
-
Improved Image Matting via Real-time User Clicks and Uncertainty Estimation
Image matting is a fundamental and challenging problem in computer visio...
read it
-
Identity-Driven DeepFake Detection
DeepFake detection has so far been dominated by “artifact-driven” method...
read it
-
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks
Deep neural networks have made tremendous progress in 3D point-cloud rec...
read it
-
Passport-aware Normalization for Deep Model Protection
Despite tremendous success in many application scenarios, deep learning ...
read it
-
GreedyFool: Distortion-Aware Sparse Adversarial Attack
Modern deep neural networks(DNNs) are vulnerable to adversarial samples....
read it
-
Worst-Case-Aware Curriculum Learning for Zero and Few Shot Transfer
Multi-task transfer learning based on pre-trained language encoders achi...
read it
-
Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry
As an efficient watermark attack method, geometric distortions destroy t...
read it
-
DeepFaceLab: A simple, flexible and extensible face swapping framework
DeepFaceLab is an open-source deepfake system created by iperov for face...
read it
-
Model Watermarking for Image Processing Networks
Deep learning has achieved tremendous success in numerous industrial app...
read it
-
A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret
The modified Paillier cryptosystem has become extremely popular and appl...
read it
-
Self-supervised Adversarial Training
Recent work has demonstrated that neural networks are vulnerable to adve...
read it
-
Reversible Adversarial Example based on Reversible Image Transformation
At present there are many companies that take the most advanced Deep Neu...
read it
-
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once
Modern deep neural networks are often vulnerable to adversarial samples....
read it
-
Neural Machine Reading Comprehension: Methods and Trends
Machine Reading Comprehension (MRC), which requires the machine to answe...
read it
-
Edge Federation: Towards an Integrated Service Provisioning Model
Edge computing is a promising computing paradigm for pushing the cloud s...
read it
-
Data Exfiltration via Multipurpose RFID Cards and Countermeasures
Radio-frequency identification(RFID) technology is widely applied in dai...
read it
-
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal
Neural networks are vulnerable to adversarial examples, which poses a th...
read it
-
Provably Secure Steganography on Generative Media
In this paper, we propose provably secure steganography on generative me...
read it
-
Emerging Applications of Reversible Data Hiding
Reversible data hiding (RDH) is one special type of information hiding, ...
read it
-
CAAD 2018: Iterative Ensemble Adversarial Attack
Deep Neural Networks (DNNs) have recently led to significant improvement...
read it
-
CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network
In this paper, we propose an improvement of Adversarial Transformation N...
read it
-
Reversible Adversarial Examples
Deep Neural Networks have recently led to significant improvement in man...
read it
-
Detecting Adversarial Examples Based on Steganalysis
Deep Neural Networks (DNNs) have recently led to significant improvement...
read it
-
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
he technology on infrared remote control is widely applied in human dail...
read it
-
Enhanced Attacks on Defensively Distilled Deep Neural Networks
Deep neural networks (DNNs) have achieved tremendous success in many tas...
read it
-
Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators
The light-emitting diode(LED) is widely used as an indicator on the info...
read it