Pixel Logo Attack: Embedding Attacks as Logo-Like Pixels
Abstract
References
Index Terms
- Pixel Logo Attack: Embedding Attacks as Logo-Like Pixels
Recommendations
Adversarial attacks through architectures and spectra in face recognition
Highlights- We propose a novel adversarial attack on face images captured in different spectra.
AbstractThe ability of Deep Neural Networks (DNNs) to make fast predictions with high accuracy made them very popular in real-time applications. DNNs are nowadays in use for secure access to services or mobile devices. However, as DNNs use ...
PlAA: Pixel-level Adversarial Attack on Attention for Deep Neural Network
Artificial Neural Networks and Machine Learning – ICANN 2022AbstractDeep Neural Networks (DNNs) have demonstrated excellent performance in many fields. However, existing studies have shown that deep neural networks are very susceptible to well-designed adversarial samples. Adversarial samples cause the system to ...
GM-Attack: Improving the Transferability of Adversarial Attacks
Knowledge Science, Engineering and ManagementAbstractIn the real world, blackbox attacks seem to be widely existed due to the lack of detailed information of models to be attacked. Hence, it is desirable to obtain adversarial examples with high transferability which will facilitate practical ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Natural Science Foundation of China
- Guangdong Basic and Applied Basic Research Foundation
- Guangdong High-level Innovation Research Institution Project
- Guangzhou Key Research and Development Program
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 31Total Downloads
- Downloads (Last 12 months)31
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in