[1]. Rey Reza Wiyatno, et al, "Adversarial Examples in Modern Machine Learning: A Review," arXiv preprint arXiv:1911.05268, 2019.
[2]. Kevin Eykholt, et al, "Robust Physical-World Attacks on Deep Learning Visual Classification," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018.
[3]. Richard Den Hollander, et al, "Adversarial Patch Camouflage Against Aerial Detection," Artificial Intelligence and Machine Learning in Defense Applications II, Vol. 11543, International Society for Optics and Photonics. 2020.
[4]. Yang Zhang, et al, "CAMOU: Learning Physical Vehicle Camouflages to Adversarially Attack Detectors in the Wild," International Conference on Learning Representations, 2018.
[5]. Tong Wu, et al, "Physical Adversarial Attack on Vehicle Detector in the Carla Simulator," arXiv preprint arXiv:2007.16118, 2020.
[6]. Ranjie Duan, et al, "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021.
[7]. Giulio Lovisotto, et al, "SLAP: Improving Physical Adversarial Examples with {Short-Lived} Adversarial Perturbations," 30th USENIX Security Symposium (USENIX Security 21), 2021.
[8]. Athena Sayles, et al, "Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021.
[9]. James Tu, et al, "Physically Realizable Adversarial Examples for Lidar Object Detection," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020.
[10]. Giorgio Mariani, et al, "Generating Adversarial Surfaces via Band‐Limited Perturbations," Computer Graphics Forum, Vol. 39(5):2020.
[11]. Hsueh-Ti Derek Liu, et al, "Adversarial Geometry and Lighting Using a Differentiable Renderer," CoRR, abs/1808.02651, 2018.
[12]. Alexander Toet, and Maarten A Hogervorst, "Review of Camouflage Assessment Techniques," "Target and Background Signatures VI," Vol. 11536, p. 1153604International Society for Optics and Photonics, 2020.
[13]. Chiuhsiang Joe Lin, Chi-Chan Chang, and Yung-Hui Lee, "Evaluating Camouflage Design Using Eye Movement Data," Applied Ergonomics, Vol. 45(3):pp. 714–723, 2014.
[15]. Simen Thys, Wiebe Van Ranst, and Toon Goedem, "Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection," In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pages 0-0, 2019.
[16]. Jeonghun Kim, et al, "Camouflaged Adversarial Attack on Object Detector," "2021 21st International Conference on Control, Automation and Systems (ICCAS)," IEEE, 2021.
[17]. Glenn Jocher, Alex Stoken, and Jirka Borovec, NanoCode012, ChristopherSTAN, Liu Changyu, Laughing, tkianai, Adam Hogan, lorenzomammana, yxNONG, AlexWang1900, Laurentiu Diaconu, Marc, wanghaoyang0106, ml5ah, Doug, Francisco Ingham, Frederik, Guilhen, Hatovix, Jake Poznanski, Jiacong Fang, Lijun Yu, changyu98, Mingyu Wang, Naman Gupta, Osama Akhtar, PetrDvoracek, and Prashant Rai. ultralytics/yolov5: v3.1 - Bug Fixes and Performance Improvements, October 2020.