ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.06479
  4. Cited By
Universal Adversarial Perturbations Through the Lens of Deep
  Steganography: Towards A Fourier Perspective

Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective

12 February 2021
Chaoning Zhang
Philipp Benz
Adil Karjauv
In So Kweon
    AAML
ArXivPDFHTML

Papers citing "Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective"

8 / 8 papers shown
Title
High-frequency Matters: An Overwriting Attack and defense for
  Image-processing Neural Network Watermarking
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking
Huajie Chen
Tianqing Zhu
Chi Liu
Shui Yu
Wanlei Zhou
AAML
21
3
0
17 Feb 2023
Universal Adversarial Directions
Universal Adversarial Directions
Ching Lam Choi
Farzan Farnia
AAML
9
0
0
28 Oct 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
31
42
0
30 Mar 2022
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to
  CNNs
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
36
78
0
06 Oct 2021
Universal Adversarial Training with Class-Wise Perturbations
Universal Adversarial Training with Class-Wise Perturbations
Philipp Benz
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
8
26
0
07 Apr 2021
A Survey On Universal Adversarial Attack
A Survey On Universal Adversarial Attack
Chaoning Zhang
Philipp Benz
Chenguo Lin
Adil Karjauv
Jing Wu
In So Kweon
AAML
21
90
0
02 Mar 2021
Adversarial examples from computational constraints
Adversarial examples from computational constraints
Sébastien Bubeck
Eric Price
Ilya P. Razenshteyn
AAML
62
230
0
25 May 2018
Shield: Fast, Practical Defense and Vaccination for Deep Learning using
  JPEG Compression
Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Nilaksh Das
Madhuri Shanbhogue
Shang-Tse Chen
Fred Hohman
Siwei Li
Li-Wei Chen
Michael E. Kounavis
Duen Horng Chau
FedML
AAML
38
224
0
19 Feb 2018
1