Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Rethinking the backward propagation for adversarial transferability
Transfer-based attacks generate adversarial examples on the surrogate model, which can
mislead other black-box models without access, making it promising to attack real-world …
mislead other black-box models without access, making it promising to attack real-world …
Feature-aware transferable adversarial attacks against image classification
S Cheng, P Li, K Han, H Xu - Applied Soft Computing, 2024 - Elsevier
Compared to white-box adversarial attacks, black-box adversarial attacks are more
applicable in practical scenarios and have received significant attention. However, most …
applicable in practical scenarios and have received significant attention. However, most …
Exploring robustness connection between artificial and natural adversarial examples
Although recent deep neural network algorithm has shown tremendous success in several
computer vision tasks, their vulnerability against minute adversarial perturbations has raised …
computer vision tasks, their vulnerability against minute adversarial perturbations has raised …
Training meta-surrogate model for transferable adversarial attack
The problem of adversarial attacks to a black-box model when no queries are allowed has
posed a great challenge to the community and has been extensively investigated. In this …
posed a great challenge to the community and has been extensively investigated. In this …
Improving transferability of adversarial examples with powerful affine-shear transformation attack
X Wang, C Huang, H Cheng - Computer Standards & Interfaces, 2023 - Elsevier
Image classification models based on deep neural networks have made great improvements
on various tasks, but they are still vulnerable to adversarial examples that could increase the …
on various tasks, but they are still vulnerable to adversarial examples that could increase the …
Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack
R Zhang, H **a, Z Kang, Z Li, Y Du… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Contemporary research on adversarial attacks in Intelligent Internet of Things focuses on
balancing two key aspects: 1) transferability and 2) imperceptibility. However, achieving a …
balancing two key aspects: 1) transferability and 2) imperceptibility. However, achieving a …
Improving the transferability of adversarial attacks via self-ensemble
Deep neural networks have been used extensively for diverse visual tasks, including object
detection, face recognition, and image classification. However, they face several security …
detection, face recognition, and image classification. However, they face several security …
Enhancing adversarial training via reweighting optimization trajectory
Despite the fact that adversarial training has become the de facto method for improving the
robustness of deep neural networks, it is well-known that vanilla adversarial training suffers …
robustness of deep neural networks, it is well-known that vanilla adversarial training suffers …
Improving transferability of adversarial examples by saliency distribution and data augmentation
Although deep neural networks (DNNs) have advanced performance in many application
scenarios, they are vulnerable to the attacks of adversarial examples that are crafted by …
scenarios, they are vulnerable to the attacks of adversarial examples that are crafted by …
A survey of adversarial captchas on its history, classification and generation
Completely Automated Public Turing test to tell Computers and Humans Apart, short for
CAPTCHA, is an essential and relatively easy way to defend against malicious attacks …
CAPTCHA, is an essential and relatively easy way to defend against malicious attacks …