3D Face Modeling | 3D Object Detection | 3D Shape Correspondence | 3D Shape Reconstruction | Activity Recognition | Adversarial Attacks | Anti-Spoofing | Application | Attention Mechanism | Biometrics | Data Imputation | Database | Deep Learning | Deepfake | Depth Completion | Depth Prediction | Domain Adaptation | Expression Recognition | Face Alignment | Face Antispoofing | Face Deidentification | Face Modeling | Face Recognition | Face Reconstruction | Face Relighting | Fake Faces | Forecasting | Forensics | Gait Recognition | Generic Object 3D Reconstruction | Image Alignment | Image Forgery | Image Segmentation | Joint Alignment | Learning | Low-level Vision | Medical Imaging | Motion Compensation | Multi-modality | Multimedia Retrieval | Noise Synthesis | Object Detection | Pedestrian Detection | Plant Vision | Semantic Segmentation | Sensor Fusion | Sequence Alignment | Surveillance | Tracking | Typing Behavior | Video
Adversarial Attacks
2022
-
Reverse Engineering of Imperceptible Adversarial Image Perturbations
Yifan Gong, Yuguang Yao, Yize Li, Yimeng Zhang, Xiaoming Liu, Xue Lin, Sijia Liu
In Proceeding of The International Conference on Learning Representations (ICLR 2022), Virtual, Apr. 2022
Bibtex | PDF