A survey of deep learning-based source image forensics

P Yang, D Baracchi, R Ni, Y Zhao, F Argenti, A Piva - Journal of Imaging, 2020 - mdpi.com
Image source forensics is widely considered as one of the most effective ways to verify in a
blind way digital image authenticity and integrity. In the last few years, many researchers …

Improving the adversarial transferability with relational graphs ensemble adversarial attack

J Pi, C Luo, F Xia, N Jiang, H Wu, Z Wu - Frontiers in Neuroscience, 2023 - frontiersin.org
In transferable black-box attacks, adversarial samples remain adversarial across multiple
models and are more likely to attack unknown models. From this view, acquiring and …

DeepFake detection against adversarial examples based on D‐VAEGAN

P Chen, M Xu, J Qi - IET Image Processing, 2024 - Wiley Online Library
Recent years, the development of DeepFake has raise a lot of security problems. Therefore,
detection of DeepFake is critical. However, the existing DeepFake detection methods are …

Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model

R Qin, L Wang, X Du, P Xie, X Chen… - Frontiers in …, 2023 - frontiersin.org
Deep neural networks (DNNs) have been shown to be susceptible to critical vulnerabilities
when attacked by adversarial samples. This has prompted the development of attack and …

Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification

Y Wang, M Feng, R Ward, ZJ Wang, L Wang - arXiv preprint arXiv …, 2020 - arxiv.org
Deep neural networks are vulnerable to adversarial attacks. White-box adversarial attacks
can fool neural networks with small adversarial perturbations, especially for large size …

Preprocessing pipelines including block-matching convolutional neural network for image denoising to robustify deep reidentification against evasion attacks

M Pawlicki, RS Choraś - Entropy, 2021 - mdpi.com
Artificial neural networks have become the go-to solution for computer vision tasks, including
problems of the security domain. One such example comes in the form of reidentification …

Reaching a Better Trade-Off Between Image Quality and Attack Success Rates in Transfer-Based Adversarial Attacks

Y Wang, L Wang, M Feng, R Ward… - 2022 IEEE Data …, 2022 - ieeexplore.ieee.org
We study transfer-based adversarial attacks that introduce perturbations in an image that are
large enough to make an unknown CNN wrongly classify it. These perturbations should also …

An OpenSim guided tour in machine learning for e-health applications

M Verma, M Dawar, PS Rana, N Jindal… - Intelligent Data Security …, 2020 - Elsevier
OpenSim is a modeling and simulation-based open source software for the purpose of
advanced rehabilitation research work. It has an extensive range of applications, which …

A Guide to the NeurIPS 2018 Competitions

R Herbrich, S Escalera - The NeurIPS'18 Competition: From Machine …, 2020 - Springer
Competitions have become an integral part of advancing state-of-the-art in artificial
intelligence (AI). They exhibit one important difference to benchmarks: Competitions test a …

Adversarial deep learning on digital media security and forensics

Y Wang - 2021 - open.library.ubc.ca
Data-driven deep learning tasks for security related applications are gaining increasing
popularity and achieving impressive performances. This thesis investigates adversarial …