Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Self-recoverable adversarial examples: a new effective protection mechanism in social networks
Nowadays, users upload numerous photos to social network platforms to share their daily
lives. These photos contain numerous personal information, which can be easily captured …
lives. These photos contain numerous personal information, which can be easily captured …
Cross-shaped adversarial patch attack
Y Ran, W Wang, M Li, LC Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent studies have shown that deep learning-based classifiers are vulnerable to malicious
inputs, ie, adversarial examples. A practical solution is to construct a perceptible but …
inputs, ie, adversarial examples. A practical solution is to construct a perceptible but …
A simple and strong baseline for universal targeted attacks on Siamese visual tracking
Siamese trackers are shown to be vulnerable to adversarial attacks recently. However, the
existing attack methods craft the perturbations for each video independently, which comes at …
existing attack methods craft the perturbations for each video independently, which comes at …
Imperceptible adversarial attack with multigranular spatiotemporal attention for video action recognition
In recent years, the application of video Internet of Things (IoT) in various cities and public
places has brought unprecedented opportunities to the security field and achieved great …
places has brought unprecedented opportunities to the security field and achieved great …
Meta generative attack on person reidentification
AV Subramanyam - IEEE Transactions on Circuits and Systems …, 2023 - ieeexplore.ieee.org
Adversarial attacks have been recently investigated in person re-identification. These
attacks perform well under cross dataset or cross model setting. However, the challenges …
attacks perform well under cross dataset or cross model setting. However, the challenges …
Fooling the image dehazing models by first order gradient
The research on the single image dehazing task has been widely explored. However, as far
as we know, no comprehensive study has been conducted on the robustness of the well …
as we know, no comprehensive study has been conducted on the robustness of the well …
Boosting adversarial attacks by leveraging decision boundary information
Due to the gap between a substitute model and a victim model, the gradient-based noise
generated from a substitute model may have low transferability for a victim model since their …
generated from a substitute model may have low transferability for a victim model since their …
Adversarial analysis for source camera identification
B Wang, M Zhao, W Wang, X Dai, Y Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent studies highlight the vulnerability of convolutional neural networks (CNNs) to
adversarial attacks, which also calls into question the reliability of forensic methods. Existing …
adversarial attacks, which also calls into question the reliability of forensic methods. Existing …
Using Reinforcement Learning to Escape Automatic Filter-based Adversarial Example Defense
Deep neural networks can be easily fooled by the adversarial example, which is a specially
crafted example with subtle and intentional perturbations. A plethora of papers have …
crafted example with subtle and intentional perturbations. A plethora of papers have …
Remove To Regenerate: Boosting Adversarial Generalization with Attack Invariance
X Fu, L Ma, L Zhang - … Transactions on Circuits and Systems for …, 2024 - ieeexplore.ieee.org
Adversarial attacks pose a huge challenge to the deployment of deep neural networks
(DNNs) in security-sensitive applications. Adversarial defense methods are developed to …
(DNNs) in security-sensitive applications. Adversarial defense methods are developed to …