Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic
decision‐making (DM), these systems have found wide‐ranging applications across diverse …
decision‐making (DM), these systems have found wide‐ranging applications across diverse …
Anti-adversarially manipulated attributions for weakly and semi-supervised semantic segmentation
Weakly supervised semantic segmentation produces a pixel-level localization from class
labels; but a classifier trained on such labels is likely to restrict its focus to a small …
labels; but a classifier trained on such labels is likely to restrict its focus to a small …
Nesterov accelerated gradient and scale invariance for adversarial attacks
Deep learning models are vulnerable to adversarial examples crafted by applying human-
imperceptible perturbations on benign inputs. However, under the black-box setting, most …
imperceptible perturbations on benign inputs. However, under the black-box setting, most …
Hover-net: Simultaneous segmentation and classification of nuclei in multi-tissue histology images
Nuclear segmentation and classification within Haematoxylin & Eosin stained histology
images is a fundamental prerequisite in the digital pathology work-flow. The development of …
images is a fundamental prerequisite in the digital pathology work-flow. The development of …
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Improving transferability of adversarial examples with input diversity
Though CNNs have achieved the state-of-the-art performance on various vision tasks, they
are vulnerable to adversarial examples---crafted by adding human-imperceptible …
are vulnerable to adversarial examples---crafted by adding human-imperceptible …
Kornia: an open source differentiable computer vision library for pytorch
This work presents Kornia--an open source computer vision library which consists of a set of
differentiable routines and modules to solve generic computer vision problems. At its core …
differentiable routines and modules to solve generic computer vision problems. At its core …
Adversarially robust generalization requires more data
Abstract Machine learning models are often susceptible to adversarial perturbations of their
inputs. Even small perturbations can cause state-of-the-art classifiers with high" standard" …
inputs. Even small perturbations can cause state-of-the-art classifiers with high" standard" …
Audio adversarial examples: Targeted attacks on speech-to-text
We construct targeted audio adversarial examples on automatic speech recognition. Given
any audio waveform, we can produce another that is over 99.9% similar, but transcribes as …
any audio waveform, we can produce another that is over 99.9% similar, but transcribes as …