no code implementations • 8 May 2023 • Zhaoxia Yin, Shaowei Zhu, Hang Su, Jianteng Peng, Wanli Lyu, Bin Luo
However, numerous studies have proven that previous methods create detection or defense against certain attacks, which renders the method ineffective in the face of the latest unknown attack methods.
no code implementations • 16 Dec 2022 • Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin, Bin Luo
In addition, the proposed method does not modify any task model, which can be used as a preprocessing module, which significantly reduces the deployment cost in practical applications.
no code implementations • 6 Oct 2021 • Li Chen, Shaowei Zhu, Zhaoxia Yin
Adding perturbations to images can mislead classification models to produce incorrect results.