no code implementations • 1 May 2019 • Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng
In this paper, comprehensive evaluation metrics are brought up for different adversarial attack methods.
no code implementations • 1 Dec 2018 • Jinyin Chen, Haibin Zheng, Hui Xiong, Mengmeng Su
Inspired by the correlations between adversarial perturbations and object contour, slighter perturbations is produced via focusing on object contour features, which is more imperceptible and difficult to be defended, especially network add-on defense methods with the trade-off between perturbations filtering and contour feature loss.