å¾é éä¸æ³ãç¨ãã¦å¦ç¿ãããã¢ãã«ãç¨ããåé¡ãè¡ãå ´åã«ãä»»æã®åé¡çµæãå¾ããããããªå ¥åãæå³çã«ä½æãããã¨ãå¯è½ã§ããããã¯ãKumar et al. ã«ããæ»æåé¡ã§ã¯ãperturbation attacks ã adversarial examples in the physical domain ã«è©²å½ãã¾ãã æ»æ対象ã®ã·ã¹ãã ã«å¯¾ãã¦ãæ»æè ããã¼ã¿ã®å ¥åãåºåã®ç¢ºèªãªã©ãè¡ããã¨ãã§ããä½å°ã大ããã»ã©ãæ»æãæåããå¯è½æ§ã¯å¤§ãããªãã¾ãã ã¾ããå¦ç¿ããã»ã¹ã«é¢ããæ å ±ï¼æ師ãã¼ã¿ãå¦ç¿çµæãå¦ç¿ã¢ãã«ããã¹ããã¼ã¿ãªã©ï¼ãããã°ãæ»æã¯ãã容æã«è¡ããããã«ãªãã¾ãã ç¾ç¶ã§ã¯ãæ°ç§ã§æ»æã§ãããã®ããä½é±éãå¿ è¦ã«ãªããã®ã¾ã§æ§ã ãªäºä¾ãç¥ããã¦ãã¾ãã æ¬ä»¶ã¯ã¢ã«ã´ãªãºã ã®èå¼±æ§ã§ãããæ»æ対象ã¨ãªãã·ã¹ãã ã«ããã¦æ©æ¢°å¦ç¿ã®ä»çµã¿ãã©ã®ããã«ä½¿ããã¦ãã
{{#tags}}- {{label}}
{{/tags}}