7%E5%8C%96%E5%81%87%E8%AE%BE-toc" style="margin-left:40px;"><a href="https://bl
分享到 :
0 人收藏
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

积分:3875789
帖子:775174
精华:0
期权论坛 期权论坛
发布
内容

下载期权论坛手机APP