Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
Ai agents under threat: A survey of key security challenges and future pathways
An Artificial Intelligence (AI) agent is a software entity that autonomously performs tasks or
makes decisions based on pre-defined objectives and data inputs. AI agents, capable of …
makes decisions based on pre-defined objectives and data inputs. AI agents, capable of …
Badclip: Dual-embedding guided backdoor attack on multimodal contrastive learning
While existing backdoor attacks have successfully infected multimodal contrastive learning
models such as CLIP they can be easily countered by specialized backdoor defenses for …
models such as CLIP they can be easily countered by specialized backdoor defenses for …
{X-Adv}: Physical adversarial object attacks against x-ray prohibited item detection
Adversarial attacks are valuable for evaluating the robustness of deep learning models.
Existing attacks are primarily conducted on the visible light spectrum (eg, pixel-wise texture …
Existing attacks are primarily conducted on the visible light spectrum (eg, pixel-wise texture …
Dual attention suppression attack: Generate adversarial camouflage in physical world
Deep learning models are vulnerable to adversarial examples. As a more threatening type
for practical deep learning systems, physical adversarial examples have received extensive …
for practical deep learning systems, physical adversarial examples have received extensive …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Vl-trojan: Multimodal instruction backdoor attacks against autoregressive visual language models
Abstract Autoregressive Visual Language Models (VLMs) demonstrate remarkable few-shot
learning capabilities within a multimodal context. Recently, multimodal instruction tuning has …
learning capabilities within a multimodal context. Recently, multimodal instruction tuning has …
Exploring the relationship between architectural design and adversarially robust generalization
Adversarial training has been demonstrated to be one of the most effective remedies for
defending adversarial examples, yet it often suffers from the huge robustness generalization …
defending adversarial examples, yet it often suffers from the huge robustness generalization …
Patch-wise attack for fooling deep neural network
By adding human-imperceptible noise to clean images, the resultant adversarial examples
can fool other unknown models. Features of a pixel extracted by deep neural networks …
can fool other unknown models. Features of a pixel extracted by deep neural networks …
Bias-based universal adversarial patch attack for automatic check-out
Adversarial examples are inputs with imperceptible perturbations that easily misleading
deep neural networks (DNNs). Recently, adversarial patch, with noise confined to a small …
deep neural networks (DNNs). Recently, adversarial patch, with noise confined to a small …