On the trustworthiness landscape of state-of-the-art generative models: A comprehensive survey
Diffusion models and large language models have emerged as leading-edge generative
models and have sparked a revolutionary impact on various aspects of human life. However …
models and have sparked a revolutionary impact on various aspects of human life. However …
Mma-diffusion: Multimodal attack on diffusion models
In recent years Text-to-Image (T2I) models have seen remarkable advancements gaining
widespread adoption. However this progress has inadvertently opened avenues for …
widespread adoption. However this progress has inadvertently opened avenues for …
Attacks and defenses for generative diffusion models: A comprehensive survey
Diffusion models (DMs) have achieved state-of-the-art performance on various generative
tasks such as image synthesis, text-to-image, and text-guided image-to-image generation …
tasks such as image synthesis, text-to-image, and text-guided image-to-image generation …
Improving the Adversarial Transferability of Vision Transformers with Virtual Dense Connection
With the great achievement of vision transformers (ViTs), transformer-based approaches
have become the new paradigm for solving various computer vision tasks. However, recent …
have become the new paradigm for solving various computer vision tasks. However, recent …
Backpropagation path search on adversarial transferability
Deep neural networks are vulnerable to adversarial examples, dictating the imperativeness
to test the model's robustness before deployment. Transfer-based attackers craft adversarial …
to test the model's robustness before deployment. Transfer-based attackers craft adversarial …
Pixel is a Barrier: Diffusion Models Are More Adversarially Robust Than We Think
Adversarial examples for diffusion models are widely used as solutions for safety concerns.
By adding adversarial perturbations to personal images, attackers can not edit or imitate …
By adding adversarial perturbations to personal images, attackers can not edit or imitate …
Curvature-Invariant Adversarial Attacks for 3D Point Clouds
Imperceptibility is one of the crucial requirements for adversarial examples. Previous
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …
A survey of defenses against ai-generated visual media: Detection, disruption, and authentication
Deep generative models have demonstrated impressive performance in various computer
vision applications, including image synthesis, video generation, and medical analysis …
vision applications, including image synthesis, video generation, and medical analysis …
Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models
The high-quality generation results of conditional diffusion models have brought about
concerns regarding privacy and copyright issues. As a possible technique for preventing the …
concerns regarding privacy and copyright issues. As a possible technique for preventing the …
[HTML][HTML] Intelligent Prediction of Ore Block Shapes Based on Novel View Synthesis Technology
L Bi, D Bai, B Chen - Applied Sciences, 2024 - mdpi.com
To address the problem of incomplete perception of limited viewpoints of ore blocks in future
remote and intelligent shoveling-dominated mining scenarios, a method of using new view …
remote and intelligent shoveling-dominated mining scenarios, a method of using new view …