Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Physical adversarial attack meets computer vision: A decade survey
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision,
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing adversarial attack methods against detectors involve adding adversarial
perturbations to benign images to synthesize adversarial examples. However, directly …
perturbations to benign images to synthesize adversarial examples. However, directly …
Duaw: Data-free universal adversarial watermark against stable diffusion customization
Stable Diffusion (SD) customization approaches enable users to personalize SD model
outputs, greatly enhancing the flexibility and diversity of AI art. However, they also allow …
outputs, greatly enhancing the flexibility and diversity of AI art. However, they also allow …