MF-CLIP: Leveraging CLIP as Surrogate Models for No-box Adversarial Attacks Jul 13, 2023 Adversarial Attack Attribute
— Unverified 0Single-Class Target-Specific Attack against Interpretable Deep Learning Systems Jul 12, 2023 Adversarial Attack Deep Learning
Code Code Available 0Adversarial Self-Attack Defense and Spatial-Temporal Relation Mining for Visible-Infrared Video Person Re-Identification Jul 8, 2023 Adversarial Attack Person Re-Identification
Code Code Available 0Brightness-Restricted Adversarial Attack Patch Jul 1, 2023 Adversarial Attack
— Unverified 0Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey Jul 1, 2023 3D Point Cloud Classification Adversarial Attack
— Unverified 0Defense against Adversarial Cloud Attack on Remote Sensing Salient Object Detection Jun 30, 2023 Adversarial Attack Deep Learning
— Unverified 0Post-train Black-box Defense via Bayesian Boundary Correction Jun 29, 2023 Activity Recognition Adversarial Attack
— Unverified 0Evaluating Similitude and Robustness of Deep Image Denoising Models via Adversarial Attack Jun 28, 2023 Adversarial Attack Denoising
— Unverified 0Towards Sybil Resilience in Decentralized Learning Jun 26, 2023 Adversarial Attack Federated Learning
— Unverified 0Cross-lingual Cross-temporal Summarization: Dataset, Models, Evaluation Jun 22, 2023 Adversarial Attack Negation
Code Code Available 0Adversarial Attacks Neutralization via Data Set Randomization Jun 21, 2023 Adversarial Attack
— Unverified 0Sample Attackability in Natural Language Adversarial Attacks Jun 21, 2023 Adversarial Attack
Code Code Available 0Physics-constrained Attack against Convolution-based Human Motion Prediction Jun 21, 2023 Adversarial Attack Adversarial Robustness
Code Code Available 0You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks Jun 16, 2023 Adversarial Attack
— Unverified 0A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models Jun 14, 2023 Adversarial Attack Machine Translation
— Unverified 0Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems Jun 13, 2023 Adversarial Attack Face Swapping
Code Code Available 0I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models Jun 13, 2023 Adversarial Attack Decoder
— Unverified 0Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Jun 9, 2023 Adversarial Attack Atari Games
— Unverified 0COVER: A Heuristic Greedy Adversarial Attack on Prompt-based Learning in Language Models Jun 9, 2023 Adversarial Attack
— Unverified 0Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning Jun 8, 2023 Adversarial Attack Intrusion Detection
— Unverified 0Mitigating Evasion Attacks in Federated Learning-Based Signal Classifiers Jun 8, 2023 Adversarial Attack Federated Learning
— Unverified 0Expanding Scope: Adapting English Adversarial Attacks to Chinese Jun 8, 2023 Adversarial Attack Adversarial Robustness
Code Code Available 0Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach Jun 6, 2023 Adversarial Attack Color Image Denoising
Code Code Available 0A Robust Likelihood Model for Novelty Detection Jun 6, 2023 Adversarial Attack Anomaly Detection
— Unverified 0Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception Jun 5, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0KNOW How to Make Up Your Mind! Adversarially Detecting and Alleviating Inconsistencies in Natural Language Explanations Jun 5, 2023 Adversarial Attack
Code Code Available 0Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy Jun 4, 2023 Adversarial Attack Attribute
— Unverified 0Adversarial Attack Based on Prediction-Correction Jun 2, 2023 Adversarial Attack Prediction
— Unverified 0Discovering Failure Modes of Text-guided Diffusion Models via Adversarial Search Jun 1, 2023 Adversarial Attack Efficient Exploration
— Unverified 0Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Jun 1, 2023 Adversarial Attack Adversarial Defense
— Unverified 0Graph-based methods coupled with specific distributional distances for adversarial attack detection May 31, 2023 Adversarial Attack Adversarial Attack Detection
Code Code Available 0From Adversarial Arms Race to Model-centric Evaluation: Motivating a Unified Automatic Robustness Evaluation Framework May 29, 2023 Adversarial Attack
Code Code Available 0Adversarial Attack On Yolov5 For Traffic And Road Sign Detection May 27, 2023 Adversarial Attack object-detection
Code Code Available 1Modeling Adversarial Attack on Pre-trained Language Models as Sequential Decision Making May 27, 2023 Adversarial Attack Decision Making
Code Code Available 0PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image Deraining for Semantic Segmentation May 25, 2023 Adversarial Attack Rain Removal
— Unverified 0Another Dead End for Morphological Tags? Perturbed Inputs and Parsing May 24, 2023 Adversarial Attack
Code Code Available 0Enhancing Accuracy and Robustness through Adversarial Training in Class Incremental Continual Learning May 23, 2023 Adversarial Attack Continual Learning
— Unverified 0Attribute-Guided Encryption with Facial Texture Masking May 22, 2023 Adversarial Attack Attribute
— Unverified 0Latent Magic: An Investigation into Adversarial Examples Crafted in the Semantic Latent Space May 22, 2023 Adversarial Attack SSIM
— Unverified 0Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks May 22, 2023 Adversarial Attack Autonomous Driving
Code Code Available 1Are Your Explanations Reliable? Investigating the Stability of LIME in Explaining Text Classifiers by Marrying XAI and Adversarial Attack May 21, 2023 Adversarial Attack
Code Code Available 0Dynamic Transformers Provide a False Sense of Efficiency May 20, 2023 Adversarial Attack
Code Code Available 0Spatial-Frequency Discriminability for Revealing Adversarial Perturbations May 18, 2023 Adversarial Attack Blocking
Code Code Available 0Adversarial Amendment is the Only Force Capable of Transforming an Enemy into a Friend May 18, 2023 Adversarial Attack Adversarial Defense
— Unverified 0Content-based Unrestricted Adversarial Attack May 18, 2023 Adversarial Attack
— Unverified 0Iterative Adversarial Attack on Image-guided Story Ending Generation May 16, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Attacking Perceptual Similarity Metrics May 15, 2023 Adversarial Attack Experimental Design
— Unverified 0Diffusion Models for Imperceptible and Transferable Adversarial Attack May 14, 2023 Adversarial Attack
Code Code Available 2A Black-Box Attack on Code Models via Representation Nearest Neighbor Search May 10, 2023 Adversarial Attack Clone Detection
— Unverified 0The Best Defense is Attack: Repairing Semantics in Textual Adversarial Examples May 6, 2023 Adversarial Attack Adversarial Defense
— Unverified 0