Index for attac

_attachable_
Human Body-Aware Feature Extractor Using attachable Feature Corrector for Human Pose Estimation

_attached_
attached shadow coding: Estimating surface normals from shadows under unknown reflectance and lighting conditions
Body Parts Segmentation with attached Props Using RGB-D Imaging
Computer vision system for position monitoring in three dimensions using non-coplanar light sources attached to a monitored object
Contour-based Separation of Vertically attached Traffic Signs, A
Detection of Indoor attached Equipment From TLS Point Clouds Using Planar Region Boundary
Dynamics of a Contrast Agent Microbubble attached to an Elastic Wall
full photometric and geometric model for attached webcam/matte screen devices, A
Interactive shape acquisition using marker attached laser projector
Rectification Using Different Types of Cameras attached to a Vehicle
Scanning a Document with a Small Camera attached to a Mouse
Segmentation of the pulmonary nodule and the attached vessels in the CT scan of the chest using morphological features and topological skeleton of the nodule
Synthesising Wider Field Images from Narrow-Field Retinal Video Acquired Using a Low-Cost Direct Ophthalmoscope (Arclight) attached to a Smartphone
VR Menus: Investigation of Distance, Size, Auto-scale, and Ray Casting vs. Pointer-attached-to-Menu
13 for attach

_attachment_
Development and Cross-Cultural Evaluation of a Scoring Algorithm for the Biometric attachment Test: Overcoming the Challenges of Multimodal Fusion with Small Data
Enhancement of morphological snake based segmentation by imparting image attachment through scale-space continuity
Head Mounted Display attachment Olfactory Display to Offer Multimodal Sensory Information for Advertisements in Metaverse, A
Multi-target attachment for Surgical Instrument Tracking
Omnidirectional Vision attachment for Medical Endoscopes
Resolving vision and language ambiguities together: Joint segmentation & prepositional attachment resolution in captioned scenes
Symmetric Data attachment Terms for Large Deformation Image Registration
Virtual Post-its: Visual Label Extraction, attachment, and Tracking for Teleconferencing
8 for attachment

_attack_
360-attack: Distortion-Aware Perturbations from Perspective-Views
3D face mask presentation attack detection based on intrinsic image analysis
3D Facial Geometric Attributes Based Anti-Spoofing Approach against Mask attacks
3D High-Fidelity Mask Face Presentation attack Detection Challenge
3D mask presentation attack detection via high resolution face parts
3D model watermarking algorithm robust to geometric attacks
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud attack
A3C-Based Intelligent Event-Triggering Control of Networked Nonlinear Unmanned Marine Vehicles Subject to Hybrid attacks
Accuracy-Perturbation Curves for Evaluation of Adversarial attack and Defence Methods
Adaptive Cross-Modal Transferable Adversarial attacks From Images to Videos
Adaptive Image Transformations for Transfer-Based Adversarial attack
Adaptive iterative attack towards explainable adversarial robustness
Adaptive local adversarial attacks on 3D point clouds
Adaptive Model Ensemble Adversarial attack for Boosting Adversarial Transferability, An
Adaptive momentum variance for attention-guided sparse adversarial attacks
Adaptive radial basis function sliding mode control for platoons under DoS attacks
Adaptive Warping Network for Transferable Adversarial attacks
ADC: Adversarial attacks against object Detection that evade Context consistency checks
Admix: Enhancing the Transferability of Adversarial attacks
AdvCapsNet: To defense adversarial attacks based on Capsule networks
AdvDO: Realistic Adversarial attacks for Trajectory Prediction
AdvDrop: Adversarial attack to DNNs by Dropping Information
Adversarial attack Against Deep Saliency Models Powered by Non-Redundant Priors
Adversarial attack and Defense on Deep Learning for Air Transportation Communication Jamming
Adversarial attack for SAR Target Recognition Based on UNet-Generative Adversarial Network
Adversarial attack on Deep Cross-Modal Hamming Retrieval
Adversarial attack on Deep Learning-Based Splice Localization
Adversarial attack on Fake-Faces Detectors Under White and Black Box Scenarios
Adversarial attack on Semantic Segmentation Preprocessed with Super Resolution
Adversarial attack Type I: Cheat Classifiers by Significant Changes
Adversarial attacks
Adversarial attacks Against Uncertainty Quantification
Adversarial attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
Adversarial attacks and Defenses in Image Classification: A Practical Perspective
Adversarial attacks are Reversible with Natural Supervision
Adversarial attacks Beyond the Image Space
Adversarial attacks in Underwater Acoustic Target Recognition with Deep Learning Models
Adversarial attacks on Deep Learning-Based DOA Estimation With Covariance Input
Adversarial attacks on Deepfake Detectors: A Practical Analysis
Adversarial attacks on Kinship Verification using Transformer
Adversarial attacks On Multi-Agent Communication
Adversarial attacks through architectures and spectra in face recognition
Adversarial Camouflage: Hiding Physical-World attacks With Natural Styles
Adversarial color projection: A projector-based physical-world attack to DNNs
Adversarial Defense via Learning to Generate Diverse attacks
Adversarial Eigen attack on BlackBox Models
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
Adversarial Label Poisoning attack on Graph Neural Networks via Label Propagation
Adversarial Label-Poisoning attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor
Adversarial Laser Beam: Effective Physical-World attack to DNNs in a Blink
Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against attacks
Adversarial Light Projection attacks on Face Recognition Systems: A Feasibility Study
Adversarial Machine Learning attacks Against Video Anomaly Detection Systems
Adversarial Machine Learning: attacks From Laboratories to the Real World
Adversarial Metric attack and Defense for Person Re-Identification
Adversarial mimicry attacks against image splicing forensics: An approach for jointly hiding manipulations and creating false detections
Adversarial Neon Beam: A light-based physical attack to DNNs
Adversarial Noise attacks of Deep Learning Architectures: Stability Analysis via Sparse-Modeled Signals
Adversarial pan-sharpening attacks for object detection in remote sensing
Adversarial Patch attack on Multi-Scale Object Detection for UAV Remote Sensing Images
Adversarial Ranking attack and Defense
Adversarial Sample attack and Defense Method for Encrypted Traffic Data
Adversarial scratches: Deployable attacks to CNN classifiers
Adversarial Sticker: A Stealthy attack Method in the Physical World
AdvHat: Real-World Adversarial attack on ArcFace Face ID System
AdvMask: A sparse adversarial attack-based data augmentation method for image classification
advPattern: Physical-World attacks on Deep Person Re-Identification via Adversarially Transformable Patterns
AGKD-BML: Defense Against Adversarial attack by Attention Guided Knowledge Distillation and Bi-directional Metric Learning
Aha! Adaptive History-driven attack for Decision-based Black-box Models
AI-Based Compression: A New Unintended Counter attack on JPEG-Related Image Forensic Detectors?
AI-GAN: attack-Inspired Generation of Adversarial Examples
Algorithmic Fairness in Face Morphing attack Detection
All You Need Is RAW: Defending Against Adversarial attacks with Camera Image Pipelines
Alpha-Wolves and Alpha-mammals: Exploring Dictionary attacks on Iris Recognition Systems
Analysis of Master Vein attacks on Finger Vein Recognition Systems
Analysis of Nonlinear Collusion attacks on Fingerprinting Systems for Compressed Multimedia
Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack
Analysis of the synthetic periocular iris images for robust Presentation attacks Detection algorithms
Analysis of user-specific score characteristics for spoof biometric attacks
Anomaly Detection Against GPS Spoofing attacks on Connected and Autonomous Vehicles Using Learning From Demonstration
AoI Optimization in the UAV-Aided Traffic Monitoring Network Under attack: A Stackelberg Game Viewpoint
Appearance and Structure Aware Robust Deep Visual Graph Matching: attack, Defense and Beyond
Appending Adversarial Frames for Universal Video attack
Apricot: A Dataset of Physical Adversarial attacks on Object Detection
ART: An attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
ASePPI: Robust Privacy Protection Against De-Anonymization attacks
Ask, Acquire, and attack: Data-Free UAP Generation Using Class Impressions
Assessing the Threat of Adversarial Examples on Deep Neural Networks for Remote Sensing Scene Classification: attacks and Defenses
Asymmetric Modality Translation for Face Presentation attack Detection
attack Against Image-Based Selective Bitplane Encryption, An
attack Agnostic Adversarial Defense via Visual Imperceptible Bound
attack Agnostic Detection of Adversarial Examples via Random Subspace Analysis
attack Agnostic Statistical Method for Adversarial Detection
attack Analysis for He and Wu's Joint Watermarking/Fingerprinting Scheme
attack as the Best Defense: Nullifying Image-to-image Translation GANs via Limit-aware Adversarial Attack
attack as the Best Defense: Nullifying Image-to-image Translation GANs via Limit-aware Adversarial Attack
attack Characterization for Effective Watermarking
attack invariant scheme for content-based video copy detection, An
attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels
attack Modeling Methodology and Taxonomy for Intelligent Transportation Systems
attack Modelling: Towards a Second Generation Watermarking Benchmark
attack on JPEG2000 Steganography Using LRCA
attack on Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
attack Operators for Digitally Watermarked Images
attack to BPCS-steganography using complexity histogram and countermeasure, An
attack to Explain Deep Representation
attack to Fool and Explain Deep Networks
attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning
attack-Agnostic Deep Face Anti-Spoofing
attack-Guided Perceptual Data Generation for Real-world Re-Identification
attack-invariant attention feature for adversarial defense in hyperspectral image classification
attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
Attention-Enhanced One-Shot attack against Single Object Tracking for Unmanned Aerial Vehicle Remote Sensing Images
Attention-guided evolutionary attack with elastic-net regularization on face recognition
Attribution-based Confidence Metric for Detection of Adversarial attacks on Breast Histopathological Images
Augmented Lagrangian Adversarial attacks
Authentication Of Copy Detection Patterns Under Machine Learning attacks: A Supervised Approach
AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial attacks
Automatic Detection of Injection attacks by Machine Learning in NoSQL Databases
Average Gradient-Based Adversarial attack
Avoiding replay-attacks in a face recognition system using head-pose estimation
Backdoor attack against 3D Point Cloud Classifiers, A
Backdoor attacks
Backdoor attacks Against Deep Image Compression via Adaptive Frequency Trigger
Backdoor attacks Against Deep Learning Systems in the Physical World
Backdoor attacks against Deep Neural Networks by Personalized Audio Steganography
Backdoor attacks on Self-Supervised Learning
Backdoor attacks, Robustness
BadCM: Invisible Backdoor attack Against Cross-Modal Learning
Baddet: Backdoor attacks on Object Detection
Bandits for Structure Perturbation-based Black-box attacks to Graph Neural Networks with Theoretical Guarantees
BASAR:Black-box attack on Skeletal Action Recognition
Bayesian Hill-Climbing attack and Its Application to Signature Verification
Beating Backdoor attack at Its Own Game
Best Defense is a Good Offense: Adversarial Augmentation Against Adversarial attacks, The
BHAC-MRI: Backdoor and Hybrid attacks on MRI Brain Tumor Classification Using CNN
Bias-based Universal Adversarial Patch attack for Automatic Check-out
Bilateral Adversarial Training: Towards Fast Training of More Robust Models Against Adversarial attacks
Biometric presentation attacks: Handcrafted features versus deep learning approaches
Biometrics Systems Under Spoofing attack: An evaluation methodology and lessons learned
Bit-Flip attack: Crushing Neural Network With Progressive Bit Search
Black-box Adversarial attack against Visual Interpreters for Deep Neural Networks
black-box adversarial attack for poisoning clustering, A
black-box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers, A
Black-box attack against handwritten signature verification with region-restricted adversarial perturbations
Black-Box attacks on Image Activity Prediction and its Natural Language Explanations
Black-Box attacks, Robustness
Black-box Detection of Backdoor attacks with Limited Information and Data
Black-Box Dissector: Towards Erasing-Based Hard-Label Model Stealing attack
Black-Box Sparse Adversarial attack via Multi-Objective Optimisation CVPR Proceedings
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping attack?
