Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
Physical adversarial attack meets computer vision: A decade survey
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision,
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
Baseline defenses for adversarial attacks against aligned language models
As Large Language Models quickly become ubiquitous, it becomes critical to understand
their security vulnerabilities. Recent work shows that text optimizers can produce …
their security vulnerabilities. Recent work shows that text optimizers can produce …
[HTML][HTML] Preserving data privacy in machine learning systems
SZ El Mestari, G Lenzini, H Demirci - Computers & Security, 2024 - Elsevier
The wide adoption of Machine Learning to solve a large set of real-life problems came with
the need to collect and process large volumes of data, some of which are considered …
the need to collect and process large volumes of data, some of which are considered …
Adversarial texture for fooling person detectors in the physical world
Nowadays, cameras equipped with AI systems can capture and analyze images to detect
people automatically. However, the AI system can make mistakes when receiving …
people automatically. However, the AI system can make mistakes when receiving …
Naturalistic physical adversarial patch for object detectors
Most prior works on physical adversarial attacks mainly focus on the attack performance but
seldom enforce any restrictions over the appearance of the generated adversarial patches …
seldom enforce any restrictions over the appearance of the generated adversarial patches …
EVAA—Exchange vanishing adversarial attack on LiDAR point clouds in autonomous vehicles
In addition to red-green-blue (RGB) camera sensors, light detection and ranging (LiDAR)
plays an important role in autonomous vehicles (AVs) to perceive their surroundings. Deep …
plays an important role in autonomous vehicles (AVs) to perceive their surroundings. Deep …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Fawkes: Protecting privacy against unauthorized deep learning models
Today's proliferation of powerful facial recognition systems poses a real threat to personal
privacy. As Clearview. ai demonstrated, anyone can canvas the Internet for data and train …
privacy. As Clearview. ai demonstrated, anyone can canvas the Internet for data and train …
T-sea: Transfer-based self-ensemble attack on object detection
Compared to query-based black-box attacks, transfer-based black-box attacks do not
require any information of the attacked models, which ensures their secrecy. However, most …
require any information of the attacked models, which ensures their secrecy. However, most …