Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Yuhao MaoChong FuSaizhuo WangShouling JiXuhong ZhangZhenguang LiuJun ZhouAlex X. LiuRaheem BeyahTing WangPublished in: IEEE Symposium on Security and Privacy (2022)
Keyphrases
- empirical studies
- computer vision
- real life
- real world data sets
- image understanding
- real world
- empirical analysis
- pattern recognition
- object recognition
- small scale
- camera calibration
- object detection
- vision system
- systematic review
- uci datasets
- optical flow
- image sequences
- traffic analysis
- action recognition
- security protocols
- computer vision algorithms
- computer graphics
- signal processing
- data mining