blind high definition video watermarking scheme robust to geometric and temporal synchronization attacks, A
Blind MPEG-2 Video Watermarking Robust Against Geometric attacks: A Set of Approaches in DCT Domain
Boosting Adversarial attacks with Momentum
Boosting Adversarial Transferability via Gradient Relevance attack
Boosting Adversarial Transferability with Shallow-Feature attack on SAR Images
Boosting Black-Box attack with Partially Transferred Conditional Adversarial Distribution
Boosting Decision-based Black-box Adversarial attacks with Random Sign Flip
Boosting Query Efficiency of Meta attack With Dynamic Fine-Tuning
Boosting transferability of physical attack against detectors by redistributing separable attention
Boundary augment: A data augment method to defend poison attack
Boundary Defense Against Black-box Adversarial attacks
Bounded Adversarial attack on Deep Content Features
Bppattack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Breaching FedMD: Image Recovery via Paired-Logits Inversion attack
Bridging Machine Learning and Cryptography in Defence Against Adversarial attacks
CADW: CGAN-Based attack on Deep Robust Image Watermarking
CamoNet: A Target Camouflage Network for Remote Sensing Images Based on Adversarial attack
Can audio-visual integration strengthen robustness under multimodal attacks?
Can't Steal? Cont-Steal! Contrastive Stealing attacks Against Image Encoders
CAN-Bus attack Detection With Deep Learning
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot attacks
Cascade Defense Method for Multidomain Adversarial attacks under Remote Sensing Detection, A
Catastrophic Child's Play: Easy to Perform, Hard to Defend Adversarial attacks
Category attack for LSB Steganalysis of JPEG Images
CCA: Exploring the Possibility of Contextual Camouflage attack on Object Detection
CGBA: Curvature-aware Geometric Black-box attack
Change Point Models for Real-Time Cyber attack Detection in Connected Vehicle Environment
Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency
CIIDefence: Defeating Adversarial attacks by Fusing Class-Specific Image Inpainting and Image Denoising
CIT-GAN: Cyclic Image Translation Generative Adversarial Network With Application in Iris Presentation attack Detection
Class of Nonlinear Kalman Filters Under a Generalized Measurement Model With False Data Injection attacks, A
Clean-Label Backdoor attacks on Video Recognition Models
CleanCLIP: Mitigating Data Poisoning attacks in Multimodal Contrastive Learning
Client-specific anomaly detection for face presentation attack detection
Closer Look at Robustness of Vision Transformers to Backdoor attacks, A
Cloud security based attack detection using transductive learning integrated with Hidden Markov Model
CNN Patch Pooling for Detecting 3D Mask Presentation attacks in NIR
CNN-Based Anomaly Detection for Face Presentation attack Detection with Multi-Channel Images
CNNs Under attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing
COLFISPOOF: A new Database for Contactless Fingerprint Presentation attack Detection Research
Collusion attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control
Collusive attacks to Partition Authentication Visual Cryptography Scheme
Color Backdoor: A Robust Poisoning attack in Color Space
Combating desynchronization attacks on blind watermarking systems: A message passing approach
Combining 2D texture and 3D geometry features for Reliable iris presentation attack detection using light field focal stack
Combining Identity Features and Artifact Analysis for Differential Morphing attack Detection
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG attacks
Composite attacks-based copy-move image forgery detection using AKAZE and FAST with automatic contrast thresholding
Comprehensive Resilient Control Strategy for CBTC Systems Through Train-to-Train Communications Under Malicious attacks, A
Comprehensive Survey on Authentication and attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks, A
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion attacks via 3D Face Reconstruction
Computation and Data Efficient Backdoor attacks
Concealed attack for Robust Watermarking Based on Generative Model and Perceptual Loss
Consistency-Sensitivity Guided Ensemble Black-Box Adversarial attacks in Low-Dimensional Spaces
Consistent attack: Universal adversarial perturbation on embodied vision navigation
Consistent Semantic attacks on Optical Flow
ConstDet: Control Semantics-Based Detection for GPS Spoofing attacks on UAVs
Content-dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation attacks, A
Convolutional Neural Networks for Iris Presentation attack Detection: Toward Cross-Dataset and Cross-Sensor Generalization
Cooling-Shrinking attack: Blinding the Tracker With Imperceptible Noises
Cooperative Location-Sensing Network Based on Vehicular Communication Security Against attacks
Cost-Effective Adversarial attacks against Scene Text Recognition
Counterfeiting attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes
Countering Adversarial attacks, Defense, Robustness
Countermeasure for the protection of face recognition systems against mask attacks
Countermeasure of re-recording prevention against attack with short wavelength pass filter
Countermeasure to Resist Block Replacement attacks, A
CRAB: Certified Patch Robustness Against Poisoning-Based Backdoor attacks
Critical Infrastructure Security Against Drone attacks Using Visual Analytics
Cross-database and cross-attack Iris presentation attack detection using micro stripes analyses
Cross-database and cross-attack Iris presentation attack detection using micro stripes analyses
Cross-Domain Face Presentation attack Detection via Multi-Domain Disentangled Representation Learning
Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data Tampering attacks, A
Cross-Layer Defense Scheme for Edge Intelligence-Enabled CBTC Systems Against MitM attacks, A
Cross-Modal Text Steganography Against Synonym Substitution-Based Text attack
Cross-Modal Transferable Adversarial attacks from Images to Videos
Cross-resolution face recognition adversarial attacks
Cross-Shaped Adversarial Patch attack
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack
CSSBA: A Clean Label Sample-Specific Backdoor attack
Curls and Whey: Boosting Black-Box Adversarial attacks
Cyber attacks on Scada Based Traffic Light Control Systems in the Smart Cities
Cycle GAN-Based attack on Recaptured Images to Fool both Human and Machine
Cyclic Defense GAN Against Speech Adversarial attacks
Cyclical Adversarial attack Pierces Black-box Deep Neural Networks
DaST: Data-Free Substitute Training for Adversarial attacks
Data Poisoning attack Aiming the Vulnerability of Continual Learning
Data-Driven Fault-Tolerant Platooning Control Under Aperiodic DoS attacks
Data-free Universal Adversarial Perturbation and Black-box attack
Database for Face Presentation attack Using Wax Figure Faces, A
Dataset Security for Machine Learning: Data Poisoning, Backdoor attacks, and Defenses
DCA: Delayed Charging attack on the Electric Shared Mobility System
Decision-Based attack to Speaker Recognition System via Local Low-Frequency Perturbation
Decision-based Black-box attack Specific to Large-size Images
Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial attacks and Defenses
Deep convolutional neural networks for face and iris presentation attack detection: survey and case study
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models against Adversarial attacks
Deep Learning-Based Forgery attack on Document Images
Deep patch-wise supervision for presentation attack detection
Deeply vulnerable: a study of the robustness of face recognition to presentation attacks
DEFEAT: Deep Hidden Feature Backdoor attacks by Imperceptible Perturbation and Latent Representation Constraints
Defending Against Adversarial attacks by Randomized Diversification
Defending against attacks tailored to transfer learning via feature distancing
Defending Against Model Stealing attacks With Adaptive Misinformation
Defending Against Patch-based Backdoor attacks on Self-Supervised Learning
Defending against Poisoning attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement
Defending Against Universal attacks Through Selective Feature Regeneration
Defending and Harnessing the Bit-Flip Based Adversarial Weight attack
Defending Black Box Facial Recognition Classifiers Against Adversarial attacks
Defending Low-Bandwidth Talking Head Videoconferencing Systems From Real-Time Puppeteering attacks
Defending malware detection models against evasion based adversarial attacks
Defending Neural ODE Image Classifiers from Adversarial attacks with Tolerance Randomization
Defending Person Detection Against Adversarial Patch attack by Using Universal Defensive Frame
Defense Against Adversarial attacks by Reconstructing Images
Defense Against Adversarial attacks Using High-Level Representation Guided Denoiser
Defense Against Adversarial attacks via Controlling Gradient Leaking on Embedded Manifolds
Defense Against Adversarial attacks with Efficient Frequency-Adaptive Compression and Reconstruction
Defense against Adversarial Cloud attack on Remote Sensing Salient Object Detection
Defense against Adversarial Patch attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction
Defense Mechanism Against Adversarial attacks Using Density-based Representation of Images
Defense-friendly Images in Adversarial attacks: Dataset and Metrics for Perturbation Difficulty
Defense-Prefix for Preventing Typographic attacks on CLIP
Deflecting Adversarial attacks with Pixel Deflection
delayed Elastic-Net approach for performing adversarial attacks, A
Delving into Data: Effectively Substitute Training for Black-box attack
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning
Detecting anti-forensic attacks on demosaicing-based camera model identification
Detecting Disguise attacks on Multi-spectral Face Recognition Through Spectral Signatures
Detecting Face Morphing attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Detecting Morphed Face attacks Using Residual Noise from Deep Multi-scale Context Aggregation Network
