ГОСТ Р 70462.1—2022
[63] Lau С.Р., Lai Y.H., Lui L.M. Restoration ofAtmospheric Turbulence-distorted Images via RPCAand Quasiconformal
Maps. Computer Vision and Pattern Recognition. 2017
[64]Mao Y., Gilles J. Non Rigid Geometric Distortions Correction — Application ToAtmospheric Turbulence Stabilization.
Inverse Problems & Imaging, Vol. 6. 2012, ISSN 1930-8337
[65] Gajjar R., Zaveri T, Shukla A. Invariants based blur classification algorithm. IEEE, 5th Nirma University International
Conference on Engineering. 2009
[66]P., THEUWISSEN A.J. Solid State Imaging with charge-Coupled Devices. Springer. 1995
[67]Janesick J.R. Scientific Charge-Coupled Devices. Spie Press Monograph. 2000
[68] Ishihara Y., Oda E., Tanigawa H., Teranishi N., Takeuchi E., Akiyama I. et al. Interline CCD image sensor with
an anti-blooming structure, 1982 IEEE International Solid-State Circuits Conference. Digest of Technical Papers,
Vol. XXV. 1982
[69] Svetkoff D.J. Image Quality Evaluation Of Machine Vision Sensors. SPIE, Optics, Illumination, and Image Sensing
for Machine Vision II, Vol. 0850. 1988
[70]Nakamura J. Image sensors and signal processing for digital still cameras. Taylor & Francis. 2016
[71]Gong Y., Poellabauer C. An Overview of Vulnerabilities of Voice Controlled Systems. ArXiv. 2018, доступно no
https://arxiv.org/pdf/1803.09156.pdf
[72] Giechaskiel I., Rasmussen K.B. Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses.
ArXiv. 2019, доступно no
https://arxiv.org/pdf/1901.06935.pdf
[73]Vaidya T, Zhang Y., Sherr M., Shields C. Cocaine Noodles: Exploiting the Gap between Human and Machine
Speech Recognition. USENIX Association, Proceedings of the 9th USENIX Conference on Offensive Technologies.
2019
[74] Carlini N., Mishra P., Vaidya T, Zhang Y., Sherr M., Shields C. et al. Hidden voice commands. USENIX Association,
2016, 25th USENIX Security Symposium. 2016, pp. 513—530, ISBN 978-1-931971-32-4, доступно no https://
nicholas. carlini. com/papers/2016_usenix_hiddenvoicecommands.pdf
[75] Alzantot M., Balaji B., Srivastava M. Did you hear that? Adversarial examples against automatic speech recognition.
ArXiv. 2018, доступно no
https://arxiv.org/pdf/1801.00554.pdf
[76] Taori R., Kamsetty A., Chu B., Vemuri N. Targeted adversarial examples for black box audio systems. ArXiv. 2018,
доступно из:
https://arxiv.org/pdf/1805.07820.pdf
[77] Du T, Ji S., Li J., Gu Q., Wang T, Beyah R. Sirenattack: Generating adversarial audio for end-toend acoustic
systems. ArXiv. 2019, доступно no
https://arxiv.org/abs/1901.07846
[78] Carlini N., Wagner D. Audio adversarial examples: Targeted attacks on speech-to-text. IEEE Security and Privacy
Workshops. 2018
[79] Qin Y., Carlini N., Goodfellow I., Cottrell G., Raffel C. Imperceptible, Robust and Targeted Adversarial Examples
for Automatic Speech Recognition. Proceedings of the 36th International Conference on Machine Learning. 2019
[80] Schonherr L., Kohls K., Zeiler S., Holz T., Kolossa D. Adversarial attacks against automatic speech recognition
systems via psychoacoustic hiding. 26th Annual Network and Distributed System Security Symposium. 2018, до
ступно no
https://arxiv.org/abs/1808.05665
[81] Neekhara P., Hussain S., Pandey P., Dubnov S., Me Cauley J., Koushnafar F. Universal Adversarial Perturbations
for Speech Recognition Systems. ArXiv. 2019, доступно no
https://arxiv.org/abs/1905.03828
[82] Yuan X., Chen Y., Zhao Y., Long Y., Liu X., Chen K. et al. CommanderSong: A systematic approach for practical
adversarial voice recognition. USENIX Association. 2018, 27th USENIX Security Symposium USENIX Security 18.
2018, pp. 49—64, доступно no
https://arxiv.org/abs/1801.08535
[83] Zhang G., Yan C., Ji X., Zhang T, Zhang T, Xu W. DolphinAttack: Inaudible Voice Commands. ACM, Proceedings of
the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, ISBN 978-1-4503-4946-8,
доступно no
https://arxiv.org/pdf/1708.09537.pdf
26