%PDF-1.5
%
1 0 obj
<< /CP2 3 0 R /FICL:Enfocus 4 0 R /Metadata 5 0 R /Names 88 0 R /OpenAction 103 0 R /PageMode /UseOutlines /Pages 107 0 R /Type /Catalog >>
endobj
2 0 obj
<< /Author (Yiqi Zhong; Xianming Liu; Deming Zhai; Junjun Jiang; Xiangyang Ji) /Producer (pikepdf 5.1.3) /Subject (IEEE Conference on Computer Vision and Pattern Recognition) /Title (Shadows Can Be Dangerous: Stealthy and Effective Physical-World Adversarial Attack by Natural Phenomenon) >>
endobj
3 0 obj
<< /PrivateData 108 0 R /PrivateDataFilter 109 0 R >>
endobj
4 0 obj
<< /CertifiedWF 110 0 R >>
endobj
5 0 obj
<< /Subtype /XML /Type /Metadata /Length 1243 >>
stream
Shadows Can Be Dangerous: Stealthy and Effective Physical-World Adversarial Attack by Natural PhenomenonYiqi Zhong Xianming Liu Deming Zhai Junjun Jiang Xiangyang JiIEEE Conference on Computer Vision and Pattern Recognition
endstream
endobj
6 0 obj
<< /Type /ObjStm /Length 4791 /Filter /FlateDecode /N 100 /First 831 >>
stream
x[Ys۸~?o'9)Aܚ*YLl'JQ"e3DH9q~@b%9rjR3n P: A0pJE@i (PA,y@!` 9Drx$h0
ALX^E)Πqb:KqՌݨLpi%%kpH" &tR7#"2FE_Fx0 _!e$W NMaP" AUchZVе0D#n
(%hxALAA'R@%c&GXC%E8A9<04%E`d`H
cJ0@k4L`P`G
V(E ikb9`c"q
rPEX a+Lh)s$qa° F(#C1bchYa0 c6$`B0,$b;$C%& Y9*N0%-*⃭S|,2IQoA[y OneusxNY<^GE2Φ٤rzD{}4*Ljo|v;A@0.]Q> ~r^&,N.^??90AJxw~w`EU6{$fEbV"2jA'YV̾-fɻz izAP3p>.|~ڤ0ؼy,G Muw c; EG^$_w&IR;.:꺴}0F}[`|PqHt
)SVtU]]Ֆ
GҒr4lЎs.vLH I9
۠ONNwO:MΑ0nwY]Cѣ_dIʂGc3zB,/QRAD
) T8)҇x(%L뢬 %9TyW0Ge>*6<9t'Lep=8
ڑsMxOt6^%qxhEu.!aR@RBhĠ"\bp U]RXUgh|%:]!ni0z0Uw \kpiWe{/^W~0=cL
ʳXDR }d*_mT;4"_7<ƇP!:ޯ?i4nt%Q!0GbZlDiEWuGhͣ"*YtB,诨.G4)*YU_h}Fѷ[(Z1U
q0Xs)16g.<8}2I1?y]-7>HXtv{`H Q,zG')Dowp]pچI4Ώ,˅p詅z12+F5wgl[ذ4՝gow=@ꗅ99|tK[$"9'qJkZ,4'Vu@mF{5t8<{g6Y ;VGmeE Ö7@\~dj)
iFRV
LGl5]"۞mѯ_ˢV\]䒎i{eqQ&eRp;C !5$eZLRϤ5ZslR&ta?a~?Caenh&~f6C]z~hL wj7%aO!]NakvgeƣRiG>-Xåaˮ Yfd79++v=F"~}Wi}1<~Og7 c=ɪ$MdsCtr
}tPwNdGBCB?>фZT98=E5sU7A\n?*a}ʡ +-n:{vo$a*xxs]LO0m&mM!_8/ar4nt̓2$3ҨwcnCF˫}6w-tV,nVhfR]')uV v7686$-d磔u !6NyW׳<Tgt:NeqU%Yemt$Cȓa7MÎc鷢@tM~y9M
!XQ4*
m5*`m'vr%/n>4&ĐڌZףv *tMAd_o ji^}%P.w ۈHLL M6g=5FB,4(Xs,MQ-4jTș-p2
ݳgOONOd?S/