Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …
language processing, and data mining. Although deep learning has achieved significant …
[HTML][HTML] A comprehensive survey of robust deep learning in computer vision
Deep learning has presented remarkable progress in various tasks. Despite the excellent
performance, deep learning models remain not robust, especially to well-designed …
performance, deep learning models remain not robust, especially to well-designed …
Tight certificates of adversarial robustness for randomly smoothed classifiers
Strong theoretical guarantees of robustness can be given for ensembles of classifiers
generated by input randomization. Specifically, an $\ell_2 $ bounded adversary cannot alter …
generated by input randomization. Specifically, an $\ell_2 $ bounded adversary cannot alter …
Query-efficient black-box adversarial attack with customized iteration and sampling
It is a challenging task to fool an image classifier based on deep neural networks under the
black-box setting where the target model can only be queried. Among existing black-box …
black-box setting where the target model can only be queried. Among existing black-box …
Scaleable input gradient regularization for adversarial robustness
In this work we revisit gradient regularization for adversarial robustness with some new
ingredients. First, we derive new per-image theoretical robustness bounds based on local …
ingredients. First, we derive new per-image theoretical robustness bounds based on local …
Polishing decision-based adversarial noise with a customized sampling
As an effective black-box adversarial attack, decision-based methods polish adversarial
noise by querying the target model. Among them, boundary attack is widely applied due to …
noise by querying the target model. Among them, boundary attack is widely applied due to …
A black-box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers
Constructing adversarial perturbations for deep neural networks is an important direction of
research. Crafting image-dependent adversarial perturbations using white-box feedback …
research. Crafting image-dependent adversarial perturbations using white-box feedback …
UPAM: unified prompt attack in text-to-image generation models against both textual filters and visual checkers
Text-to-Image (T2I) models have raised security concerns due to their potential to generate
inappropriate or harmful images. In this paper, we propose UPAM, a novel framework that …
inappropriate or harmful images. In this paper, we propose UPAM, a novel framework that …
Improved gradient-based adversarial attacks for quantized networks
Neural network quantization has become increasingly popular due to efficient memory
consumption and faster computation resulting from bitwise operations on the quantized …
consumption and faster computation resulting from bitwise operations on the quantized …
Restricted‐Area Adversarial Example Attack for Image Captioning Model
H Kwon, SH Kim - Wireless Communications and Mobile …, 2022 - Wiley Online Library
Deep neural networks provide good performance in the fields of image recognition, speech
recognition, and text recognition. For example, recurrent neural networks are used by image …
recognition, and text recognition. For example, recurrent neural networks are used by image …