Detecting Presentation attacks from 3D Face Masks Under Multispectral Imaging
Detecting Replay attacks Using Multi-Channel Audio: A Neural Network-Based Method
Detecting Sirex noctilio grey-attacked and lightning-struck pine trees using airborne hyperspectral data, random forest and support vector machines classifiers
Detecting State of Charge False Reporting attacks via Reinforcement Learning Approach
Detection and Continual Learning of Novel Face Presentation attacks
Detection and Isolation of Sensor attacks for Autonomous Vehicles: Framework, Algorithms, and Validation
Detection Defenses: An Empty Promise against Adversarial Patch attacks on Optical Flow
Detection of Face Morphing attacks by Deep Learning
Detection of Face Recognition Adversarial attacks
Detection of False Data Injection attack in Connected and Automated Vehicles via Cloud-Based Sandboxing
Detection of False Data Injection attacks in Smart Grid Communication Systems
Detection of Larch Forest Stress from Jas's Larch Inchworm (Erannis jacobsoni Djak) attack Using Hyperspectral Remote Sensing
Detection of Longhorned Borer attack and Assessment in Eucalyptus Plantations Using UAV Imagery
Detection of Makeup Presentation attacks based on Deep Face Representations
Developing Robust and Lightweight Adversarial Defenders by Enforcing Orthogonality on attack-Agnostic Denoising Autoencoders
Diffdefense: Defending Against Adversarial attacks via Diffusion Models
Differential Fault attack on Security Vehicle System Applied SIMON Block Cipher, A
Differentially Private Tripartite Intelligent Matching Against Inference attacks in Ride-Sharing Services
Digital and Physical-World attacks on Remote Pulse Detection
Direct Adversarial attack on Stego Sandwiched Between Black Boxes
DisBezant: Secure and Robust Federated Learning Against Byzantine attack in IoT-Enabled MTS
Discrete Point-Wise attack is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition
Discrete Point-Wise attack is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition
Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem
Disrupting Image-Translation-Based DeepFake Algorithms with Adversarial attacks
Distance Based Leakage Alignment for Side Channel attacks
Distracting Downpour: Adversarial Weather attacks for Motion Estimation
Distributed Adaptive Platoon Secure Control on Unmanned Vehicles System for Lane Change Under Compound attacks
Distributed Cyber attacks Detection and Recovery Mechanism for Vehicle Platooning
Distributed edge-event-triggered consensus of multi-agent system under DoS attack
Distributed Secure Platoon Control of Connected Vehicles Subject to DoS attack: Theory and Application
Dither-modulation data riding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks
Divergence-Agnostic Unsupervised Domain Adaptation by Adversarial attacks
Diverse Generative Perturbations on Attention Space for Transferable Adversarial attacks
Do Adaptive Active attacks Pose Greater Risk Than Static Attacks?
Do Adaptive Active attacks Pose Greater Risk Than Static Attacks?
Do Gradient Inversion attacks Make Federated Learning Unsafe?
DOA Estimation under GNSS Spoofing attacks Using a Coprime Array: From a Sparse Reconstruction Viewpoint
Dodging attack Using Carefully Crafted Natural Makeup
Does Capture Background Influence the Accuracy of the Deep Learning Based Fingerphoto Presentation attack Detection Techniques?
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion attack
Domain Adaptive Transfer attack-Based Segmentation Networks for Building Extraction From Aerial Images
Domain Knowledge Alleviates Adversarial attacks in Multi-Label Classifiers
Domain-Generalized Face Anti-Spoofing with Unknown attacks
DOS attack forecasting: A comparative study on wrapper feature selection
DST: Dynamic Substitute Training for Data-free Black-box attack
DTA: Physical Camouflage attacks using Differentiable Transformation Network
DTFA: Adversarial attack with discrete cosine transform noise and target features on deep neural networks
Dual Attention Suppression attack: Generate Adversarial Camouflage in Physical World
Dual-stream Framework for 3D Mask Face Presentation attack Detection, A
DWT-based high-capacity blind video watermarking, invariant to geometrical attacks
Dynamic Generative Targeted attacks with Pattern Injection
Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for Replay attack Detection
Ear anti-spoofing against print attacks using three-level fusion of image quality measures
Early Detection of Bark Beetle attack Using Remote Sensing and Machine Learning: A Review
Early Detection of Bark Beetle Green attack Using TerraSAR-X and RapidEye Data
effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking, The
Effective Ambiguity attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Effective Presentation attack Detection Driven by Face Related Task
Effective Way to Boost Black-box Adversarial attack, An
Effectiveness of Generative attacks on an Online Handwriting Biometric, The
Efficient Adversarial attacks for Visual Object Tracking
Efficient any-Target Backdoor attack with Pseudo Poisoned Samples
Efficient Decision-Based Black-Box Adversarial attacks on Face Recognition
Efficient Decision-based Black-box Patch attacks on Video Recognition
Efficient Detection of Pixel-Level Adversarial attacks
Efficient Detection of Routing attacks in Wireless Sensor Networks
Efficient Loss Function by Minimizing the Detrimental Effect of Floating-Point Errors on Gradient-Based attacks
Efficient Non-Targeted attack for Deep Hashing Based Image Retrieval
Efficient Ordered-Transmission Based Distributed Detection Under Data Falsification attacks
Efficient software attack to multimodal biometric systems and its application to face and iris fusion
Elimination of Undetectable attacks on Natural Gas Networks
Embarrassingly Simple Backdoor attack on Self-supervised Learning, An
empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection, An
Empirical Study of Fully Black-Box and Universal Adversarial attack for SAR Target Recognition, An
encoded histogram of ridge bifurcations and contours for fingerprint presentation attack detection, An
Enhanced iris presentation attack detection via contraction-expansion CNN
Enhanced Neuron Attribution-Based attack Via Pixel Dropping, An
Enhanced Transferable Adversarial attack of Scale-Invariant Methods, An
Enhancement Methods of Image Quality in Screen Mark attack
Enhancing Adversarial Example Transferability With an Intermediate Level attack
Enhancing deep discriminative feature maps via perturbation for face presentation attack detection
Enhancing Soft Biometric Face Template Privacy with Mutual Information-Based Image attacks
Enhancing the Robustness of Neural Collaborative Filtering Systems Under Malicious attacks
Enhancing the Self-Universality for Transferable Targeted attacks
Enhancing the Transferability of Adversarial attacks through Variance Tuning
Enhancing transferability of adversarial examples via rotation-invariant attacks
Ensemble adversarial black-box attacks against deep learning systems
Ensemble Generative Cleaning With Feedback Loops for Defending Adversarial attacks
Ensemble-based Blackbox attacks on Dense Prediction
Erosion attack: Harnessing Corruption To Improve Adversarial Examples
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS: A randomized block based hiding scheme
Evading Deepfake-Image Detectors with White- and Black-Box attacks
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant attacks
Evaluating Robustness of Deep Image Super-Resolution Against Adversarial attacks
Evaluating the Losses and Recovery of GPP in the Subtropical Mangrove Forest Directly attacked by Tropical Cyclone: Case Study in Hainan Island
Evaluating the Resilience of Face Recognition Systems Against Malicious attacks
Evaluating the Robustness of Semantic Segmentation for Autonomous Driving against Real-World Adversarial Patch attacks
Evaluation of a Fourier Watermarking Method Robustness to Cards Durability attacks
Evaluation of Brute-force attack to Dynamic Signature Verification Using Synthetic Samples
evaluation of direct attacks using fake fingers generated from ISO templates, An
evaluation of indirect attacks and countermeasures in fingerprint verification systems, An
Evaluation of wolf attack for classified target on speaker verification systems
Evasion attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application
Evasion attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application
Event-Based Distributed Secure Control of Unmanned Surface Vehicles With DoS attacks
Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service attacks
Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber attacks
Exact Adversarial attack to Image Captioning via Structured Output Learning With Latent Variables
Examining the potential for early detection of spruce bark beetle attacks using multi-temporal Sentinel-2 and harvester data
Experimental Investigation of Text-Based CAPTCHA attacks and Their Robustness, An
Explain2attack: Text Adversarial Attacks via Cross-Domain Interpretability
Explainability-Aware One Point attack for Point Cloud Neural Networks
Explainable Attention-Guided Iris Presentation attack Detector, An
Explaining Face Presentation attack Detection Using Natural Language
Exploiting Explanations for Model Inversion attacks
Exploiting Multi-Object Relationships for Detecting Adversarial attacks in Complex Scenes
Exploiting the Local Parabolic Landscapes of Adversarial Losses to Accelerate Black-Box Adversarial attack
Exploratory Adversarial attacks on Graph Neural Networks for Semi-Supervised Node Classification
Explore Adversarial attack via Black Box Variational Inference
Exploring Effective Data for Surrogate Training Towards Black-box attack
Exploring Frequency Adversarial attacks for Face Forgery Detection
Exploring presentation attack vulnerability and usability of face recognition systems
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud attacks
