搜索
查看
编辑修改
首页
UNITY
NODEJS
PYTHON
AI
GIT
PHP
GO
CEF3
JAVA
HTML
CSS
搜索
从前慢现在也慢
这个屌丝很懒,什么也没留下!
关注作者
热门标签
jquery
HTML
CSS
PHP
ASP
PYTHON
GO
AI
C
C++
C#
PHOTOSHOP
UNITY
iOS
android
vue
xml
爬虫
SEO
LINUX
WINDOWS
JAVA
MFC
CEF3
CAD
NODEJS
GIT
Pyppeteer
article
热门文章
1
2024化华中杯C题1-3小问代码+完整思路建模过程更新_基于光纤传感器的平面曲线重建算法建模
2
SSM学习39:AOP通知类型:环绕通知
3
做到这3点,在公司里脱颖而出_在公司里让优秀人才脱颖而出,怎么理解
4
Transformer的变体:改进与扩展_transformer中的ffn变体
5
算法学习笔记:贪心算法
6
海康相机GrabImage
7
如何使自己写的代码易读易懂?_代码 易读
8
华为研究生第一年年薪_研究生在华为天天加班年薪30万,出国的学渣晒年薪,让人想不到...
9
文件上传--Upload-labs--Pass17--条件竞争_upload-labs-linux 17关 条件竞争
10
itunes 备份路径 修改_iOS高版本系统备份如何恢复到低版本系统?
当前位置:
article
> 正文
科研篇(12):CVPR20 分类整理-对抗样本_understanding adversarial examples from the mutua
作者:从前慢现在也慢 | 2024-07-26 07:06:21
赞
踩
understanding adversarial examples from the mutual influence of images and
文章目录
一、对抗样本-附代码
1.1Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance.
1.2 One Man's Trash Is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples
1.3 ColorFool: Semantic Adversarial Colorization
1.4 Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
1.5 Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
1.6 Efficient Adversarial Training with Transferable Adversarial Examples
1.7 Modeling Biological Immunity to Adversarial Examples
1.8 Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes
1.9 (Oral)A Self-supervised Approach for Adversarial Robustness
1.10 When NAS Meets Robustness: In Search of Robust Architectures against Adversarial Attacks
1.11 Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder
1.12 Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
1.13 Old is Gold: Redefining the Adversarially Learned One-Class Classifier Training Paradigm
1.14 LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks
二、对抗样本-无代码
2.1Polishing Decision-Based Adversarial Noise With a Customized Sampling.
2.2 Achieving Robustness in the Wild via Adversarial Mixing With Disentangled Representations
2.3 Single-Step Adversarial Training With Dropout Scheduling.
2.4 Adversarial Vertex Mixup: Toward Better Adversarially Robust Generalization
2.5 Boosting the Transferability of Adversarial Samples via Attention
2.6 Learn2Perturb: An End-to-End Feature Perturbation Learning to Improve Adversarial Robustness
2.7 On Isometry Robustness of Deep 3D Point Cloud Models Under Adversarial Attacks
2.8 Adversarial Examples Improve Image Recognition
2.9 Enhancing Cross-Task Black-Box Transferability of Adversarial Examples With Dispersion Reduction
2.10 Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles
2.11 Benchmarking Adversarial Robustness on Image Classification
2.11 DaST: Data-Free Substitute Training for Adversarial Attacks
2.12 Ensemble Generative Cleaning With Feedback Loops for Defending Adversarial Attacks
2.13 Exploiting Joint Robustness to Adversarial Perturbations
2.14 GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
2.15 What Machines See Is Not What They Get: Fooling Scene Text Recognition Models With Adversarial Text Images
2.16 Physically Realizable Adversarial Examples for LiDAR Object Detection
2.17 One-Shot Adversarial Attacks on Visual Tracking With Dual Attention
2.18 Defending and Harnessing the Bit-Flip Based Adversarial Weight Attack
2.19 Understanding Adversarial Examples From the Mutual Influence of Images and Perturbations
2.20 Robust Superpixel-Guided Attentional Adversarial Attack
2.21 ILFO: Adversarial Attack on Adaptive Neural Networks
2.22 PhysGAN: Generating Physical-World-Resilient Adversarial Examples for Autonomous Driving
2.23 Detecting Adversarial Samples Using Influence Functions and Nearest Neighbors
一、
对抗样本
-附代码
1.1Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance.
