Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward

A Qayyum, M Usama, J Qadir… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) will form the backbone of future next-
generation intelligent transportation systems (ITS) providing travel comfort, road safety …

Anti-adversarially manipulated attributions for weakly and semi-supervised semantic segmentation

J Lee, E Kim, S Yoon - … of the IEEE/CVF conference on …, 2021 - openaccess.thecvf.com
Weakly supervised semantic segmentation produces a pixel-level localization from class
labels; but a classifier trained on such labels is likely to restrict its focus to a small …

Nesterov accelerated gradient and scale invariance for adversarial attacks

J Lin, C Song, K He, L Wang, JE Hopcroft - arXiv preprint arXiv …, 2019 - arxiv.org
Deep learning models are vulnerable to adversarial examples crafted by applying human-
imperceptible perturbations on benign inputs. However, under the black-box setting, most …

Hover-net: Simultaneous segmentation and classification of nuclei in multi-tissue histology images

S Graham, QD Vu, SEA Raza, A Azam, YW Tsang… - Medical image …, 2019 - Elsevier
Nuclear segmentation and classification within Haematoxylin & Eosin stained histology
images is a fundamental prerequisite in the digital pathology work-flow. The development of …

Improving transferability of adversarial examples with input diversity

C Xie, Z Zhang, Y Zhou, S Bai, J Wang… - Proceedings of the …, 2019 - openaccess.thecvf.com
Though CNNs have achieved the state-of-the-art performance on various vision tasks, they
are vulnerable to adversarial examples---crafted by adding human-imperceptible …

Audio adversarial examples: Targeted attacks on speech-to-text

N Carlini, D Wagner - 2018 IEEE security and privacy …, 2018 - ieeexplore.ieee.org
We construct targeted audio adversarial examples on automatic speech recognition. Given
any audio waveform, we can produce another that is over 99.9% similar, but transcribes as …

Adversarially robust generalization requires more data

L Schmidt, S Santurkar, D Tsipras… - Advances in neural …, 2018 - proceedings.neurips.cc
Abstract Machine learning models are often susceptible to adversarial perturbations of their
inputs. Even small perturbations can cause state-of-the-art classifiers with high" standard" …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Kornia: an open source differentiable computer vision library for pytorch

E Riba, D Mishkin, D Ponsa… - Proceedings of the …, 2020 - openaccess.thecvf.com
This work presents Kornia--an open source computer vision library which consists of a set of
differentiable routines and modules to solve generic computer vision problems. At its core …