Exposing Presentation attacks by a Combination of Multi-intrinsic Image Properties, Convolutional Networks and Transfer Learning
Exposing seam carving forgery under recompression attacks by hybrid large feature mining
Exposure Time Change attack on Image Watermarking Systems
Extending Adversarial attacks and Defenses to Deep 3D Point Cloud Classifiers
Eye movement-driven defense against iris print-attacks
EyePAD++: A Distillation-based approach for joint Eye Authentication and Presentation attack Detection using Periocular Images
F&F attack: Adversarial Attack against Multiple Object Trackers by Inducing False Negatives and False Positives
F&F attack: Adversarial Attack against Multiple Object Trackers by Inducing False Negatives and False Positives
F-mixup: attack CNNs From Fourier Perspective
Fabricate-Vanish: An Effective and Transferable Black-Box Adversarial attack Incorporating Feature Distortion
Face Biometrics Under Spoofing attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions
Face Image Quality Estimation on Presentation attack Detection
Face liveness detection for combating the spoofing attack in face recognition
Face morphing attack detection and attacker identification based on a watchlist
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality
Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in Laplacian scale-space
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning
Face Presentation attack Detection by Excavating Causal Clues and Adapting Embedding Statistics
Face Presentation attack Detection by Exploring Spectral Signatures
Face presentation attack detection in mobile scenarios: A comprehensive evaluation
Face Presentation attack with Latex Masks in Multispectral Videos
Face recognition under spoofing attacks: countermeasures and research directions
Face spoofing detection under super-realistic 3D wax face attacks
Failure of affine-based reconstruction attack in regenerating vascular feature points
Fairness in face presentation attack detection
False Data Injection attack in a Platoon of CACC: Real-Time Detection and Isolation With a PDE Approach
Fashion-Guided Adversarial attack on Person Segmentation
Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS attacks
FDA: Feature Disruptive attack
Feature Extraction For Visual Speaker Authentication Against Computer-Generated Video attacks
Feature Importance-aware Transferable Adversarial attacks
feature-based robust digital image watermarking against geometric attacks, A
Federated Test-Time Adaptive Face Presentation attack Detection with Dual-Phase Privacy Preservation
Few pixels attacks with generative model
Few-shot Website Fingerprinting attack with Meta-Bias Learning
FIBA: Frequency-Injection based Backdoor attack in Medical Image Analysis
Fingerprint Adversarial Presentation attack in the Physical Domain
Fingerprint Presentation attack Detection Method Based on a Bag-of-Words Approach
Fingerprint Presentation attack Detector Using Global-Local Model
Fingerprint Readers: Vulnerabilities to Front- and Back- end attacks
FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives
Focused LRP: Explainable AI for Face Morphing attack Detection
Fooling a Face Recognition System with a Marker-Free Label-Consistent Backdoor attack
Forensic Analysis of Nonlinear Collusion attacks for Multimedia Fingerprinting
Forming Adversarial Example attacks Against Deep Neural Networks With Reinforcement Learning
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
framework for liveness detection for direct attacks in the visible spectrum for multimodal ocular biometrics, A
Frequency Domain Model Augmentation for Adversarial attack
Frequency domain regularization for iterative adversarial attacks
Frequency-driven Imperceptible Adversarial attack on Semantic Similarity
Frequency-Tuned Universal Adversarial attacks on Texture Recognition
From Gradient Leakage To Adversarial attacks In Federated Learning
Fusion of Handcrafted and Deep Learning Features for Large-Scale Multiple Iris Presentation attack Detection
Fuzzy-Model-Based Lateral Control for Networked Autonomous Vehicle Systems Under Hybrid Cyber-attacks
Gaussian Filtering With Cyber-attacked Data
general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, A
Generalizable Black-Box Adversarial attack With Meta Learning
Generalized Iris Presentation attack Detection Algorithm under Cross-Database Settings
Generated Distributions Are All You Need for Membership Inference attacks Against Generative Models
Generating Adversarial attacks in the Latent Space
Generating Adversarial Examples By Makeup attacks on Face Recognition
Generating Master Faces for Dictionary attacks with a Network-Assisted Latent Space Evolution
Generating Out of Distribution Adversarial attack Using Latent Space Poisoning
Generative Adversarial attack on Ensemble Clustering
Generative Adversarial Networks: A Survey on attack and Defense Perspective
Genetic algorithm attack on minutiae-based fingerprint authentication and protected template fingerprint systems
GeoDA: A Geometric Framework for Black-Box Adversarial attacks
Geometric Adversarial attacks and Defenses on 3D Point Clouds
Geometric attack Invariant Watermarking with Biometric Data: Applied on Offline Handwritten Signature
Geometrically Adaptive Dictionary attack on Face Recognition
Geometry-Inspired Decision-Based attack, A
GIS-Assisted Prediction and Risk Zonation of Wildlife attacks in the Chitwan National Park in Nepal
GNP attack: Transferable Adversarial Examples Via Gradient Norm Penalty
GradAuto: Energy-Oriented attack on Dynamic Neural Networks
GradMDM: Adversarial attack on Dynamic Networks
Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial attacks
Guest Editorial: Face Recognition and Spoofing attacks
Hamiltonian Monte Carlo Method for Probabilistic Adversarial attack and Learning, A
Hard No-Box Adversarial attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed Gradient
Hard-label based Small Query Black-box Adversarial attack
Hardly Perceptible Trojan attack Against Neural Networks with Bit Flips
Heuristic attack Method to PRH-Based Audio Copy Detectors, A
Hidden Conditional Adversarial attacks
Hierarchical Average Fusion With GM-PHD Filters Against FDI and DoS attacks
Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system
Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing
How to choose your best allies for a transferable attack?
Hybrid Convolutional Neural Networks To Create An attack Detection Framework For A Wireless Sensor Network Based Health Care Application
ILFO: Adversarial attack on Adaptive Neural Networks
Image Copy Detection via Grouping in Feature Space Based on Virtual Prior attacks
Image Super-Resolution as a Defense Against Adversarial attacks
Image Translation-Based Deniable Encryption against Model Extraction attack
Image Watermarking Resistant To Combined Geometric And Removal attacks
Image watermarking with feature point based synchronization robust to print-scan attack
Image-Level Iris Morph attack
Impact of Adversarial attacks on Federated Learning: A Survey, The
Impact of Synthetic Images on Morphing attack Detection Using a Siamese Network
Impact of the Cropping attack on Scalar STDM Data Hiding, The
Imperceptible Transfer attack and Defense on 3D Point Cloud Classification
Improved Noise and attack Robustness for Semantic Segmentation by Using Multi-Task Training with Self-Supervised Depth Estimation
Improved Statistic for the Pooled Triangle Test Against PRNU-Copy attack, An
Improving Adversarial Transferability via Neuron Attribution-based attacks
Improving DNN Robustness to Adversarial attacks Using Jacobian Regularization
Improving Gait Biometrics under Spoofing attacks
Improving Query Efficiency of Black-box Adversarial attack
Improving Robustness Against Stealthy Weight Bit-Flip attacks by Output Code Matching
Improving Robustness of Facial Landmark Detection by Defending against Adversarial attacks
Improving the robustness of adversarial attacks using an affine-invariant gradient estimator
Improving the Transferability of Adversarial attacks Through Both Front and Rear Vector Method
In-Vehicle CAN Bus Tampering attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method
Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using attack Characterization
Incremental Support Vector Machine for Self-updating Fingerprint Presentation attack Detection Systems
Indirect Local attacks for Context-aware Semantic Segmentation Networks
Indirect synthetic attack on thermal face biometric systems via visible-to-thermal spectrum conversion
Intelligent attack defense scheme based on DQL algorithm in mobile fog computing
Interactive Photo Liveness for Presentation attacks Detection
Interest flooding attack mitigation in a vehicular named data network
Intermediate-Level attack Framework on the Basis of Linear Regression, An
Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack
Interpreting Attributions and Interactions of Adversarial attacks
Introducing a new method of image reconstruction against crop attack using sudoku watermarking algorithm
Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku
Intrusion Detection and Ejection Framework Against Lethal attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology
Inversion attack resilient zero-watermarking scheme for medical image authentication
Invertibility attack against watermarking based on forged algorithm and a countermeasure
Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems
Investigating Top-k White-Box and Transferable Black-box attack
Investigating Weight-Perturbed Deep Neural Networks with Application in Iris Presentation attack Detection
Invisible Backdoor attack with Sample-Specific Triggers
Invisible Black-Box Backdoor attack Through Frequency Domain, An
IoU attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking
IoU attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking
Iris Presentation attack Detection Based on Photometric Stereo Features
Iris presentation attack detection: Where are we now?
