Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity
The outstanding performance of deep neural networks has promoted deep learning
applications in a broad set of domains. However, the potential risks caused by adversarial …
applications in a broad set of domains. However, the potential risks caused by adversarial …
Fake news detection on social media using geometric deep learning
Social media are nowadays one of the main news sources for millions of people around the
globe due to their low cost, easy access and rapid dissemination. This however comes at the …
globe due to their low cost, easy access and rapid dissemination. This however comes at the …
You only propagate once: Accelerating adversarial training via maximal principle
Deep learning achieves state-of-the-art results in many tasks in computer vision and natural
language processing. However, recent works have shown that deep networks can be …
language processing. However, recent works have shown that deep networks can be …
Learning to detect objects with a 1 megapixel event camera
E Perot, P De Tournemire, D Nitti… - Advances in Neural …, 2020 - proceedings.neurips.cc
Event cameras encode visual information with high temporal precision, low data-rate, and
high-dynamic range. Thanks to these characteristics, event cameras are particularly suited …
high-dynamic range. Thanks to these characteristics, event cameras are particularly suited …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Adversarial example detection using latent neighborhood graph
Detection of adversarial examples with high accuracy is critical for the security of deployed
deep neural network-based models. We present the first graph-based adversarial detection …
deep neural network-based models. We present the first graph-based adversarial detection …
Certified robustness for top-k predictions against adversarial perturbations via randomized smoothing
It is well-known that classifiers are vulnerable to adversarial perturbations. To defend
against adversarial perturbations, various certified robustness results have been derived …
against adversarial perturbations, various certified robustness results have been derived …
Two-stage peer-regularized feature recombination for arbitrary image style transfer
This paper introduces a neural style transfer model to generate a stylized image
conditioning on a set of examples describing the desired style. The proposed solution …
conditioning on a set of examples describing the desired style. The proposed solution …
Defending against adversarial attacks via neural dynamic system
Although deep neural networks (DNN) have achieved great success, their applications in
safety-critical areas are hindered due to their vulnerability to adversarial attacks. Some …
safety-critical areas are hindered due to their vulnerability to adversarial attacks. Some …