Continual adversarial defense

Q Wang, Y Liu, H Ling, Y Li, Q Liu, P Li, J Chen… - arXiv preprint arXiv …, 2023 - arxiv.org
In response to the rapidly evolving nature of adversarial attacks on a monthly basis,
numerous defenses have been proposed to generalize against as many known attacks as …

Improving Adversarial Robustness via Feature Pattern Consistency Constraint

J Hu, J Ye, Z Feng, J Yang, S Liu, X Yu, L Jia… - arXiv preprint arXiv …, 2024 - arxiv.org
Convolutional Neural Networks (CNNs) are well-known for their vulnerability to adversarial
attacks, posing significant security concerns. In response to these threats, various defense …

Physical Strip Attack for Object Detection in Optical Remote Sensing

C Sun, J Sun, X Zhang, Y Li, Q Bai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
A growing trend in the field of adversarial attacks is evolving from the digital domain to the
more challenging physical domain. The previous works mainly employ printable adversarial …

Detecting Adversarial Data via Perturbation Forgery

Q Wang, C Li, Y Luo, H Ling, P Li, J Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
As a defense strategy against adversarial attacks, adversarial detection aims to identify and
filter out adversarial data from the data flow based on discrepancies in distribution and noise …

[PDF][PDF] IntensPure: Attack Intensity-aware Secondary Domain Adaptive Diffusion for Adversarial Purification

EG Lee, MS Lee, JH Yoon, SB Yoo - ijcai.org
Adversarial attacks pose a severe threat to the accuracy of person re-identification (re-ID)
systems, a critical security technology. Adversarial purification methods are promising …