Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial attacks and defenses on graphs
Adversarial Attacks and Defenses on Graphs Page 1 Adversarial Attacks and Defenses on
Graphs: A Review, A Tool and Empirical Studies Wei **†, Yaxin Li†, Han Xu†, Yiqi Wang† …
Graphs: A Review, A Tool and Empirical Studies Wei **†, Yaxin Li†, Han Xu†, Yiqi Wang† …
Structure invariant transformation for better adversarial transferability
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial
examples, there is an urgent need for an effective adversarial attack to identify the …
examples, there is an urgent need for an effective adversarial attack to identify the …
Node similarity preserving graph convolutional networks
Graph Neural Networks (GNNs) have achieved tremendous success in various real-world
applications due to their strong ability in graph representation learning. GNNs explore the …
applications due to their strong ability in graph representation learning. GNNs explore the …
Admix: Enhancing the transferability of adversarial attacks
Deep neural networks are known to be extremely vulnerable to adversarial examples under
white-box setting. Moreover, the malicious adversaries crafted on the surrogate (source) …
white-box setting. Moreover, the malicious adversaries crafted on the surrogate (source) …
Skip connections matter: On the transferability of adversarial examples generated with resnets
Skip connections are an essential component of current state-of-the-art deep neural
networks (DNNs) such as ResNet, WideResNet, DenseNet, and ResNeXt. Despite their …
networks (DNNs) such as ResNet, WideResNet, DenseNet, and ResNeXt. Despite their …
Boosting adversarial transferability by block shuffle and rotation
K Wang, X He, W Wang… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Adversarial examples mislead deep neural networks with imperceptible perturbations and
have brought significant threats to deep learning. An important aspect is their transferability …
have brought significant threats to deep learning. An important aspect is their transferability …
Universal adversarial examples in remote sensing: Methodology and benchmark
Deep neural networks have achieved great success in many important remote sensing
tasks. Nevertheless, their vulnerability to adversarial examples should not be neglected. In …
tasks. Nevertheless, their vulnerability to adversarial examples should not be neglected. In …
Transferring robustness for graph neural network against poisoning attacks
Graph neural networks (GNNs) are widely used in many applications. However, their
robustness against adversarial attacks is criticized. Prior studies show that using …
robustness against adversarial attacks is criticized. Prior studies show that using …
Boosting the transferability of adversarial attacks with reverse adversarial perturbation
Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples,
which can produce erroneous predictions by injecting imperceptible perturbations. In this …
which can produce erroneous predictions by injecting imperceptible perturbations. In this …
Rethinking model ensemble in transfer-based adversarial attacks
It is widely recognized that deep learning models lack robustness to adversarial examples.
An intriguing property of adversarial examples is that they can transfer across different …
An intriguing property of adversarial examples is that they can transfer across different …