Iris Presentation attack via Textured Contact Lens in Unconstrained Environment
Iris Presentation attack: Assessing the Impact of Combining Vanadium Dioxide Films with Artificial Eyes
Iris Recognition Against Counterfeit attack Using Gradient Based Fusion of Multi-spectral Images
Iris Recognition Systems, Spoofing, Liveness, Presentation attack, Contact Lenses
Is it Really Easy to Detect Sybil attacks in C-ITS Environments: A Position Paper
Iterative Adversarial attack on Image-Guided Story Ending Generation
Jointly Defending DeepFake Manipulation and Adversarial attack Using Decoy Mechanism
JSNet: A simulation network of JPEG lossy compression and restoration for robust image watermarking against JPEG attack
Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame attack
Killing Four Birds with one Gaussian Process: The Relation between different Test-Time attacks
Knowledge-Enriched Distributional Model Inversion attacks
L-GEM based robust learning against poisoning attack
Label-Only Model Inversion attacks via Boundary Repulsion
Lambertian-based adversarial attacks on deep-learning-based underwater side-scan sonar image classification
Large Scale Audio-Visual Video Analytics Platform for Forensic Investigations of Terroristic attacks
Large-Scale Multiple-Objective Method for Black-box attack Against Object Detection, A
LAS-AT: Adversarial Training with Learnable attack Strategy
LBP-TOP Based Countermeasure against Face Spoofing attacks
LDFT-Based Watermarking Resilient to Local Desynchronization attacks
LEA2: A Lightweight Ensemble Adversarial attack via Non-overlapping Vulnerable Frequency Regions
Learnable Gradient operator for face presentation attack detection, A
Learnable Multi-level Frequency Decomposition and Hierarchical Attention Mechanism for Generalized Face Presentation attack Detection
Learning Ordered Top-k Adversarial attacks via Adversarial Distillation
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial attacks
LG-GAN: Label Guided Adversarial Network for Flexible Targeted attack of Point Cloud Based Deep Networks
LIRA: Learnable, Imperceptible and Robust Backdoor attacks
Live Trojan attacks on Deep Neural Networks
Liveness Detection, Spoofing, Presentation attack, Faces, Other Biometrics
Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification attacks, A
LMS-based attack on watermark public detectors
Local Gradients Smoothing: Defense Against Localized Adversarial attacks
Local Texture Complexity Guided Adversarial attack
LogBarrier Adversarial attack: Making Effective Use of Decision Boundary Information, The
Low-Cost attack on Branch-Based Software Watermarking Schemes, A
LP-GAN: Learning perturbations based on generative adversarial networks for point cloud adversarial attacks
Machine learning based adaptive watermark decoding in view of anticipated attack
Machine Learning in the Hyperspectral Classification of Glycaspis brimblecombei (Hemiptera Psyllidae) attack Severity in Eucalyptus
Making an Invisibility Cloak: Real World Adversarial attacks on Object Detectors
Making Corgis Important for Honeycomb Classification: Adversarial attacks on Concept-based Explainability Tools
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
Manipulation, Adversarial and Presentation attacks in Biometrics
Masquerade attack on transform-based binary-template protection based on perceptron learning
Master Key backdoor for universal impersonation attack against DNN-based face verification, A
Maximum isotope accumulation in the retrosplenial cortex during amnesia attack and its temporal change suggest cortical spreading depression as a pathophysiology of patients with transient global amnesia
MAZE: Data-Free Model Stealing attack Using Zeroth-Order Gradient Estimation
MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical Pretrained Models Against Adversarial attack
Membership Inference attack Using Self Influence Functions
Membership Inference attacks are Easier on Difficult Problems
Meta Generative attack on Person Reidentification
Meta Gradient Adversarial attack
Meta-attack: Class-agnostic and Model-agnostic Physical Adversarial Attack
Meta-attack: Class-agnostic and Model-agnostic Physical Adversarial Attack
Metamorphic Testing-based Adversarial attack to Fool Deepfake Detectors
method of H.264 video watermarking robust to attack on I and P frames by removal, A
Methods for countering attacks on image watermarking schemes: Overview
MFNet-LE: Multilevel fusion network with Laplacian embedding for face presentation attacks detection
Minimally Distorted Structured Adversarial attacks
Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted attacks
Minmax Strategies for QIM Watermarking Subject to attacks with Memory
Mixed Quantization Enabled Federated Learning to Tackle Gradient Inversion attacks
MixNet for Generalized Face Presentation attack Detection
MLattack: Fooling Semantic Segmentation Networks by Multi-layer Attacks
MLSD-GAN: Generating Strong High Quality Face Morphing attacks Using Latent Semantic Disentanglement
Model scheduling and sample selection for ensemble adversarial example attacks
Modelling & Analysis of High Impact Terrorist attacks in India & Its Neighbors
More or Less (MoL): Defending against Multiple Perturbation attacks on Deep Neural Networks through Model Ensemble and Compression
Motion-based counter-measures to photo attacks in face recognition
Motion-based countermeasure against photo and video spoofing attacks in face recognition
Motion-Excited Sampler: Video Adversarial attack with Sparked Prior
MPAF: Model Poisoning attacks to Federated Learning based on Fake Clients
Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation attack Detection
Multi-attack Reference Hashing Generation for Image Authentication
Multi-Expert Adversarial attack Detection in Person Re-identification Using Context Inconsistency
Multi-Label Adversarial attack Based on Label Correlation
Multi-robot adversarial patrolling: Handling sequential attacks
Multi-task Convolutional Neural Network for Joint Iris Detection and Presentation attack Detection, A
Multilevel histogram shape-based image watermarking invariant to geometric attacks
Multimodal Biometric Fusion: A Study on Vulnerabilities to Indirect attacks
Multispectral Imaging for Differential Face Morphing attack Detection: A Preliminary Study
Myope Models: Are face presentation attack detection models short-sighted?
Natural Light Can Also be Dangerous: Traffic Sign Misinterpretation Under Adversarial Natural Light attacks
NetTimeView: Applying Spatio-temporal Data Visualization Techniques to DDoS attack Analysis
Network attacks Related To Smart Healthcare and Their Impact Evaluation
Neural Watermarking Method Including an attack Simulator against Rotation and Compression Attacks
Neural Watermarking Method Including an attack Simulator against Rotation and Compression Attacks
Neuro-Inspired Autoencoding Defense Against Adversarial attacks, A
New Approach for Detecting DDoS attacks Based on Wavelet Analysis, A
New Backdoor attack in CNNS by Training Set Corruption Without Label Poisoning, A
New Blind attack Procedure For Dct-based Image Encryption With Spectrum Learning, A
New Collusion attack and Its Performance Evaluation, A
New Multi-spectral Iris Acquisition Sensor for Biometric Verification and Presentation attack Detection, A
New Protocol to Evaluate the Resistance of Template Update Systems against Zero-Effort attacks, A
New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity attacks, A
No Surprises: Training Robust Lung Nodule Detection for Low-Dose CT Scans by Augmenting With Adversarial attacks
Noise in Adversarial attacks, Removing, Detection, Use
Non-reference Image Quality Assessment for Fingervein Presentation attack Detection
NoPeek-Infer: Preventing face reconstruction attacks in distributed inference after on-premise training
Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor attacks
novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based authentication scheme, A
Novel Bipartite Consensus Tracking Control for Multiagent Systems Under Sensor Deception attacks, A
Novel Collusion attack Strategy for Digital Fingerprinting, A
Novel Cyber attack Detection Method in Networked Control Systems, A
novel face presentation attack detection scheme based on multi-regional convolutional neural networks, A
novel image watermarking scheme against desynchronization attacks by SVR revision, A
novel image watermarking scheme based on amplitude attack, A
Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack
Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack
Novel Sketch attack for H.264/AVC Format-Compliant Encrypted Video, A
Novel Steganographic Algorithm Resisting Targeted Steganalytic attacks on LSB Matching, A
Novel System for Deep Contour Classifiers Certification Under Filtering attacks, A
Novel Watermarking Algorithm for Image Authentication: Robustness Against Common attacks and JPEG2000 Compression, A
object-based non-blind watermarking that is robust to non-linear geometrical distortion attacks, An
Off-Policy Learning-Based Following Control of Cooperative Autonomous Vehicles Under Distributed attacks
OMG-attack: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
OMG-attack: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
On attack-Resilient Service Placement and Availability in Edge-Enabled IoV Networks
On Iris Spoofing Using Print attack
On Isometry Robustness of Deep 3D Point Cloud Models Under Adversarial attacks
On JPEG2000 Error Concealment attacks
On Single-Model Transferable Targeted attacks: A Closer Look at Decision-Level Optimization
On the Difficulty of Membership Inference attacks
On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box attacks
On the generalisation capabilities of Fisher vector-based face presentation attack detection
On the Optimal Structure of Watermark Decoders Under Desynchronization attacks
On the Reversibility of Adversarial attacks
On the Risk Assessment of Terrorist attacks Coupled with Multi-Source Factors
On the Robustness of Deep Learning Models to Universal Adversarial attack
On the Robustness of Semantic Segmentation Models to Adversarial attacks
On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver attacks
On the transferability of adversarial perturbation attacks against fingerprint based authentication systems
On the vulnerability of deep learning to adversarial attacks for camera model identification
