Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges
Deep learning techniques have achieved superior performance in computer-aided medical
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …
Scalable universal adversarial watermark defending against facial forgery
The illegal use of facial forgery models, such as Generative Adversarial Networks (GAN)
synthesized contents, has been on the rise, thereby posing great threats to personal …
synthesized contents, has been on the rise, thereby posing great threats to personal …
Artwork protection against neural style transfer using locally adaptive adversarial color attack
Neural style transfer (NST) generates new images by combining the style of one image with
the content of another. However, unauthorized NST can exploit artwork, raising concerns …
the content of another. However, unauthorized NST can exploit artwork, raising concerns …
Defending fake via warning: Universal proactive defense against face manipulation
The emergence of deep learning has led to the rise of malicious face manipulation
applications, which pose a significant threat to face security. In order to prevent the …
applications, which pose a significant threat to face security. In order to prevent the …
Exploring Autonomous Methods for Deepfake Detection: A Detailed Survey on Techniques and Evaluation
The fast progress of deepfake technology has caused a huge overlap between reality and
deceit, leading to substantial worries over the authenticity of dig-ital media content …
deceit, leading to substantial worries over the authenticity of dig-ital media content …
IDGuard: Robust, General, Identity-Centric POI Proactive Defense Against Face Editing Abuse
In this work, we propose IDGuard, a novel proactive defense method from the perspective of
developers, to protect Persons-of-Interest (POI) such as national leaders from face editing …
developers, to protect Persons-of-Interest (POI) such as national leaders from face editing …
How do you wish to appear? An empirical study of factors affect intention to purchase face-swap apps under social comparison perspective
Face-swap models have increasingly gained popularity in recent years because of their
improvement in generation quality and applications in privacy protection and entertainment …
improvement in generation quality and applications in privacy protection and entertainment …
Generalizable and Discriminative Representations for Adversarially Robust Few-Shot Learning
Few-shot image classification (FSIC) is beneficial for a variety of real-world scenarios,
aiming to construct a recognition system with limited training data. In this article, we extend …
aiming to construct a recognition system with limited training data. In this article, we extend …