Physical adversarial attack meets computer vision: A decade survey
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision,
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
A survey on physical adversarial attack in computer vision
Over the past decade, deep learning has revolutionized conventional tasks that rely on hand-
craft feature extraction with its strong feature learning capability, leading to substantial …
craft feature extraction with its strong feature learning capability, leading to substantial …
Hoianimator: Generating text-prompt human-object animations using novel perceptive diffusion models
To date the quest to rapidly and effectively produce human-object interaction (HOI)
animations directly from textual descriptions stands at the forefront of computer vision …
animations directly from textual descriptions stands at the forefront of computer vision …
Edge video analytics: A survey on applications, systems and enabling techniques
Video, as a key driver in the global explosion of digital information, can create tremendous
benefits for human society. Governments and enterprises are deploying innumerable …
benefits for human society. Governments and enterprises are deploying innumerable …
Face encryption via frequency-restricted identity-agnostic attacks
Billions of people are sharing their daily live images on social media everyday. However,
malicious collectors use deep face recognition systems to easily steal their biometric …
malicious collectors use deep face recognition systems to easily steal their biometric …
Artwork protection against neural style transfer using locally adaptive adversarial color attack
Neural style transfer (NST) generates new images by combining the style of one image with
the content of another. However, unauthorized NST can exploit artwork, raising concerns …
the content of another. However, unauthorized NST can exploit artwork, raising concerns …
Artificial Immune System of Secure Face Recognition Against Adversarial Attacks
Deep learning-based face recognition models are vulnerable to adversarial attacks. In
contrast to general noises, the presence of imperceptible adversarial noises can lead to …
contrast to general noises, the presence of imperceptible adversarial noises can lead to …
Physical adversarial attacks for surveillance: A survey
Modern automated surveillance techniques are heavily reliant on deep learning methods.
Despite the superior performance, these learning systems are inherently vulnerable to …
Despite the superior performance, these learning systems are inherently vulnerable to …
Rethinking impersonation and dodging attacks on face recognition systems
Face Recognition (FR) systems can be easily deceived by adversarial examples that
manipulate benign face images through imperceptible perturbations. Adversarial attacks on …
manipulate benign face images through imperceptible perturbations. Adversarial attacks on …
Adversarial examples in the physical world: A survey
Deep neural networks (DNNs) have demonstrated high vulnerability to adversarial
examples, raising broad security concerns about their applications. Besides the attacks in …
examples, raising broad security concerns about their applications. Besides the attacks in …