Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Towards data-free model stealing in a hard label setting
Abstract Machine learning models deployed as a service (MLaaS) are susceptible to model
stealing attacks, where an adversary attempts to steal the model within a restricted access …
stealing attacks, where an adversary attempts to steal the model within a restricted access …
Exploring frequency adversarial attacks for face forgery detection
Various facial manipulation techniques have drawn serious public concerns in morality,
security, and privacy. Although existing face forgery classifiers achieve promising …
security, and privacy. Although existing face forgery classifiers achieve promising …
Towards efficient data free black-box adversarial attack
Classic black-box adversarial attacks can take advantage of transferable adversarial
examples generated by a similar substitute model to successfully fool the target model …
examples generated by a similar substitute model to successfully fool the target model …
Adv-attribute: Inconspicuous and transferable adversarial attack on face recognition
Deep learning models have shown their vulnerability when dealing with adversarial attacks.
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …
Robustness of sam: Segment anything under corruptions and beyond
Segment anything model (SAM), as the name suggests, is claimed to be capable of cutting
out any object and demonstrates impressive zero-shot transfer performance with the …
out any object and demonstrates impressive zero-shot transfer performance with the …
Data-free knowledge transfer: A survey
In the last decade, many deep learning models have been well trained and made a great
success in various fields of machine intelligence, especially for computer vision and natural …
success in various fields of machine intelligence, especially for computer vision and natural …