Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Review the state-of-the-art technologies of semantic segmentation based on deep learning
The goal of semantic segmentation is to segment the input image according to semantic
information and predict the semantic category of each pixel from a given label set. With the …
information and predict the semantic category of each pixel from a given label set. With the …
A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability
In the past few years, significant progress has been made on deep neural networks (DNNs)
in achieving human-level performance on several long-standing tasks. With the broader …
in achieving human-level performance on several long-standing tasks. With the broader …
Backdoor learning: A survey
Backdoor attack intends to embed hidden backdoors into deep neural networks (DNNs), so
that the attacked models perform well on benign samples, whereas their predictions will be …
that the attacked models perform well on benign samples, whereas their predictions will be …
Frequency-driven imperceptible adversarial attack on semantic similarity
Current adversarial attack research reveals the vulnerability of learning-based classifiers
against carefully crafted perturbations. However, most existing attack methods have inherent …
against carefully crafted perturbations. However, most existing attack methods have inherent …
Invisible backdoor attacks on deep neural networks via steganography and regularization
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where
hidden features (patterns) trained to a normal model, which is only activated by some …
hidden features (patterns) trained to a normal model, which is only activated by some …
Artificial intelligence security: Threats and countermeasures
In recent years, with rapid technological advancement in both computing hardware and
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …
Enhancing adversarial example transferability with an intermediate level attack
Neural networks are vulnerable to adversarial examples, malicious inputs crafted to fool
trained models. Adversarial examples often exhibit black-box transfer, meaning that …
trained models. Adversarial examples often exhibit black-box transfer, meaning that …
Domain impression: A source data free domain adaptation method
VK Kurmi, VK Subramanian… - Proceedings of the …, 2021 - openaccess.thecvf.com
Unsupervised Domain adaptation methods solve the adaptation problem for an unlabeled
target set, assuming that the source dataset is available with all labels. However, the …
target set, assuming that the source dataset is available with all labels. However, the …
Towards transferable adversarial attack against deep face recognition
Face recognition has achieved great success in the last five years due to the development of
deep learning methods. However, deep convolutional neural networks (DCNNs) have been …
deep learning methods. However, deep convolutional neural networks (DCNNs) have been …
Rethinking the trigger of backdoor attack
Backdoor attack intends to inject hidden backdoor into the deep neural networks (DNNs),
such that the prediction of the infected model will be maliciously changed if the hidden …
such that the prediction of the infected model will be maliciously changed if the hidden …