On the Vulnerability of Deepfake Detectors to attacks Generated by Denoising Diffusion Models
On the vulnerability of face verification systems to hill-climbing attacks
On the Vulnerability of Iris-based Systems to a Software attack Based on a Genetic Algorithm
Once a MAN: Towards Multi-Target attack via Learning Multi-Target Adversarial Network Once
One-bit Flip is All You Need: When Bit-flip attack Meets Model Training
One-Class Fingerprint Presentation attack Detection Using Auto-Encoder Network
One-Shot Adversarial attacks on Visual Tracking With Dual Attention
Online Alternate Generator Against Adversarial attacks
Only Once attack: Fooling the Tracker With Adversarial Template
OOD attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers
Operational Perspectives Into the Resilience of the U.S. Air Transportation Network Against Intelligent attacks
Optical Adversarial attack
Optimal decoding for watermarks subject to geometrical attacks
Optimal Transport as a Defense Against Adversarial attacks
Optimal watermark power and host samples allocation under random gain attack
OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial attacks in Intelligent Transportation Systems
OULU-NPU: A Mobile Face Presentation attack Database with Real-World Variations
Over-the-Air Adversarial Flickering attacks against Video Recognition Networks
Overloaded Branch Chains Induced by False Data Injection attack in Smart Grid
Parallel Rectangle Flip attack: A Query-based Black-box Attack against Object Detection
Parallel Rectangle Flip attack: A Query-based Black-box Attack against Object Detection
Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness Against Adversarial attack
PARAPH: Presentation attack Rejection by Analyzing Polarization Hypotheses
Partial attack Supervision and Regional Weighted Inference for Masked Face Presentation Attack Detection
Partial attack Supervision and Regional Weighted Inference for Masked Face Presentation Attack Detection
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise attack
Patch attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Patch attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Patch-wise attack for Fooling Deep Neural Network
Patchattack: A Black-box Texture-based Attack with Reinforcement Learning
PatchZero: Defending against Adversarial Patch attacks by Detecting and Zeroing the Patch
PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion attacks
Pattern Recognition Scheme for Distributed Denial of Service (DDoS) attacks in Wireless Sensor Networks, A
Pattern Recognition Systems under attack
Perceptual quality-preserving black-box attack against deep learning image classifiers
Performance Evaluation for Secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping attacks
Performing attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models
Perils of Learning From Unlabeled Data: Backdoor attacks on Semi-supervised Learning, The
Person Re-identification Method Based on Color attack and Joint Defence
Perturbation analysis of gradient-based adversarial attacks
Perturbation-Constrained Adversarial attack for Evaluating the Robustness of Optical Flow, A
Phantom Sponges: Exploiting Non-Maximum Suppression to attack Deep Object Detectors
PhygitalNet: Unified Face Presentation attack Detection via One-Class Isolation Learning
Physical Adversarial attacks on an Aerial Imagery Object Detector
Physical attack on Monocular Depth Estimation with Optimal Adversarial Patches
Physical Passive Patch Adversarial attacks on Visual Odometry Systems
Physical-World Optical Adversarial attacks on 3D Face Recognition
Pick-Object-attack: Type-specific adversarial attack for object detection
Pick-Object-attack: Type-specific adversarial attack for object detection
Pilot Contamination attack Detection and Defense Strategy in Wireless Communications
Pilot Study of Query-Free Adversarial attack against Stable Diffusion, A
Pixel-wise supervision for presentation attack detection on identity document cards
Planting attack on latent fingerprints
Point Cloud attacks in Graph Spectral Domain: When 3D Geometry Meets Graph Signal Processing
PointBA: Towards Backdoor attacks in 3D Point Cloud
Poison Ink: Robust and Invisible Backdoor attack
Poisoning attack Against Estimating From Pairwise Comparisons
PPGSecure: Biometric Presentation attack Detection Using Photopletysmograms
Practical Black-Box attacks on Deep Neural Networks Using Efficient Query Mechanisms
Practical Evaluation of Adversarial Robustness via Adaptive Auto attack
Practical Membership Inference attacks Against Large-Scale Multi-Modal Models: A Pilot Study
Practical Poisoning attacks on Neural Networks
Practical Real-Time Video Watermarking Scheme Robust against Downscaling attack, A
Practical Relative Order attack in Deep Ranking
practical scheme of defeating interpretation attack of digital watermarking, A
Practical View on Face Presentation attack Detection
Practical Wireless attack on the Connected Car and Security Protocol for In-Vehicle CAN, A
PRAT: PRofiling Adversarial attacks
Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Presentation attack detection based on two-stream vision transformers with self-attention fusion
Presentation attack Detection for Face Recognition Using Light Field Camera
Presentation attack Detection for Iris Recognition: An Assessment of the State-of-the-Art
Presentation attack Detection for Sclera Biometric Applications
Presentation attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
Presentation attack Detection Methods for Fingerprint Recognition Systems: A Survey
Presentations and attacks, and spoofs, oh my
Preventing Fake Information Generation Against Media Clone attacks
Principal Component Analysis-Based Approach for Single Morphing attack Detection, A
Privacy Preserving Defense For Black Box Classifiers Against On-Line Adversarial attacks
Privacy-friendly Synthetic Data for the Development of Face Morphing attack Detectors
ProFlip: Targeted Trojan attack with Progressive Bit Flips
Progressive Backdoor Erasing via connecting Backdoor and Adversarial attacks
Projection Probability-Driven Black-Box attack
Projection-Based Physical Adversarial attack for Monocular Depth Estimation
Propagated Perturbation of Adversarial attack for well-known CNNs: Empirical Study and its Explanation
Protecting Autonomous Cars from Phantom attacks
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity attacks
Prototype-supervised Adversarial Network for Targeted attack of Deep Hashing
Proximal Splitting Adversarial attack for Semantic Segmentation
PSAT-GAN: Efficient Adversarial attacks Against Holistic Scene Understanding
Push & Pull: Transferable Adversarial Examples With Attentive attack
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing attack Detection
QAIR: Practical Query-efficient Black-Box attacks for Image Retrieval
QEBA: Query-Efficient Boundary-Based Blackbox attack
quality evaluation of image recovery attack for visible watermarking algorithms, The
Quantization Based Watermarking Approach with Gain attack Recovery
Quarantine: Sparsity Can Uncover the Trojan attack Trigger for Free
Query efficient black-box adversarial attack on deep neural networks
Query-Efficient Adversarial attack Based On Latin Hypercube Sampling
Query-Efficient Black-Box Adversarial attack With Customized Iteration and Sampling
Query-Efficient Black-Box Adversarial attacks Guided by a Transfer-Based Prior
Query-efficient decision-based attack via sampling distribution reshaping
Queryable Semantics to Detect Cyber-attacks: A Flow-Based Detection Approach
Quick response airborne deployment of VIPER muzzle flash detection and location system during DC sniper attacks
Randomized Gradient-Free attack on ReLU Networks, A
Rate Gradient Approximation attack Threats Deep Spiking Neural Networks
RD-IWAN: Residual Dense Based Imperceptible Watermark attack Network
Re-Thinking Model Inversion attacks Against Deep Neural Networks
Real masks and spoof faces: On the masked face presentation attack detection
Real-time attacks on robust watermarking tools in the wild by CNN
Real-Time Detection and Estimation of Denial of Service attack in Connected Vehicle Systems
Reflection Backdoor: A Natural Backdoor attack on Deep Neural Networks
ReGenMorph: Visibly Realistic GAN Generated Face Morphing attacks by Attack Re-generation
ReGenMorph: Visibly Realistic GAN Generated Face Morphing attacks by Attack Re-generation
Regional Saliency Map attack for Medical Image Segmentation
Regularized Intermediate Layers attack: Adversarial Examples With High Transferability
Reinforcement Learning-Based Black-Box Model Inversion attacks
Relativistic Discriminator: A One-Class Classifier for Generalized Iris Presentation attack Detection
Relevance attack on detectors
Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation attack Detection
Remote Sensing of Poplar Phenophase and Leaf Miner attack in Urban Forests
Resilience of Massive MIMO PNC to Jamming attacks in Vehicular Networks, The
Resilient Countermeasures Against Cyber-attacks on Self-Driving Car Architecture
Resilient Distributed Event-Triggered Platooning Control of Connected Vehicles Under Denial-of-Service attacks
Resilient Distributed Kalman Filtering Under Bidirectional Stealthy attack, A
Resilient Formation Tracking of Spacecraft Swarm Against Actuation attacks: A Distributed Lyapunov-Based Model Predictive Approach
Resilient path-following control of autonomous vehicles subject to intermittent denial-of-service attacks
Resilient Platoon Control of Vehicular Cyber Physical Systems Under DoS attacks and Multiple Disturbances
Resistance Analysis of Scalable Video Fingerprinting Systems Under Fair Collusion attacks
ResMax: Detecting Voice Spoofing attacks with Residual Network and Max Feature Map
Resource Problem of Using Linear Layer Leakage attack in Federated Learning, The
ResSFL: A Resistance Transfer Framework for Defending Model Inversion attack in Split Federated Learning
Rethinking Label Flipping attack: From Sample Masking to Sample Thresholding
Rethinking the Backdoor attacks' Triggers: A Frequency Perspective
Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace
Revisiting ensemble adversarial attack
RFLA: A Stealthy Reflected Light Adversarial attack in the Physical World
RIBAC: Towards Robust and Imperceptible Backdoor attack against Compact DNN
Risk Assessment for Connected Vehicles Under Stealthy attacks on Vehicle-to-Vehicle Networks
