| [1]Zhao Y, Zhu H, Liang R, et al. Seeing isn’t believing: Towards more robust adversarial attack against real world object detectors[C] Proc of the 2019 ACM SIGSAC Conf on Computer and Communications Security. London United Kingdom: ACM, 2019: 19892004[2]Johnson J, Krishna R, Stark M, et al. Image retrieval using scene graphs[C] Proc of 2015 IEEE Conf on Computer Vision and Pattern Recognition (CVPR). Roston, VA, USA: IEEE, 2015: 36683678[3]梁超, 王子博, 张耀方, 等. 基于知识图谱推理的工控漏洞利用关系预测方法[J]. 信息安全研究, 2024, 10(6): 498505[4]Xu D, Zhu Y, Choy C B, et al. Scene graph generation by iterative message passing[C] Proc of 2017 IEEE Conf on Computer Vision and Pattern Recognition (CVPR). Roston, VA, USA: IEEE, 2017: 30973106[5]Liang Y, Bai Y, Zhang W, et al. VrRVG: Refocusing visuallyrelevant relationships[C] Proc of the IEEECVF Int Conf on Computer Vision (ICCV). Roston, VA, USA: IEEE, 2019: 1040310412[6]刘连山, 黄瑜. 基于三通道深度融合技术的图像隐写方法[J]. 信息安全研究, 2025, 11(3): 257264[7]屈梦楠, 靳宇浩, 邬江. 基于隐式对称生成对抗网络的图像隐写与提取方案[J]. 信息安全研究, 2023, 9(6): 566572 |