Index for steal

_steal_
Can't steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Can't steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Copycat CNN: Are random non-Labeled data enough to steal knowledge from black-box models?

_stealing_
Black-Box Dissector: Towards Erasing-Based Hard-Label Model stealing Attack
Can't Steal? Cont-Steal! Contrastive stealing Attacks Against Image Encoders
Defending Against Model stealing Attacks With Adaptive Misinformation
Knockoff Nets: stealing Functionality of Black-Box Models
MAZE: Data-Free Model stealing Attack Using Zeroth-Order Gradient Estimation
Prediction Method of Anti-Electricity stealing Based on Big Data of Electric Power, A
Study on Image Color stealing in Log-Polar Space
Towards Data-Free Model stealing in a Hard Label Setting
8 for stealing

_stealth_
Environmental Sensitivity of Large stealth Longwave Antenna Systems
Moving-Target Tracking by Cognitive RF stealth Radar Using Frequency Diverse Array Antenna
stealth Navigation: Planning and Behaviors
stealth Terrain Navigation
stealth Terrain Navigation for Multi-Vehicle Path Planning
stealth Terrain Navigation with Bounding Overwatch
stealth vision for protecting privacy
7 for stealth

_stealthy_
Adversarial Sticker: A stealthy Attack Method in the Physical World
BppAttack: stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Improving Robustness Against stealthy Weight Bit-Flip Attacks by Output Code Matching
Pasadena: Perceptually Aware and stealthy Adversarial Denoise Attack
Resilient Distributed Kalman Filtering Under Bidirectional stealthy Attack, A
RFLA: A stealthy Reflected Light Adversarial Attack in the Physical World
Risk Assessment for Connected Vehicles Under stealthy Attacks on Vehicle-to-Vehicle Networks
Semantically stealthy Adversarial Attacks against Segmentation Models
Shadows can be Dangerous: stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon
Simtrojan: stealthy Backdoor Attack
stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger
stealthy Frequency-Domain Backdoor Attacks: Fourier Decomposition and Fundamental Frequency Injection
stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
13 for stealthy

Index for "s"


Last update: 2-May-24 21:06:23
Use price@usc.edu for comments.