Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R., “Intriguing properties of neural networks,” in International Conference on Learning Representations (ICLR), 2014.
Goodfellow, I., Shlens, J., and Szegedy, C., “Explaining and harnessing adversarial examples,” in International Conference on Learning Representations (ICLR), 2015.
AprilPyone, M. and Kiya, H., “Block-wise image transformation with secret key for adversarially robust defense,” IEEE Trans. on Information Forensics and Security 16, 2709-2723 2021.
Lee, K., Lee, K., Lee, H., and Shin, J., “A simple unified framework for detecting out-of-distribution samples and adversarial attacks,” in Advances in Neural Information Processing Systems (NIPS), 2018.
Puyudi, Y., Jianbo, C., Cho-Jui, H., Jane-Ling, W., and Michael, I., J., “Ml-loo: Detecting adversarial examples with feature attribution,” in Association for the Advancement of Artificial Intelligence (AAAI), 2020.