PAPER LINK
CODE
1.2 One Man’s Trash Is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples
PAPER LINK
CODE
1.3 ColorFool: Semantic Adversarial Colorization
PAPER LINK
CODE
1.4 Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
PAPER LINK
CODE
1.5 Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
PAPER LINK
CODE
1.6 Efficient Adversarial Training with Transferable Adversarial Examples
PAPER LINK
CODE
1.7 Modeling Biological Immunity to Adversarial Examples
PAPER LINK
CODE
1.8 Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes
PAPER LINK
CODE
1.9 (Oral)A Self-supervised Approach for Adversarial Robustness
PAPER LINK
CODE
1.10 When NAS Meets Robustness: In Search of Robust Architectures against Adversarial Attacks
PAPER LINK
CODE
1.11 Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder
PAPER LINK
CODE
1.12 Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
PAPER LINK
CODE
1.13 Old is Gold: Redefining the Adversarially Learned One-Class Classifier Training Paradigm
PAPER LINK
CODE
1.14 LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks
PAPER LINK
CODE
二、对抗样本-无代码
2.1Polishing Decision-Based Adversarial Noise With a Customized Sampling.
PAPER LINK
2.2 Achieving Robustness in the Wild via Adversarial Mixing With Disentangled Representations
PAPER LINK
2.3 Single-Step Adversarial Training With Dropout Scheduling.
PAPER LINK
2.4 Adversarial Vertex Mixup: Toward Better Adversarially Robust Generalization
PAPER LINK
2.5 Boosting the Transferability of Adversarial Samples via Attention
PAPER LINK
2.6 Learn2Perturb: An End-to-End Feature Perturbation Learning to Improve Adversarial Robustness
PAPER LINK
2.7 On Isometry Robustness of Deep 3D Point Cloud Models Under Adversarial Attacks
PAPER LINK
2.8 Adversarial Examples Improve Image Recognition
PAPER LINK
2.9 Enhancing Cross-Task Black-Box Transferability of Adversarial Examples With Dispersion Reduction
PAPER LINK
2.10 Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles
PAPER LINK
2.11 Benchmarking Adversarial Robustness on Image Classification
PAPER LINK
2.11 DaST: Data-Free Substitute Training for Adversarial Attacks
PAPER LINK
2.12 Ensemble Generative Cleaning With Feedback Loops for Defending Adversarial Attacks
PAPER LINK
2.13 Exploiting Joint Robustness to Adversarial Perturbations
PAPER LINK
2.14 GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
PAPER LINK
2.15 What Machines See Is Not What They Get: Fooling Scene Text Recognition Models With Adversarial Text Images
PAPER LINK
2.16 Physically Realizable Adversarial Examples for LiDAR Object Detection
PAPER LINK
2.17 One-Shot Adversarial Attacks on Visual Tracking With Dual Attention
PAPER LINK
2.18 Defending and Harnessing the Bit-Flip Based Adversarial Weight Attack
PAPER LINK
2.19 Understanding Adversarial Examples From the Mutual Influence of Images and Perturbations
PAPER LINK
2.20 Robust Superpixel-Guided Attentional Adversarial Attack
PAPER LINK
2.21 ILFO: Adversarial Attack on Adaptive Neural Networks
PAPER LINK
2.22 PhysGAN: Generating Physical-World-Resilient Adversarial Examples for Autonomous Driving
PAPER LINK
2.23 Detecting Adversarial Samples Using Influence Functions and Nearest Neighbors
PAPER LINK
本文内容由网友自发贡献,转载请注明出处:
https://www.wpsshop.cn/w/从前慢现在也慢/article/detail/884088
推荐阅读
article
多
模态
系列-综述
Video
Understanding
with Large Language Mo...
随着在线视频平台的蓬勃发展和视频内容量的急剧增长,对高效视频理解工具的需求显著增强。鉴于大型
语言
模型
(LLMs)在
语言
和...
赞
踩
article
论文阅读 - Is
Space
-
Time
Attention
All You
Need
for
Vi...
这篇论文是在vision trans
for
mer的基础上,在时间维度进行了attention,将图像分类拓展到了视频分类...
赞
踩
article
机器学习【5】:
生成
对抗
网络
(GAN,
Generative
Adversarial
Network
)...
一. 什么叫
生成
对抗
网络
Lan J.Goodfellow等于2014年10月在
Generative
Adversari...
赞
踩
article
GAN(
Generative
A
d
versarial
Nets
) 对抗
生成
网络
_
鉴别器
d
最优值...
论文:http://papers.nips.cc/paper/5423-generative-a
d
versarial-n...
赞
踩
article
Video
Mamba:
State
Space
Model
for Efficient
Video
...
为了应对视频理解中局部冗余和全局依赖性的双重挑战,本项工作创新性地将Mamba模型适配到视频领域,提出了
Video
Mam...
赞
踩
article
机器学习【5】:
生成
对抗
网络
(GAN,
Generative
Adversarial
Network
)...
一. 什么叫
生成
对抗
网络
Lan J.Goodfellow等于2014年10月在
Generative
Adversari...
赞
踩
article
ColorFool
:
Semantic
Adversarial Colorization...
ColorFool
:
Semantic
Adversarial Colorization文章目录
ColorFool
: S...
赞
踩
相关标签
人工智能
机器学习
深度学习
transformer
计算机视觉
ViT
视频识别
TimeSformer
GAN
语言模型
mamba
MLLM
对抗样本
颜色