Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
How deep learning sees the world: A survey on adversarial attacks & defenses
Deep Learning is currently used to perform multiple tasks, such as object recognition, face
recognition, and natural language processing. However, Deep Neural Networks (DNNs) are …
recognition, and natural language processing. However, Deep Neural Networks (DNNs) are …
Texture re-scalable universal adversarial perturbation
Universal adversarial perturbation (UAP), also known as image-agnostic perturbation, is a
fixed perturbation map that can fool the classifier with high probabilities on arbitrary images …
fixed perturbation map that can fool the classifier with high probabilities on arbitrary images …
Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training
Deep neural networks (DNNs) are vulnerable to highly transferable adversarial attacks.
Especially many studies have shown that sparse attacks pose a significant threat to DNNs …
Especially many studies have shown that sparse attacks pose a significant threat to DNNs …
Rethinking impersonation and dodging attacks on face recognition systems
Face Recognition (FR) systems can be easily deceived by adversarial examples that
manipulate benign face images through imperceptible perturbations. Adversarial attacks on …
manipulate benign face images through imperceptible perturbations. Adversarial attacks on …
Adversarial attacks on both face recognition and face anti-spoofing models
Adversarial attacks on Face Recognition (FR) systems have proven highly effective in
compromising pure FR models, yet adversarial examples may be ineffective to the complete …
compromising pure FR models, yet adversarial examples may be ineffective to the complete …
Boosting the Transferability of Adversarial Attack on Vision Transformer with Adaptive Token Tuning
Vision transformers (ViTs) perform exceptionally well in various computer vision tasks but
remain vulnerable to adversarial attacks. Recent studies have shown that the transferability …
remain vulnerable to adversarial attacks. Recent studies have shown that the transferability …
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
With the great development of generative model techniques, face forgery detection draws
more and more attention in the related field. Researchers find that existing face forgery …
more and more attention in the related field. Researchers find that existing face forgery …
Devil in Shadow: Attacking NIR-VIS Heterogeneous Face Recognition via Adversarial Shadow
Near infrared-visible (NIR-VIS) heterogeneous face recognition aims to match face identities
in cross-modality settings, which has achieved significant development recently. The work …
in cross-modality settings, which has achieved significant development recently. The work …
Enhancing the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation
Face Recognition (FR) models are vulnerable to adversarial examples that subtly
manipulate benign face images, underscoring the urgent need to improve the transferability …
manipulate benign face images, underscoring the urgent need to improve the transferability …