Better diffusion models further improve adversarial training

Z Wang, T Pang, C Du, M Lin… - … on Machine Learning, 2023 - proceedings.mlr.press
It has been recognized that the data generated by the denoising diffusion probabilistic
model (DDPM) improves adversarial training. After two years of rapid development in …

A survey on physical adversarial attack in computer vision

D Wang, W Yao, T Jiang, G Tang, X Chen - arxiv preprint arxiv …, 2022 - arxiv.org
Over the past decade, deep learning has revolutionized conventional tasks that rely on hand-
craft feature extraction with its strong feature learning capability, leading to substantial …

A comprehensive study on the robustness of deep learning-based image classification and object detection in remote sensing: Surveying and benchmarking

S Mei, J Lian, X Wang, Y Su, M Ma… - Journal of Remote …, 2024 - spj.science.org
Deep neural networks (DNNs) have found widespread applications in interpreting remote
sensing (RS) imagery. However, it has been demonstrated in previous works that DNNs are …

LESSON: Multi-label adversarial false data injection attack for deep learning locational detection

J Tian, C Shen, B Wang, X **a… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep learning methods can not only detect false data injection attacks (FDIA) but also locate
attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep …

Threatening patch attacks on object detection in optical remote sensing images

X Sun, G Cheng, L Pei, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Advanced patch attacks (PAs) on object detection in natural images have pointed out the
great safety vulnerability in methods based on deep neural networks (DNNs). However, little …

Global to local: A scale-aware network for remote sensing object detection

T Gao, Q Niu, J Zhang, T Chen, S Mei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the wide application of remote sensing images (RSIs) in military and civil fields, remote
sensing object detection (RSOD) has gradually become a hot research direction. However …

Task-specific importance-awareness matters: On targeted attacks against object detection

X Sun, G Cheng, H Li, H Peng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Targeted Attacks on Object Detection (TAOD) aim to deceive the victim detector into
recognizing a specific instance as the predefined target category while minimizing the …

CBA: Contextual background attack against optical aerial detection in the physical world

J Lian, X Wang, Y Su, M Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Patch-based physical attacks have increasingly aroused concerns. However, most existing
methods focus on obscuring targets captured on the ground, and some of these methods are …

QKSAN: A quantum kernel self-attention network

RX Zhao, J Shi, X Li - IEEE Transactions on Pattern Analysis …, 2024 - ieeexplore.ieee.org
The Self-Attention Mechanism (SAM) excels at distilling important information from the
interior of data to improve the computational efficiency of models. Nevertheless, many …

Transferable adversarial attacks for remote sensing object recognition via spatial-frequency co-transformation

Y Fu, Z Liu, J Lyu - IEEE Transactions on Geoscience and …, 2024 - ieeexplore.ieee.org
Adversarial attacks serve as an efficient approach to investigating model robustness,
providing insights into internal weaknesses. In real-world applications, the model …