Results 211 to 220 of about 85,909 (246)
FP-ZOO: Fast Patch-Based Zeroth Order Optimization for Black-Box Adversarial Attacks on Vision Models. [PDF]
Seo J, Jeon S.
europepmc +1 more source
CCIW: Cover-Concealed Image Watermarking for Dual Protection of Privacy and Copyright. [PDF]
Li R, Wang S, Li M, Ren H.
europepmc +1 more source
Investigating vulnerabilities of gait recognition model using latent-based perturbations. [PDF]
Ali Z +5 more
europepmc +1 more source
The strength of Nesterov's accelerated gradient in boosting transferability of stealthy adversarial attacks. [PDF]
Lin C, Long S.
europepmc +1 more source
Hybrid GNN-LSTM defense with differential privacy and secure multi-party computation for edge-optimized neuromorphic autonomous systems. [PDF]
Rekik S, Mehmood S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Sinkhorn Adversarial Attack and Defense
IEEE Transactions on Image Processing, 2022Adversarial attacks have been extensively investigated in the recent past. Quite interestingly, a majority of these attacks primarily work in the lp space. In this work, we propose a novel approach for generating adversarial samples using Wasserstein distance.
openaire +2 more sources
Audio adversarial attack: HIS attack
International Conference on Computer Network Security and Software Engineering (CNSSE 2022), 2022Jian Ma, Da Luo
openaire +1 more source

