Improving the adversarial transferability with relational graphs ensemble adversarial attack. [PDF]
Pi J, Luo C, Xia F, Jiang N, Wu H, Wu Z.
europepmc +1 more source
Pixel Lens: A Granular Assessment of Saliency Explanations
We propose a pipeline that detects shortcut‐dominated classifiers by comparing predictions on clean and shortcut‐perturbed images and checking dominance via a Shapley‐based ground‐truth explainer. The workflow quantifies the explanation quality of different explainable artificial intelligence (XAI) methods.
Kanglong Fan +5 more
wiley +1 more source
ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model. [PDF]
Fu Z, Cui X.
europepmc +1 more source
Deviation‐Guided Attention for Semi‐Supervised Anomaly Detection With Contrastive Regularisation
ABSTRACT Anomaly detection (AD) aims to identify abnormal patterns that deviate from normal behaviour, playing a critical role in applications such as industrial inspection, medical imaging and autonomous driving. However, AD often faces a scarcity of labelled data. To address this challenge, we propose a novel semi‐supervised anomaly detection method,
Guanglei Xie +6 more
wiley +1 more source
Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve the performance. The adversarial attack technology makes both these models face severe challenges.
Xueshuai Gao +6 more
doaj +1 more source
SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research. [PDF]
Gao W, Liu Y, Zeng Y, Liu Q, Li Q.
europepmc +1 more source
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks [PDF]
Felix Assion +6 more
openalex +1 more source
Towards Interpretable Face Morphing via Unsupervised Learning of Layer‐Wise and Local Features
ABSTRACT Discovering meaningful face morphing is critical for applications in image synthesis. Traditional unsupervised methods rely on global or layer‐wise representations, neglecting finer local details and thus limiting the control over specific facial attributes.
Cheng Yu, Chuan Chen, Wenmin Wang
wiley +1 more source
The Threat of Adversarial Attack on a COVID-19 CT Image-Based Deep Learning System. [PDF]
Li Y, Liu S.
europepmc +1 more source
Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods [PDF]
Arif Siddiqi
openalex +1 more source

