Pre-trained adversarial perturbations

Y Ban, Y Dong - Advances in Neural Information Processing …, 2022 - proceedings.neurips.cc
Self-supervised pre-training has drawn increasing attention in recent years due to its
superior performance on numerous downstream tasks after fine-tuning. However, it is well …

Manipulation attacks on learned image compression

K Liu, D Wu, Y Wu, Y Wang, D Feng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep learning (DL) techniques have shown promising results in image compression
compared to conventional methods, with competitive bitrate and image reconstruction …

Survey on Visual Signal Coding and Processing with Generative Models: Technologies, Standards and Optimization

Z Chen, H Sun, L Zhang, F Zhang - IEEE Journal on Emerging …, 2024 - ieeexplore.ieee.org
This paper provides a survey of the latest developments in visual signal coding and
processing with generative models. Specifically, our focus is on presenting the advancement …

Spatial-Frequency Discriminability for Revealing Adversarial Perturbations

C Wang, S Qi, Z Huang, Y Zhang, R Lan… - … on Circuits and …, 2024 - ieeexplore.ieee.org
The vulnerability of deep neural networks to adversarial perturbations has been widely
perceived in the computer vision community. From a security perspective, it poses a critical …

A training-free defense framework for robust learned image compression

M Song, J Choi, B Han - arXiv preprint arXiv:2401.11902, 2024 - arxiv.org
We study the robustness of learned image compression models against adversarial attacks
and present a training-free defense technique based on simple image transform functions …

Cross-domain facial expression recognition based on adversarial attack fine-tuning learning

Y Zhang, Z Sun - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Expression recognition is important in artificial intelligence research and has broad
application prospects in medical care and transportation. However, owing to differences in …

Remove To Regenerate: Boosting Adversarial Generalization with Attack Invariance

X Fu, L Ma, L Zhang - … Transactions on Circuits and Systems for …, 2024 - ieeexplore.ieee.org
Adversarial attacks pose a huge challenge to the deployment of deep neural networks
(DNNs) in security-sensitive applications. Adversarial defense methods are developed to …

Stable successive Neural Image Compression via coherent demodulation-based transformation

Y Bao, W Tan, M Li, F Meng, Y Liang - Signal Processing, 2025 - Elsevier
Abstract Neural Image Compression (NIC) has made significant strides in recent years.
However, the existing NIC methods demonstrate instability issues during iterative re …

Enhancing Robustness of Multi-Object Trackers with Temporal Feature Mix

K Shim, J Byun, K Ko, J Hwang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Despite its recent advancements, multi-object tracking (MOT), one of the major research
areas in video technology, still faces various challenges, including severe occlusion and …

Optimization of microscopy image compression using convolutional neural networks and removal of artifacts by deep generative adversarial networks

RK Paul, D Misra, S Sen, S Chandran - Multimedia Tools and Applications, 2024 - Springer
Nowadays, microscopy images are significant in medical research and clinical studies.
However, storage and transmission of data such as microscopy images are challenging …