[1] J. Gu et al, "Recent Advances in Convolutional Neural Networks," Pattern Recognition, Vol. 77, pp. 354–377, 2018.
[2] I. Goodfellow et al, "Explaining and Harnessing Adversarial Examples," International Conference on Learning Representations, 2015.
[3] C. Szegedy et al, "Intriguing Properties of Neural Networks," International Conference on Learning Representations, 2014.
[4] S. Ren et al, "Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 39, No. 6, pp. 1137–1149, 2017.
[5] J. Deng et al, "ImageNet: A Large-Scale Hierarchical Image Database," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 248–255, 2009.
[6] T. Lin et al, "Microsoft COCO: Common objects in context," European Converence on Computer Vision (ECCV), pp. 740–755, 2014.
[7] M. Tan et al, "EfficientDet: Scalable and Efficient Object Detection," IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 10778–10787, 2020.
[8] A. Bochkovskiy et al, "YOLOv4: Optimal Speed and Accuracy of Object Detection," arXiv preprint arXiv:2004.10934, 2020.
[9] T. Karasawa et al, "Multispectral Object Detection for Autonomous Vehicles," Proceedings of the on Thematic Workshops of ACM Multimedia, pp. 35–43, 2017.
[10] D. Feng et al, "Deep Multi-modal Object Detection and Semantic Segmentation for Autonomous Driving: Datasets, Methods, and Challenges," IEEE Transactions on Intelligent Transportation Systems, pp. 1–20, 2020.
[11] FREE FLIR Thermal Dataset for Algorithm Training, FLIR Systems. Accessed April 1, 2021.https://flir.com/oem/adas/adas-dataset-form/.
[12] J. Rony et al, "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4322–4330, 2019.
[13] A. Kurakin et al, "Adversarial Examples in the Physical World," International Conference on Learning Representations(Workshop Track Proceedings), 2017.
[14] A. Mardy et al, "Towards Deep Learning Models Resistant to Adversarial Attacks," International Conference on Learning Representations, 2018.
[15] U. Jang et al, "Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning," Proceedings of the Annual Computer Security Applications Conference, pp. 262–277, 2017.
[16] H. Hosseini et al, "On the Limitation of Convolutional Neural Networks in Recognizing Negative Images," IEEE International Conference on Machine Learning and Applications, pp. 352–358, 2017.
[17] T. Miyato et al, "Distributional Smoothing with Virtual Adversarial Training," International Conference on Learning Representations, 2016.
[18] S. Moosavi-Dezfooli et al, "DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2574–2582, 2016.
[19] J. Rauber et al, "Fast Differentiable Clipping-Aware Normalization and Rescaling," arXiv preprint arXiv: 2007.07677, 2020.
[20] N. Carlini et al, "Towards Evaluating the Robustness of Neural Networks," IEEE Symposium on Security and Privacy, pp. 39–57, 2017.
[21] C. Xie et al, "Adversarial Examples for Semantic Segmentation and Object Detection," Proceedings of the IEEE International Conference on Computer Vision, pp. 1369–1378, 2017.
[22] Y. Li et al, "Robust Adversarial Perturbation on Deep Proposal-based Models," British Machine Vision Conference, 2018.
[23] X. Liu et al, "DPatch: An Adversarial Patch Attack on Object Detectors," AAAI Workshop on Artificial Intelligence Safety, 2019.
[24] R. Selvaraju et al, "Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Localization," Proceedings of the IEEE International Conference on Computer Vision, pp. 618–626, 2017.