Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Improving the adversarial transferability of vision transformers with virtual dense connection
With the great achievement of vision transformers (ViTs), transformer-based approaches
have become the new paradigm for solving various computer vision tasks. However, recent …
have become the new paradigm for solving various computer vision tasks. However, recent …
Improving Transferable Targeted Adversarial Attacks with Model Self-Enhancement
Various transfer attack methods have been proposed to evaluate the robustness of deep
neural networks (DNNs). Although manifesting remarkable performance in generating …
neural networks (DNNs). Although manifesting remarkable performance in generating …
Curvature-invariant adversarial attacks for 3d point clouds
Imperceptibility is one of the crucial requirements for adversarial examples. Previous
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …
Your code secret belongs to me: neural code completion tools can memorize hard-coded credentials
Neural Code Completion Tools (NCCTs) have reshaped the field of software engineering,
which are built upon the language modeling technique and can accurately suggest …
which are built upon the language modeling technique and can accurately suggest …
Attention-SA: Exploiting Model-approximated Data Semantics for Adversarial Attack
Adversarial Defense of deep neural networks have gained significant attention and there
have been active research efforts on model vulnerabilities for attacking such as gradient …
have been active research efforts on model vulnerabilities for attacking such as gradient …
Large Language Models are Good Multi-lingual Learners: When LLMs Meet Cross-lingual Prompts
With the advent of Large Language Models (LLMs), generating rule-based data for real-
world applications has become more accessible. Due to the inherent ambiguity of natural …
world applications has become more accessible. Due to the inherent ambiguity of natural …
Probing the robustness of vision-language pretrained models: A multimodal adversarial attack approach
Vision-language pretraining (VLP) with transformers has demonstrated exceptional
performance across numerous multimodal tasks. However, the adversarial robustness of …
performance across numerous multimodal tasks. However, the adversarial robustness of …
[PDF][PDF] IntensPure: attack intensity-aware secondary domain adaptive diffusion for adversarial purification
Adversarial attacks pose a severe threat to the accuracy of person re-identification (re-ID)
systems, a critical security technology. Adversarial purification methods are promising …
systems, a critical security technology. Adversarial purification methods are promising …