{"id":1097,"date":"2021-11-26T04:00:00","date_gmt":"2021-11-25T19:00:00","guid":{"rendered":"https:\/\/devneko.jp\/wordpress\/?p=1097"},"modified":"2021-11-26T04:00:00","modified_gmt":"2021-11-25T19:00:00","slug":"%e6%95%b5%e5%af%be%e7%9a%84%e6%94%bb%e6%92%83%e3%81%a8%e9%98%b2%e5%be%a1%e3%81%ae%e3%82%b5%e3%83%bc%e3%83%99%e3%82%a4","status":"publish","type":"post","link":"https:\/\/devneko.jp\/wordpress\/?p=1097","title":{"rendered":"\u6575\u5bfe\u7684\u653b\u6483\u3068\u9632\u5fa1\u306e\u30b5\u30fc\u30d9\u30a4"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li><strong>A Review of Adversarial Attack and Defense for Classification Methods\u00a0<\/strong>[78.5]<br>\u672c\u7a3f\u3067\u306f,\u6575\u5bfe\u7684\u4e8b\u4f8b\u306e\u751f\u6210\u3068\u4fdd\u8b77\u306b\u7126\u70b9\u3092\u3042\u3066\u308b\u3002 \u3053\u306e\u8ad6\u6587\u306f\u3001\u591a\u304f\u306e\u7d71\u8a08\u5b66\u8005\u304c\u3001\u3053\u306e\u91cd\u8981\u304b\u3064\u30a8\u30ad\u30b5\u30a4\u30c6\u30a3\u30f3\u30b0\u306a\u5206\u91ce\u306b\u304a\u3044\u3066\u3001\u6575\u306e\u4e8b\u4f8b\u3092\u751f\u6210\u30fb\u9632\u5fa1\u3059\u308b\u3053\u3068\u3092\u5968\u52b1\u3059\u308b\u3082\u306e\u3067\u3042\u308b\u3002<br><a href=\"http:\/\/arxiv.org\/abs\/2111.09961v1\">\u8ad6\u6587<\/a>\u00a0\u00a0<a href=\"https:\/\/fugumt.com\/fugumt\/paper_check\/2111.09961v1\">\u53c2\u8003\u8a33\uff08\u30e1\u30bf\u30c7\u30fc\u30bf\uff09<\/a>\u00a0 \u00a0(Thu, 18 Nov 2021 22:13:43 GMT)<ul><li>\u30c7\u30a3\u30fc\u30d7\u7cfb\u30e2\u30c7\u30eb\u306b\u5bfe\u3059\u308b\u6575\u5bfe\u7684\u653b\u6483\u3068\u305d\u306e\u9632\u5fa1\u306b\u95a2\u3059\u308b\u30b5\u30fc\u30d9\u30a4\u3001\u6570\u5f0f\u591a\u3081\u3060\u304c\u5206\u304b\u308a\u3084\u3059\u3044\u3002<\/li><li>\u30ea\u30dd\u30b8\u30c8\u30ea\u306f<a href=\"https:\/\/github.com\/liyao880\/revew_adv_defense\">GitHub &#8211; liyao880\/revew_adv_defense<\/a><\/li><\/ul><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A Review of Adversarial Attack and Defense for Classification Methods\u00a0[78.5]\u672c\u7a3f\u3067\u306f,\u6575\u5bfe\u7684\u4e8b\u4f8b\u306e\u751f\u6210\u3068\u4fdd\u8b77\u306b\u7126\u70b9\u3092\u3042\u3066\u308b\u3002 \u3053\u306e\u8ad6\u6587\u306f\u3001\u591a\u304f\u306e &hellip; <a href=\"https:\/\/devneko.jp\/wordpress\/?p=1097\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;\u6575\u5bfe\u7684\u653b\u6483\u3068\u9632\u5fa1\u306e\u30b5\u30fc\u30d9\u30a4&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[11,387],"class_list":["post-1097","post","type-post","status-publish","format-standard","hentry","category-arxiv","tag-adversarial-attack","tag-survey"],"_links":{"self":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1097"}],"version-history":[{"count":0,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1097\/revisions"}],"wp:attachment":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}