A survey of deep learning-based source image forensics
Image source forensics is widely considered as one of the most effective ways to verify in a
blind way digital image authenticity and integrity. In the last few years, many researchers …
blind way digital image authenticity and integrity. In the last few years, many researchers …
Improving the adversarial transferability with relational graphs ensemble adversarial attack
J Pi, C Luo, F Xia, N Jiang, H Wu, Z Wu - Frontiers in Neuroscience, 2023 - frontiersin.org
In transferable black-box attacks, adversarial samples remain adversarial across multiple
models and are more likely to attack unknown models. From this view, acquiring and …
models and are more likely to attack unknown models. From this view, acquiring and …
DeepFake detection against adversarial examples based on D‐VAEGAN
P Chen, M Xu, J Qi - IET Image Processing, 2024 - Wiley Online Library
Recent years, the development of DeepFake has raise a lot of security problems. Therefore,
detection of DeepFake is critical. However, the existing DeepFake detection methods are …
detection of DeepFake is critical. However, the existing DeepFake detection methods are …
Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model
R Qin, L Wang, X Du, P Xie, X Chen… - Frontiers in …, 2023 - frontiersin.org
Deep neural networks (DNNs) have been shown to be susceptible to critical vulnerabilities
when attacked by adversarial samples. This has prompted the development of attack and …
when attacked by adversarial samples. This has prompted the development of attack and …
Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification
Deep neural networks are vulnerable to adversarial attacks. White-box adversarial attacks
can fool neural networks with small adversarial perturbations, especially for large size …
can fool neural networks with small adversarial perturbations, especially for large size …
Preprocessing pipelines including block-matching convolutional neural network for image denoising to robustify deep reidentification against evasion attacks
M Pawlicki, RS Choraś - Entropy, 2021 - mdpi.com
Artificial neural networks have become the go-to solution for computer vision tasks, including
problems of the security domain. One such example comes in the form of reidentification …
problems of the security domain. One such example comes in the form of reidentification …
Reaching a Better Trade-Off Between Image Quality and Attack Success Rates in Transfer-Based Adversarial Attacks
We study transfer-based adversarial attacks that introduce perturbations in an image that are
large enough to make an unknown CNN wrongly classify it. These perturbations should also …
large enough to make an unknown CNN wrongly classify it. These perturbations should also …
An OpenSim guided tour in machine learning for e-health applications
OpenSim is a modeling and simulation-based open source software for the purpose of
advanced rehabilitation research work. It has an extensive range of applications, which …
advanced rehabilitation research work. It has an extensive range of applications, which …
A Guide to the NeurIPS 2018 Competitions
R Herbrich, S Escalera - The NeurIPS'18 Competition: From Machine …, 2020 - Springer
Competitions have become an integral part of advancing state-of-the-art in artificial
intelligence (AI). They exhibit one important difference to benchmarks: Competitions test a …
intelligence (AI). They exhibit one important difference to benchmarks: Competitions test a …
Adversarial deep learning on digital media security and forensics
Y Wang - 2021 - open.library.ubc.ca
Data-driven deep learning tasks for security related applications are gaining increasing
popularity and achieving impressive performances. This thesis investigates adversarial …
popularity and achieving impressive performances. This thesis investigates adversarial …