Walking on the edge: Fast, low-distortion adversarial examples H Zhang, Y Avrithis, T Furon, L Amsaleg IEEE Transactions on Information Forensics and Security 16, 701-713, 2020 | 60 | 2020 |
Smooth adversarial examples H Zhang, Y Avrithis, T Furon, L Amsaleg EURASIP Journal on Information Security 2020, 1-12, 2020 | 29 | 2020 |
Towards good practices in evaluating transfer adversarial attacks Z Zhao, H Zhang, R Li, R Sicre, L Amsaleg, M Backes arXiv preprint arXiv:2211.09565, 2022 | 17 | 2022 |
P-Mamba: Marrying Perona Malik Diffusion with Mamba for Efficient Pediatric Echocardiographic Left Ventricular Segmentation Z Ye, T Chen, F Wang, H Zhang, G Li, L Zhang arXiv preprint arXiv:2402.08506, 2024 | 10 | 2024 |
Accelerating MOEA/D by nelder-mead method H Zhang, A Zhou, G Zhang, HK Singh 2017 IEEE Congress on Evolutionary Computation (CEC), 976-983, 2017 | 10 | 2017 |
Opti-CAM: Optimizing saliency maps for interpretability H Zhang, F Torres, R Sicre, Y Avrithis, S Ayache arXiv preprint arXiv:2301.07002, 2023 | 9 | 2023 |
Revisiting transferable adversarial image examples: Attack categorization, evaluation guidelines, and new insights Z Zhao, H Zhang, R Li, R Sicre, L Amsaleg, M Backes, Q Li, C Shen arXiv preprint arXiv:2310.11850, 2023 | 6 | 2023 |
A survey on visual mamba H Zhang, Y Zhu, D Wang, L Zhang, T Chen, Z Ye arXiv preprint arXiv:2404.15956, 2024 | 4 | 2024 |
Ensemble defense with data diversity: Weak correlation implies strong robustness R Li, H Zhang, P Yang, CC Huang, A Zhou, B Xue, L Zhang arXiv preprint arXiv:2106.02867, 2021 | 4 | 2021 |
Tree-structured decomposition and adaptation in moea/d H Zhang, A Zhou Parallel Problem Solving from Nature–PPSN XV: 15th International Conference …, 2018 | 3 | 2018 |
Deep Neural Network Attacks and Defense: The Case of Image Classification H Zhang, T Furon, L Amsaleg, Y Avrithis Multimedia Security 1, 41-75, 2022 | 2 | 2022 |
Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks H Zhang, Y Avrithis, T Furon, L Amsaleg Proceedings of the 1st International Workshop on Trustworthy AI for …, 2021 | 2 | 2021 |
Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds H Zhang, L Cheng, Q He, W Huang, R Li, R Sicre, X Huang, H Hermanns, ... arXiv preprint arXiv:2405.14210, 2024 | | 2024 |
CA-Stream: Attention-based pooling for interpretable image recognition F Torres, H Zhang, R Sicre, S Ayache, Y Avrithis arXiv preprint arXiv:2404.14996, 2024 | | 2024 |
A Learning Paradigm for Interpretable Gradients FT Figueroa, H Zhang, R Sicre, Y Avrithis, S Ayache arXiv preprint arXiv:2404.15024, 2024 | | 2024 |
A Learning Paradigm for Interpretable Gradients F Torres Figueroa, H Zhang, R Sicre, Y Avrithis, S Ayache arXiv e-prints, arXiv: 2404.15024, 2024 | | 2024 |
NeRFail: Neural Radiance Fields-Based Multiview Adversarial Attack W Jiang, H Zhang, X Wang, Z Guo, H Wang Proceeding of the 38th AAAI Conference on Artificial Intelligence 38 (19 …, 2024 | | 2024 |
DP-Net: Learning Discriminative Parts for Image Recognition R Sicre, H Zhang, J Dejasmin, C Daaloul, S Ayache, T Artières 2023 IEEE International Conference on Image Processing (ICIP), 1230-1234, 2023 | | 2023 |
Attaques et défenses de réseaux de neurones profonds: le cas de la classification d’images H Zhang, T Furon, L Amsaleg, Y Avrithis Sécurité multimédia 1 1, 51, 2021 | | 2021 |
Deep Learning in Adversarial Context H Zhang École normale supérieure de Rennes, 2021 | | 2021 |