Malicious use of deepfakes leads to serious public concerns and reduces
...
Perturbative availability poisoning (PAP) adds small changes to images t...
Transfer adversarial attacks raise critical security concerns in real-wo...
We introduce ShortcutGen, a new data poisoning attack that generates
sam...
Computer vision systems are remarkably vulnerable to adversarial
perturb...
Strengthening the robustness of machine learning-based malware detectors...
Recent work has shown that imperceptible perturbations can be applied to...
There is broad consensus among researchers studying adversarial examples...
We introduce screen gleaning, a TEMPEST attack in which the screen of a
...
We propose Adversarial Color Enhancement (ACE), a novel approach to
gene...
Maintaining a consistent attribute profile is crucial for dialogue agent...
We propose Adversarial Color Filtering (AdvCF), an approach that uses a
...
The success of image perturbations that are designed to fool image
class...
An adversarial query is an image that has been modified to disrupt
conte...
As deep learning approaches to scene recognition emerge, they have conti...