Perturbations in the Wild: Leveraging Human-Written Text Perturbations for Realistic Adversarial Attack and Defense Mar 19, 2022 Adversarial Attack
Code Code Available 0DTA: Physical Camouflage Attacks using Differentiable Transformation Network Mar 18, 2022 Adversarial Attack Object
— Unverified 0RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression Mar 18, 2022 Adversarial Attack Classification
— Unverified 0AutoAdversary: A Pixel Pruning Method for Sparse Adversarial Attack Mar 18, 2022 Adversarial Attack Network Pruning
— Unverified 0Efficient universal shuffle attack for visual object tracking Mar 14, 2022 Adversarial Attack Computational Efficiency
— Unverified 0Defending Against Adversarial Attack in ECG Classification with Adversarial Distillation Training Mar 14, 2022 Adversarial Attack Classification
— Unverified 0Block-Sparse Adversarial Attack to Fool Transformer-Based Text Classifiers Mar 11, 2022 Adversarial Attack Sentence
Code Code Available 0Harmonicity Plays a Critical Role in DNN Based Versus in Biologically-Inspired Monaural Speech Segregation Systems Mar 8, 2022 Adversarial Attack Speech Separation
— Unverified 0A^3D: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks Mar 7, 2022 Adversarial Attack Adversarial Defense
— Unverified 0Art-Attack: Black-Box Adversarial Attack via Evolutionary Art Mar 7, 2022 Adversarial Attack image-classification
— Unverified 0Detecting Adversarial Perturbations in Multi-Task Perception Mar 2, 2022 Adversarial Attack Depth Estimation
Code Code Available 0Adversarial attacks on neural networks through canonical Riemannian foliations Mar 2, 2022 Adversarial Attack
Code Code Available 0Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey Feb 22, 2022 Adversarial Attack BIG-bench Machine Learning
— Unverified 0Critical Checkpoints for Evaluating Defence Models Against Adversarial Attack and Robustness Feb 18, 2022 Adversarial Attack BIG-bench Machine Learning
— Unverified 0Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias Feb 18, 2022 Adversarial Attack Backdoor Attack
— Unverified 0Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing Feb 16, 2022 Adversarial Attack Adversarial Attack Detection
— Unverified 0Recent Advances in Reliable Deep Graph Learning: Inherent Noise, Distribution Shift, and Adversarial Attack Feb 15, 2022 Adversarial Attack Graph Learning
— Unverified 0Attacking c-MARL More Effectively: A Data Driven Approach Feb 7, 2022 Adversarial Attack Multi-agent Reinforcement Learning
— Unverified 0Adversarial Attack and Defense for Non-Parametric Two-Sample Tests Feb 7, 2022 Adversarial Attack Vocal Bursts Valence Prediction
Code Code Available 0Adversarial Robustness in Deep Learning: Attacks on Fragile Neurons Jan 31, 2022 Adversarial Attack Adversarial Robustness
— Unverified 0Scale-Invariant Adversarial Attack for Evaluating and Enhancing Adversarial Defenses Jan 29, 2022 Adversarial Attack Adversarial Defense
— Unverified 0Feature Visualization within an Automated Design Assessment leveraging Explainable Artificial Intelligence Methods Jan 28, 2022 Adversarial Attack Explainable artificial intelligence
— Unverified 0Gradient-guided Unsupervised Text Style Transfer via Contrastive Learning Jan 23, 2022 Adversarial Attack Contrastive Learning
— Unverified 0Robust Unpaired Single Image Super-Resolution of Faces Jan 22, 2022 Adversarial Attack Image Super-Resolution
— Unverified 0Toward Enhanced Robustness in Unsupervised Graph Representation Learning: A Graph Information Bottleneck Perspective Jan 21, 2022 Adversarial Attack Graph Learning
— Unverified 0