Results 1 to 10 of about 26,718 (222)
Investigation of the Robustness and Transferability of Adversarial Patches in Multi-View Infrared Target Detection [PDF]
This paper proposes a novel adversarial patch-generation method for infrared images, focusing on enhancing the robustness and transferability of infrared adversarial patches. To improve the flexibility and diversity of the generation process, a Bernoulli
Qing Zhou +7 more
doaj +2 more sources
Segment and Recover: Defending Object Detectors Against Adversarial Patch Attacks [PDF]
Object detection is used to automatically identify and locate specific objects within images or videos for applications like autonomous driving, security surveillance, and medical imaging.
Haotian Gu, Hamidreza Jafarnejadsani
doaj +2 more sources
Localized Query Attack Toward Transformer-Based Visible Object Detectors [PDF]
Transformer-based detectors have demonstrated exceptional accuracy in visible-object detection tasks. However, adversarial patches, specific types of adversarial examples, can disrupt these detectors by introducing unrestricted perturbations into ...
Yang Wang, Ang Li, Zhen Yang, Xunyun Liu
doaj +2 more sources
Evaluating gait system vulnerabilities through PPO and GAN-generated adversarial attacks [PDF]
This study delves into the vulnerabilities of deep learning-based gait recognition systems against adversarial attacks, a critical issue considering the increasing reliance on these technologies in high-security environments.
El Mehdi Saoudi +2 more
doaj +2 more sources
In recent years, adversarial attack methods have been deceived rather easily on deep neural networks (DNNs). In practice, adversarial patches cause misclassification that can be extremely effective. However, many existing adversarial patches are used for
Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim
doaj +1 more source
Double adversarial attack against license plate recognition system
Recent studies have revealed that deep neural networks (DNN) used in artificial intelligence systems are highly vulnerable to adversarial sample-based attacks.To address this issue, a dual adversarial attack method was proposed for license plate ...
Xianyi CHEN, Jun GU1, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU
doaj +3 more sources
Bilateral Adversarial Patch Generating Network for the Object Tracking Algorithm
Deep learning-based algorithms for single object tracking (SOT) have shown impressive performance but remain susceptible to adversarial patch attacks. However, existing adversarial patch generation methods primarily focus on generating patches within the
Jarhinbek Rasol +4 more
doaj +1 more source
Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches
Deep neural networks (DNNs), especially those used in computer vision, are highly vulnerable to adversarial attacks, such as adversarial perturbations and adversarial patches. Adversarial patches, often considered more appropriate for a real-world attack,
Yongsu Kim +5 more
doaj +1 more source
Deep learning (DL) models have recently been widely used in UAV aerial image semantic segmentation tasks and have achieved excellent performance. However, DL models are vulnerable to adversarial examples, which bring significant security risks to safety ...
Zhen Wang +3 more
doaj +1 more source
Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control ...
Ren-Hung Hwang +4 more
doaj +1 more source

