Results 1 to 10 of about 30,960 (119)

Scale-Adaptive Adversarial Patch Attack for Remote Sensing Image Aircraft Detection

open access: yesRemote Sensing, 2021
With the adversarial attack of convolutional neural networks (CNNs), we are able to generate adversarial patches to make an aircraft undetectable by object detectors instead of covering the aircraft with large camouflage nets. However, aircraft in remote
Mingming Lu, Qi Li, Li Chen
exaly   +3 more sources

Segment and Recover: Defending Object Detectors Against Adversarial Patch Attacks [PDF]

open access: yesJournal of Imaging
Object detection is used to automatically identify and locate specific objects within images or videos for applications like autonomous driving, security surveillance, and medical imaging.
Haotian Gu, Hamidreza Jafarnejadsani
doaj   +2 more sources

Adversarial Patch Attack on Multi-Scale Object Detection for UAV Remote Sensing Images

open access: yesRemote Sensing, 2022
Although deep learning has received extensive attention and achieved excellent performance in various scenarios, it suffers from adversarial examples to some extent. In particular, physical attack poses a greater threat than digital attack.
Yichuang Zhang   +2 more
exaly   +3 more sources

Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks [PDF]

open access: yesSensors, 2023
Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control ...
Ren-Hung Hwang   +4 more
doaj   +2 more sources

Bilateral Adversarial Patch Generating Network for the Object Tracking Algorithm

open access: yesRemote Sensing, 2023
Deep learning-based algorithms for single object tracking (SOT) have shown impressive performance but remain susceptible to adversarial patch attacks. However, existing adversarial patch generation methods primarily focus on generating patches within the
Yuelei Xu, Tian Hui
exaly   +3 more sources

Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization [PDF]

open access: yesJournal of Imaging
Object detection in images is a fundamental component of many safety-critical systems, such as autonomous driving, video surveillance systems, and robotics.
Olga Ilina   +2 more
doaj   +2 more sources

Investigation of the Robustness and Transferability of Adversarial Patches in Multi-View Infrared Target Detection [PDF]

open access: yesJournal of Imaging
This paper proposes a novel adversarial patch-generation method for infrared images, focusing on enhancing the robustness and transferability of infrared adversarial patches. To improve the flexibility and diversity of the generation process, a Bernoulli
Qing Zhou   +7 more
doaj   +2 more sources

Localized Query Attack Toward Transformer-Based Visible Object Detectors [PDF]

open access: yesSensors
Transformer-based detectors have demonstrated exceptional accuracy in visible-object detection tasks. However, adversarial patches, specific types of adversarial examples, can disrupt these detectors by introducing unrestricted perturbations into ...
Yang Wang, Ang Li, Zhen Yang, Xunyun Liu
doaj   +2 more sources

SSIM-Based Autoencoder Modeling to Defeat Adversarial Patch Attacks [PDF]

open access: yesSensors
Object detection systems are used in various fields such as autonomous vehicles and facial recognition. In particular, object detection using deep learning networks enables real-time processing in low-performance edge devices and can maintain high ...
Seungyeol Lee   +3 more
doaj   +2 more sources

An Adaptive Adversarial Patch-Generating Algorithm for Defending against the Intelligent Low, Slow, and Small Target

open access: yesRemote Sensing, 2023
The “low, slow, and small” target (LSST) poses a significant threat to the military ground unit. It is hard to defend against due to its invisibility to numerous detecting devices.
Yuelei Xu, Weijia Feng, Liheng Dong
exaly   +3 more sources

Home - About - Disclaimer - Privacy