%PDF-1.6
%
1 0 obj
<< /CP2 3 0 R /FICL:Enfocus 4 0 R /Metadata 5 0 R /Names 41 0 R /OpenAction 83 0 R /PageMode /UseOutlines /Pages 181 0 R /Type /Catalog >>
endobj
2 0 obj
<< /Author (Jianping Zhang; Weibin Wu; Jen-tse Huang; Yizhan Huang; Wenxuan Wang; Yuxin Su; Michael R. Lyu) /Producer (pikepdf 5.1.3) /Subject (IEEE Conference on Computer Vision and Pattern Recognition) /Title (Improving Adversarial Transferability via Neuron Attribution-Based Attacks) >>
endobj
3 0 obj
<< /PrivateData 182 0 R /PrivateDataFilter 183 0 R >>
endobj
4 0 obj
<< /CertifiedWF 184 0 R >>
endobj
5 0 obj
<< /Subtype /XML /Type /Metadata /Length 1274 >>
stream
Improving Adversarial Transferability via Neuron Attribution-Based AttacksJianping Zhang Weibin Wu Jen-tse Huang Yizhan Huang Wenxuan Wang Yuxin Su Michael R. LyuIEEE Conference on Computer Vision and Pattern Recognition
endstream
endobj
6 0 obj
<< /Type /ObjStm /Length 3372 /Filter /FlateDecode /N 73 /First 581 >>
stream
xZ[~ﯘǸ@Ƽ_hnҴNSI+ݕlIK~}8&)ڗb3yHmT:r;}UB̝6]0JuBG<¦ O@Jhf LvSRʝhB?>&8|=8HIkbgx|ogUg
xO :kY~@z|T Id OI^rsD*ҁ^==7xBN*y;f-P)P\ƺCoD2Ms2 ]p!uAwQC`v@u1>L^a< zuX
r>r>)PlEUi
t*zFlU0Xt\guY\/v_ެgQ:כz1zPG|v|=uv={ur>9_nv^{@϶7kL$|qz?[ot)6'-ϻGD_@rk(uysuu>Rf]m.Ɂ_\.v9b]/.nˋ $u+fvu=j}hpzqbTzھXZmwvn^-48]yݘބC?yw/̎9/Z䯴@˻~֣GoϷ0ox=|6Y~xl嫿<^~:jvdnGnvۼ2_VmۛM^O1֭Ȩ^\A*æŜ:_Bn6~T-7/YqjJ-,Z0PC#}Z`ElNÆMDLBCmXQtfz3"PLFaG
rCɧ4vG n15
:Cۡ9t@:4wh]cR TBdXÿ~Zve -ϴiŤ2:bRi ˁ=^>0HVZZl>l]Ю.7aT