%PDF-1.6
%
1 0 obj
<< /CP2 3 0 R /FICL:Enfocus 4 0 R /Metadata 5 0 R /Names 41 0 R /OpenAction 120 0 R /PageMode /UseOutlines /Pages 195 0 R /Type /Catalog >>
endobj
2 0 obj
<< /Author (Linjun Zhou; Peng Cui; Xingxuan Zhang; Yinan Jiang; Shiqiang Yang) /Producer (pikepdf 5.1.3) /Subject (IEEE Conference on Computer Vision and Pattern Recognition) /Title (Adversarial Eigen Attack on Black-Box Models) >>
endobj
3 0 obj
<< /PrivateData 196 0 R /PrivateDataFilter 197 0 R >>
endobj
4 0 obj
<< /CertifiedWF 198 0 R >>
endobj
5 0 obj
<< /Subtype /XML /Type /Metadata /Length 1183 >>
stream
Adversarial Eigen Attack on Black-Box ModelsLinjun Zhou Peng Cui Xingxuan Zhang Yinan Jiang Shiqiang YangIEEE Conference on Computer Vision and Pattern Recognition
endstream
endobj
6 0 obj
<< /Type /ObjStm /Length 5479 /Filter /FlateDecode /N 100 /First 833 >>
stream
x[k6&YTj8~Ʊۉ3)V=t~[yTMmHB xq\W*TQ+mӶhMkX)kM%M|@?[5&W5VsxTʀ+]IjdT
NUJcX܄*mj[\
ҞG
Wj(v]Sk0U%U颋 5C[qhr +!vxWWbue5G52 TdWwZ+ k u V0Vqׁ+/!X\
5?Xข.
S]:(mJ
CNTJI-8
> GFM<)=( exW xgyP5. k M AрZ4ZrUM
~zi[BALvQm`V,a V%Rt=jF?+XėQ7Z.UPx0i/X`6]ݻ7!euÇ()K]i;n.+xN_L/'?k~|hеxꮿcyHx-*vG_WK0xՍ.3U˰_'ݝ\9ܴKTI{F%S]}Ӹ>[s67eUV{usU_ϮuN/I83+*ZwY?¥pF(Am?`ӈN`o
LS;7x3p/'݃xYCP>7xX
"}lgBd ǵ>!#! CxX/52X]+81k@\b}ha<
c,
@5l5ͱ PV@1=*?hy:ېJ8jm+)7fpHmbG[r*+10l"ֱ-ACH6DCGom%Ab3IqDlLH.MGl;Gu^&$Pb<[Qb6v ZL7jŁ`{7f"0v}X|:Lv1O/6؝}/dz)nsU
nɶ↷fŒm$(_.v?1 +U7vowr?-]d*5Rj!
3x_Anzsdq 7ݪWxZ/=ލg6i.0ͦٚ y;يքE"nnhWvJE/ք閳yFGdM^8/>_2Cg|vo?~[t>aJgwI~4 W7n}W-fMn>ΘyXe~+Rց,Q|v?HP*YxEU9G&oY%+qB1+1c\p]WbHq 9^CitCHF?ǰrE*yT2Xbxk=k*.J6tl#MU"&v*i34v6!IeqЃ?nbN".5M̖gZXP{s&H1õnS2EXHyAɸ1?.S!Cv E->QmGr5Q]σ*obƙ_u+@.^܇}~]Qoԝ'G?nK^=_ =St@KxW(V\ACtP|b9iX8yoQ̣B1