Risk-Distortion Analysis for Video Collusion attacks: A Mouse-and-Cat Game
Robust Adversarial Watermark Defending Against GAN Synthesization attack
Robust Audio Patch attacks Using Physical Sample Simulation and Adversarial Patch Noise Generation
Robust convolutional neural networks against adversarial attacks on medical images
Robust Decision-Based Black-Box Adversarial attack via Coarse-To-Fine Random Search
Robust Design of Deep Neural Networks Against Adversarial attacks Based on Lyapunov Theory
Robust digital image watermarking method against geometrical attacks
Robust Feature-Guided Generative Adversarial Network for Aerial Image Semantic Segmentation against Backdoor attacks
Robust Geometry-Dependent attack for 3D Point Clouds
Robust image watermarking against local geometric attacks using multiscale block matching method
Robust IRIS Presentation attack Detection Through Stochastic Filter Noise
Robust multimodal face and fingerprint fusion in the presence of spoofing attacks
Robust Physical-World attacks on Deep Learning Visual Classification
Robust Physical-World attacks on Face Recognition
Robust Residual Dense Neural Network For Countering Antiforensic attack on Median Filtered Images, A
Robust Single Image Reflection Removal Against Adversarial attacks
Robust Structured Declarative Classifiers for 3D Point Clouds: Defending Adversarial attacks with Implicit Gradients
Robust Superpixel-Guided Attentional Adversarial attack
Robust Tracking Against Adversarial attacks
Robust watermarking against print and scan attack through efficient modeling algorithm
Robust Watermarking Algorithm Using attack Pattern Analysis, A
Robust Watermarking Scheme against Frame Blending, Projection and Content Adaptation attacks, A
Robustness Against Gradient based attacks through Cost Effective Network Fine-Tuning
Robustness Evaluation of Biometric Systems under Spoof attacks
Robustness of Deep Learning-Based Specific Emitter Identification under Adversarial attacks
Robustness of Saak Transform Against Adversarial attacks
Robustness of Trajectory Prediction Models Under Map-Based attacks
Robustness with Query-efficient Adversarial attack using Reinforcement Learning
rPPG-Based Spoofing Detection for Face Mask attack using Efficientnet on Weighted Spatial-Temporal Representation
RSD-GAN: Regularized Sobolev Defense GAN Against Speech-to-Text Adversarial attacks
Rust-Style Patch: A Physical and Naturalistic Camouflage attacks on Object Detector for Remote Sensing Images
SAGA: Spectral Adversarial Geometric attack on 3D Meshes
Sample Efficient Detection and Classification of Adversarial attacks via Self-Supervised Embeddings
Scale-Adaptive Adversarial Patch attack for Remote Sensing Image Aircraft Detection
Scaling up the Randomized Gradient-Free Adversarial attack Reveals Overestimation of Robustness Using Established Attacks
Scaling up the Randomized Gradient-Free Adversarial attack Reveals Overestimation of Robustness Using Established Attacks
Secret Revealer: Generative Model-Inversion attacks Against Deep Neural Networks, The
Secure and robust SIFT with resistance to chosen-plaintext attack
Secure Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service attacks
Secure watermarking scheme against watermark attacks in the encrypted domain
Security evaluation of biometric authentication systems under real spoofing attacks
Security of Facial Forensics Models Against Adversarial attacks
Security Study of Routing attacks in Vehicular Ad-Hoc Networks (Autonomous Car)
Security Study of Routing attacks in Vehicular Ad-Hoc Networks (Vanets)
Segment and Complete: Defending Object Detectors against Adversarial Patch attacks with Robust Patch Detection
Segmentations-leak: Membership Inference attacks and Defenses in Semantic Image Segmentation
SegPGD: An Effective and Efficient Adversarial attack for Evaluating and Boosting Segmentation Robustness
Self-Attention Context Network: Addressing the Threat of Adversarial attacks for Hyperspectral Image Classification
self-immune to 3D masks attacks face recognition system, A
Self-supervised 2D face presentation attack detection via temporal sequence sampling
Self-Supervised Face Presentation attack Detection with Dynamic Grayscale Snippets
Semantic Adversarial attacks: Parametric Transformations That Fool Deep Classifiers
Semantically Stealthy Adversarial attacks against Segmentation Models
Semi-Leak: Membership Inference attacks Against Semi-supervised Learning
Sensitivity Analysis attacks Against Randomized Detectors
Sensor fault estimation of networked vehicle suspension system with deny-of-service attack
Sensor Fusion-Based GNSS Spoofing attack Detection Framework for Autonomous Vehicles, A
Sequential architecture-agnostic black-box attack design and analysis
Serve receive-to-attack period extraction and histogram-based player localization in broadcast volleyball videos
Set-level Guidance attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models
Set-Valued State Estimation and attack Detection for Uncertain Descriptor Systems
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial attack by Natural Phenomenon
Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask attacks
Shape Matters: Deformable Patch attack
ShieldNets: Defending Against Adversarial attacks Using Probabilistic Adversarial Robustness
Shilling attack detection in collaborative filtering recommender system by PCA detection and perturbation
Sibling-attack: Rethinking Transferable Adversarial Attacks against Face Recognition
Sibling-attack: Rethinking Transferable Adversarial Attacks against Face Recognition
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack
Sign-OPT+: An Improved Sign Optimization Adversarial attack
SilentTrig: An imperceptible backdoor attack against speaker identification with hidden triggers
Similarity-based Gray-box Adversarial attack Against Deep Face Recognition
Simple and Strong Baseline for Universal Targeted attacks on Siamese Visual Tracking, A
Simple Black-Box Adversarial attacks on Deep Neural Networks
Simple Countermeasure to Non-Linear Collusion attacks Targeted for Spread-Spectrum Fingerprinting Scheme
Simple Countermeasures to Mitigate the Effect of Pollution attack in Network Coding-Based Peer-to-Peer Live Streaming
Simtrojan: Stealthy Backdoor attack
Simulating Unknown Target Models for Query-Efficient Black-box attacks
Simulator attack+ for Black-Box Adversarial Attack
Simulator attack+ for Black-Box Adversarial Attack
Simultaneous attack on CNN-Based Monocular Depth Estimation and Optical Flow Estimation
Simultaneously Optimizing Perturbations and Positions for Black-Box Adversarial Patch attacks
Sinkhorn Adversarial attack and Defense
Smart City Security Issues: the Main attacks and Countermeasures
Smoothing Adversarial Domain attack and P-Memory Reconsolidation for Cross-Domain Person Re-Identification
Soccer Video Event Annotation by Synchronization of attack-Defense Clips and Match Reports With Coarse-Grained Time Information
Spark: Spatial-aware Online Incremental attack Against Visual Tracking
Sparse Adversarial attack via Perturbation Factorization
Sparse and Imperceivable Adversarial attacks
Sparse Black-Box Video attack with Reinforcement Learning
Spatial Distribution Assessment of Terrorist attack Types Based on I-MLKNN Model
Spatiotemporal attacks for Embodied Agents
Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation
Spectro-Temporally Compressed Source Features for Replay attack Detection
Spoofed replay attack detection by Multidimensional Fourier transform on facial micro-expression regions
Square attack: A Query-efficient Black-box Adversarial Attack via Random Search
Square attack: A Query-efficient Black-box Adversarial Attack via Random Search
Stability Analysis for H_inf-Controlled Active Quarter-Vehicle Suspension Systems With a Resilient Event-Triggered Scheme Under Periodic DoS attacks
Statistical attack against fuzzy commitment scheme
Statistical attack against iris-biometric fuzzy commitment schemes
Statistical Meta-Analysis of Presentation attacks for Secure Multibiometric Systems
Stealthy Backdoor attack Against Speaker Recognition Using Phase-Injection Hidden Trigger
Stealthy Frequency-Domain Backdoor attacks: Fourier Decomposition and Fundamental Frequency Injection
Stealthy Physical Masked Face Recognition attack via Adversarial Style Optimization
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary attacks
Stochastic Variance Reduced Ensemble Adversarial attack for Boosting the Adversarial Transferability
Study of Smart Campus Environment and Its Security attacks, A
Study on using individual differences in facial expressions for a face recognition system immune to spoofing attacks
Study on Visual attack to BPCS-Steganography and Countermeasure, A
Subgraph Robustness of Complex Networks Under attacks
Substitute Meta-Learning for Black-Box Adversarial attack
Substitute Model Generation for Black-Box Adversarial attack Based on Knowledge Distillation
Support vector machines resilient against training data integrity attacks
SurFree: a fast surrogate-free black-box attack
Surveillance Face Presentation attack Detection Challenge
Survey of attacks on Controller Area Networks and Corresponding Countermeasures, A
Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial attacks, A
survey on 3D mask presentation attack detection and countermeasures, A
Survey on Adversarial Recommender Systems: From attack/Defense Strategies to Generative Adversarial Networks, A
Survey on Situational Awareness of Ransomware attacks: Detection and Prevention Parameters, A
Survey on Watermarking Application Scenarios and Related attacks, A
Sybil attack Identification for Crowdsourced Navigation: A Self-Supervised Deep Learning Approach
Symmetric Saliency-Based Adversarial attack to Speaker Identification
Synchronization of Switched Neural Networks via attacked Mode-Dependent Event-Triggered Control and Its Application in Image Encryption
SynthASpoof: Developing Face Presentation attack Detection Based on Privacy-friendly Synthetic Data
Systematic Evaluation of Backdoor Data Poisoning attacks on Image Classifiers
T-BFA: Targeted Bit-Flip Adversarial Weight attack
t-RAIN: Robust generalization under weather-aliasing label shift attacks
T-SEA: Transfer-Based Self-Ensemble attack on Object Detection
TAFIM: Targeted Adversarial attacks Against Facial Image Manipulations
Tale of HodgeRank and Spectral Method: Target attack Against Rank Aggregation is the Fixed Point of Adversarial Game, A
