Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …
language processing, and data mining. Although deep learning has achieved significant …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Towards data-free model stealing in a hard label setting
Abstract Machine learning models deployed as a service (MLaaS) are susceptible to model
stealing attacks, where an adversary attempts to steal the model within a restricted access …
stealing attacks, where an adversary attempts to steal the model within a restricted access …
Towards efficient data free black-box adversarial attack
Classic black-box adversarial attacks can take advantage of transferable adversarial
examples generated by a similar substitute model to successfully fool the target model …
examples generated by a similar substitute model to successfully fool the target model …
Adversarial attack and defense: A survey
H Liang, E He, Y Zhao, Z Jia, H Li - Electronics, 2022 - mdpi.com
In recent years, artificial intelligence technology represented by deep learning has achieved
remarkable results in image recognition, semantic analysis, natural language processing …
remarkable results in image recognition, semantic analysis, natural language processing …
Adv-attribute: Inconspicuous and transferable adversarial attack on face recognition
Deep learning models have shown their vulnerability when dealing with adversarial attacks.
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …
Threatening patch attacks on object detection in optical remote sensing images
Advanced patch attacks (PAs) on object detection in natural images have pointed out the
great safety vulnerability in methods based on deep neural networks (DNNs). However, little …
great safety vulnerability in methods based on deep neural networks (DNNs). However, little …
Black-box attacks on sequential recommenders via data-free model extraction
We investigate whether model extraction can be used to 'steal'the weights of sequential
recommender systems, and the potential threats posed to victims of such attacks. This type …
recommender systems, and the potential threats posed to victims of such attacks. This type …
Learning with noisy labels via sparse regularization
Learning with noisy labels is an important and challenging task for training accurate deep
neural networks. However, some commonly-used loss functions, such as Cross Entropy …
neural networks. However, some commonly-used loss functions, such as Cross Entropy …