ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Countering Adversarial Examples by Means of Steganographic Attacks
2019 8th European Workshop on Visual Information Processing (EUVIP)
◽
10.1109/euvip47703.2019.8946254
◽
2019
◽
Author(s):
Federico Colangelo
◽
Alessandro Neri
◽
Federica Battisti
Keyword(s):
Adversarial Examples
◽
Steganographic Attacks
Download Full-text
Related Documents
Cited By
References
Verifying Controllers Against Adversarial Examples with Bayesian Optimization
2018 IEEE International Conference on Robotics and Automation (ICRA)
◽
10.1109/icra.2018.8460635
◽
2018
◽
Cited By ~ 7
Author(s):
Shromona Ghosh
◽
Felix Berkenkamp
◽
Gireeja Ranade
◽
Shaz Qadeer
◽
Ashish Kapoor
Keyword(s):
Bayesian Optimization
◽
Adversarial Examples
Download Full-text
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Proceedings of the 28th ACM International Conference on Multimedia
◽
10.1145/3394171.3413976
◽
2020
◽
Author(s):
Xiaojun Jia
◽
Xingxing Wei
◽
Xiaochun Cao
◽
Xiaoguang Han
Keyword(s):
Adversarial Examples
Download Full-text
Error Diffusion Halftoning Against Adversarial Examples
10.1109/icip42928.2021.9506591
◽
2021
◽
Author(s):
Shao-Yuan Lo
◽
Vishal M. Patel
Keyword(s):
Error Diffusion
◽
Adversarial Examples
Download Full-text
A Statistical Defense Approach for Detecting Adversarial Examples
Proceedings of the 2020 International Conference on Pattern Recognition and Intelligent Systems
◽
10.1145/3415048.3416103
◽
2020
◽
Author(s):
Alessandro Cennamo
◽
Ido Freeman
◽
Anton Kummert
Keyword(s):
Adversarial Examples
Download Full-text
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples
2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)
◽
10.1109/icpads51040.2020.00064
◽
2020
◽
Author(s):
Yunzhe Tian
◽
Yingdi Wang
◽
Endong Tong
◽
Wenjia Niu
◽
Liang Chang
◽
...
Keyword(s):
Data Correlation
◽
Adversarial Examples
Download Full-text
Towards Robust Training of Multi-Sensor Data Fusion Network Against Adversarial Examples in Semantic Segmentation
ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
◽
10.1109/icassp39728.2021.9413772
◽
2021
◽
Author(s):
Youngjoon Yu
◽
Hong Joo Lee
◽
Byeong Cheon Kim
◽
Jung Uk Kim
◽
Yong Man Ro
Keyword(s):
Data Fusion
◽
Semantic Segmentation
◽
Sensor Data
◽
Sensor Data Fusion
◽
Multi Sensor Data Fusion
◽
Adversarial Examples
Download Full-text
Moving target defense for embedded deep visual sensing against adversarial examples
Proceedings of the 17th Conference on Embedded Networked Sensor Systems - SenSys '19
◽
10.1145/3356250.3360025
◽
2019
◽
Cited By ~ 2
Author(s):
Qun Song
◽
Zhenyu Yan
◽
Rui Tan
Keyword(s):
Moving Target
◽
Moving Target Defense
◽
Visual Sensing
◽
Adversarial Examples
Download Full-text
Natural Scene Statistics for Detecting Adversarial Examples in Deep Neural Networks
2020 IEEE 22nd International Workshop on Multimedia Signal Processing (MMSP)
◽
10.1109/mmsp48831.2020.9287056
◽
2020
◽
Author(s):
Anouar Kherchouche
◽
Sid Ahmed Fezza
◽
Wassim Hamidouche
◽
Olivier Deforges
Keyword(s):
Neural Networks
◽
Deep Neural Networks
◽
Natural Scene
◽
Natural Scene Statistics
◽
Adversarial Examples
Download Full-text
Regularized Intermediate Layers Attack: Adversarial Examples With High Transferability
10.1109/icip42928.2021.9506671
◽
2021
◽
Author(s):
Xiaorui Li
◽
Weiyu Cui
◽
Jiawei Huang
◽
Wenyi Wang
◽
Jianwen Chen
Keyword(s):
Intermediate Layers
◽
Adversarial Examples
Download Full-text
A survey on practical adversarial examples for malware classifiers
Reversing and Offensive-oriented Trends Symposium
◽
10.1145/3433667.3433670
◽
2020
◽
Author(s):
Daniel Park
◽
Bülent Yener
Keyword(s):
Adversarial Examples
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close