Targeted Adversarial attack Against Deep Cross-Modal Hashing Retrieval
Targeted Adversarial attacks on Generalizable Neural Radiance Fields
Targeted attack and security enhancement on texture synthesis based steganography
Targeted attack for Deep Hashing Based Retrieval
Targeted attack of Deep Hashing Via Prototype-Supervised Adversarial Networks
Targeted Mismatch Adversarial attack: Query With a Flower to Retrieve the Tower
Task Assignment Algorithm for Multiple Aerial Vehicles to attack Targets With Dynamic Values, A
TAT: Targeted backdoor attacks against visual object tracking
TBT: Targeted Neural Network attack With Bit Trojan
Template Inversion attack against Face Recognition Systems using 3D Face Reconstruction
Temporal Similarity Analysis of Remote Photoplethysmography for Fast 3D Mask Face Presentation attack Detection
Temporal sparse adversarial attack on sequence-based gait recognition
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric attacks and Frame Dropping
Theoretical Framework for Constructing Matching Algorithms Secure against Wolf attack, A
Time Series Intra-Video Collusion attack on Frame-by-Frame Video Watermarking, A
Time-aware and task-transferable adversarial attack for perception of autonomous vehicles
TkML-AP: Adversarial attacks to Top-k Multi-Label Learning
Topological safeguard for evasion attack interpreting the neural networks' behavior
Toward attack-Resistant Route Mutation for VANETs: An Online and Adaptive Multiagent Reinforcement Learning Approach
Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack
Toward Resisting Forgery attacks via Pseudo-Signatures
Toward Robust Neural Image Compression: Adversarial attack and Model Finetuning
Toward Visual Distortion in Black-Box attacks
Towards attack-tolerant Federated Learning via Critical Parameter Analysis
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial attacks
Towards Class-Oriented Poisoning attacks Against Neural Networks
Towards Efficient Data Free Blackbox Adversarial attack
Towards generalized morphing attack detection by learning residuals
Towards Improving the Anti-attack Capability of the Rangenet++
Towards Model Quantization on the Resilience Against Membership Inference attacks
Towards More Realistic Membership Inference attacks on Large Diffusion Models
Towards Practical Deployment-Stage Backdoor attack on Deep Neural Networks
Towards Query Efficient and Generalizable Black-Box Face Reconstruction attack
Towards realistic fingerprint presentation attacks: The ScreenSpoof method
Towards Robust Community Detection via Extreme Adversarial attacks
Towards Robust Rain Removal Against Adversarial attacks: A Comprehensive Benchmark Analysis and Beyond
Towards Transferable Adversarial attacks on Image and Video Transformers
Towards Transferable Targeted attack
Towards Universal Physical attacks on Cascaded Camera-Lidar 3d Object Detection Models
Tracing the Origin of Adversarial attack for Forensic Investigation and Deterrence
Traffic sign attack via pinpoint region probability estimation network
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
Transferable Adversarial attack for Both Vision Transformers and Convolutional Networks via Momentum Integrated Gradients
Transferable Adversarial attack on 3d Object Tracking in Point Cloud
Transferable Adversarial attacks for Deep Scene Text Detection
Transferable Adversarial attacks on Vision Transformers with Token Gradient Regularization
Transferable Adversarial Belief attack With Salient Region Perturbation Restriction, A
Transferable, Controllable, and Inconspicuous Adversarial attacks on Person Re-identification With Deep Mis-Ranking
Transformer-Encoder Detector Module: Using Context to Improve Robustness to Adversarial attacks on Object Detection
Translucent Patch: A Physical and Universal attack on Object Detectors, The
Transpatch: A Transformer-based Generator for Accelerating Transferable Patch Generation in Adversarial attacks Against Object Detection Models
Triangle attack: A Query-Efficient Decision-Based Adversarial Attack
Triangle attack: A Query-Efficient Decision-Based Adversarial Attack
Triggering Failures: Out-Of-Distribution detection by learning from local adversarial attacks in Semantic Segmentation
TrojDiff: Trojan attacks on Diffusion Models with Diverse Targets
Trust in Vehicles: Toward Context-Aware Trust and attack Resistance for the Internet of Vehicles
Trust Region Based Adversarial attack on Neural Networks
Turning Strengths into Weaknesses: A Certified Robustness Inspired attack Framework against Graph Neural Networks
Type I attack For Generative Models
Uncertainty-weighted Loss Functions for Improved Adversarial attacks on Semantic Segmentation
Understanding adversarial attacks on deep learning based medical image analysis systems
Understanding Cross Domain Presentation attack Detection for Visible Face Recognition
Understanding the Robustness of Skeleton-based Action Recognition under Adversarial attack
Unified Adversarial Patch for Cross-modal attacks in the Physical World
Unified Adversarial Patch for Visible-Infrared Cross-Modal attacks in the Physical World
Unified Detection of Digital and Physical Face attacks
Unified Model for Face Matching and Presentation attack Detection using an Ensemble of Vision Transformer Features, A
uniform representation model for OCT-based fingerprint presentation attack detection and reconstruction, A
UniNet: A Unified Scene Understanding Network and Exploring Multi-Task Relationships through the Lens of Adversarial attacks
Universal Adversarial attack on Attention and the Resulting Dataset DAmageNet
Universal Adversarial attack Via Enhanced Projected Gradient Descent
Universal Adversarial Patch attack for Automatic Checkout Using Perceptual and Attentional Bias
Universal Chosen-Ciphertext attack for a Family of Image Encryption Schemes
Universal Litmus Patterns: Revealing Backdoor attacks in CNNs
Universal Perturbation attack Against Image Retrieval
Universal Perturbation Generation for Black-box attack Using Evolutionary Algorithms
Universal Physical Camouflage attacks on Object Detectors
Universal Spectral Adversarial attacks for Deformable Shapes
Unknown presentation attack detection against rational attackers
Unmanned Ground Vehicle Platooning Under Cyber attacks: A Human-Robot Interaction Framework
Unrestricted Black-box Adversarial attack Using GAN with Limited Queries
Unseen Face Presentation attack Detection Using Sparse Multiple Kernel Fisher Null-Space
Using Animation in Active Learning Tool to Detect Possible attacks in Cryptographic Protocols
Using Deep learning for image watermarking attack
Vax-a-net: Training-time Defence Against Adversarial Patch attacks
Versatile Weight attack via Flipping Limited Bits
Viability of Optical Coherence Tomography for Iris Presentation attack Detection
Video watermarking scheme resistant to geometric attacks
video-based surveillance solution for protecting the air-intakes of buildings from chem-bio attacks, A
ViP: Unified Certified Detection and Recovery for Patch attack with Vision Transformers
visual dictionary attack on Picture Passwords, A
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing attack
Vitranspad: Video Transformer Using Convolution And Self-Attention For Face Presentation attack Detection
Vulnerabilities, attacks, and Countermeasures in Balise-Based Train Control Systems
Vulnerability of Person Re-Identification Models to Metric Adversarial attacks
Vulnerability of Semantic Segmentation Networks to Adversarial attacks in Autonomous Driving: Enhancing Extensive Environment Sensing, The
WatchNet++: efficient and accurate depth-based network for detecting people attacks and intrusion
Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization attacks
Watermark Vaccine: Adversarial attacks to Prevent Watermark Removal
Watermarking attack: Security of WSS Techniques
Watermarking scheme capable of resisting attacks based on availability of inserter
Watermarking Scheme Capable of Resisting Sensitivity attack
Watermarking-Based Framework for Protecting Deep Image Classifiers Against Adversarial attacks, A
Wavelet-FCWAN: Fast and Covert Watermarking attack Network in Wavelet Domain
Web-based Smart Telecare System for Early Diagnosis of Heart attack, A
Website Fingerprinting attack on Psiphon and Its Forensic Analysis
What Does It Mean to Learn in Deep Networks? And, How Does One Detect Adversarial attacks?
When NAS Meets Robustness: In Search of Robust Architectures Against Adversarial attacks
Wolf attack Probability: A New Security Measure in Biometric Authentication Systems
World State attack to Blockchain Based IoV and Efficient Protection With Hybrid RSUs Architecture
Yet Another Intermediate-level attack
You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor attacks?
You See What I Want You to See: Exploring Targeted Black-Box Transferability attack for Hash-based Image Retrieval Systems
Zero-Query Transfer attacks on Context-Aware Object Detectors
Zero-Shot Attribute attacks on Fine-Grained Recognition Models
Zero-Watermarking Based on Improved ORB Features Against Print-cam attack
1059 for attack

_attacker_
Adversarial Reinforced Instruction attacker for Robust Vision-Language Navigation
Analysis of the attacker and Defender GAN Models for the Indoor Navigation Network
Estimation of attacker's Scale and Noise Variance for QIM-DC Watermark Embedding
Face morphing attack detection and attacker identification based on a watchlist
Playing Games with Internal attackers Repeatedly
Reach-Avoid Games With Two Defenders and One attacker: An Analytical Approach
Rob-GAN: Generator, Discriminator, and Adversarial attacker
Towards Robust Person Re-Identification by Defending Against Universal attackers
Unknown presentation attack detection against rational attackers
9 for attacker

_attacking_
attacking Defocus Detection With Blur-Aware Transformation for Defocus Deblurring
attacking Image Classifiers To Generate 3D Textures
attacking Iris Recognition: An Efficient Hill-Climbing Technique
attacking NIST biometric image software using nonlinear optimization
attacking Optical Flow
attacking the triangle test in sensor-based camera identification
RDA: Robust Domain Adaptation via Fourier Adversarial attacking
Simulating a Predator Fish attacking a School of Prey Fish in 3D Graphics
8 for attacking

Index for "a"


Last update:27-Apr-24 12:10:16
Use price@usc.edu for comments.