Poster "adversarial perturbations" Papers
18 papers found
Conference
Adversarial Attention Perturbations for Large Object Detection Transformers
Zachary Yahn, Selim Tekin, Fatih Ilhan et al.
Adversarial Perturbations Cannot Reliably Protect Artists From Generative AI
Robert Hönig, Javier Rando, Nicholas Carlini et al.
AdvPaint: Protecting Images from Inpainting Manipulation via Adversarial Attention Disruption
Joonsung Jeon, Woo Jae Kim, Suhyeon Ha et al.
Algorithmic Stability Based Generalization Bounds for Adversarial Training
Runzhi Tian, Yongyi Mao
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization
Xueyang Zhou, Guiyao Tie, Guowen Zhang et al.
Edit Away and My Face Will not Stay: Personal Biometric Defense against Malicious Generative Editing
Hanhui Wang, Yihua Zhang, Ruizheng Bai et al.
ETA: Energy-based Test-time Adaptation for Depth Completion
Younjoon Chung, Hyoungseob Park, Patrick Rim et al.
Lie Detector: Unified Backdoor Detection via Cross-Examination Framework
Xuan Wang, Siyuan Liang, Dongping Liao et al.
LORE: Lagrangian-Optimized Robust Embeddings for Visual Encoders
Borna Khodabandeh, Amirabbas Afzali, Amirhossein Afsharrad et al.
NullSwap: Proactive Identity Cloaking Against Deepfake Face Swapping
Tianyi Wang, Shuaicheng Niu, Harry Cheng et al.
On the Adversarial Vulnerability of Label-Free Test-Time Adaptation
Shahriar Rifat, Jonathan Ashdown, Michael De Lucia et al.
Phase and Amplitude-aware Prompting for Enhancing Adversarial Robustness
Yibo Xu, Dawei Zhou, Decheng Liu et al.
Robust Satisficing Gaussian Process Bandits Under Adversarial Attacks
Artun Saday, Yaşar Cahit Yıldırım, Cem Tekin
Safeguarding Vision-Language Models: Mitigating Vulnerabilities to Gaussian Noise in Perturbation-based Attacks
Jiawei Wang, Yushen Zuo, Yuanjun Chai et al.
Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Yong Xie, Weijie Zheng, Hanxun Huang et al.
Attack-free Evaluating and Enhancing Adversarial Robustness on Categorical Data
Yujun Zhou, Yufei Han, Haomin Zhuang et al.
Rethinking Fast Adversarial Training: A Splitting Technique To Overcome Catastrophic Overfitting
Masoumeh Zareapoor, Pourya Shamsolmoali
Using My Artistic Style? You Must Obtain My Authorization
Xiuli Bi, Haowei Liu, Weisheng Li et al.