Image classification adversarial attack with improved resizing transformation and ensemble models
Convolutional neural networks have achieved great success in computer vision, but incorrect predictions would be output when applying intended perturbations on original input. These human-indistinguishable replicas are called adversarial examples, which on this feature can be used to evaluate networ...
| Published in: | PeerJ Computer Science |
|---|---|
| Main Authors: | Chenwei Li, Hengwei Zhang, Bo Yang, Jindong Wang |
| Format: | Article |
| Language: | English |
| Published: |
PeerJ Inc.
2023-07-01
|
| Subjects: | |
| Online Access: | https://peerj.com/articles/cs-1475.pdf |
Similar Items
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01)
by: Sanglee Park, et al.
Published: (2020-11-01)
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
by: Haoran Lyu, et al.
Published: (2024-03-01)
by: Haoran Lyu, et al.
Published: (2024-03-01)
Similarity criterion for image resizing
by: Hua Shungang, et al.
Published: (2011-01-01)
by: Hua Shungang, et al.
Published: (2011-01-01)
Resizer Swin Transformer-Based Classification Using sMRI for Alzheimer’s Disease
by: Yihang Huang, et al.
Published: (2023-08-01)
by: Yihang Huang, et al.
Published: (2023-08-01)
Reconstructing and resizing 3D images from DICOM files
by: Aziz Fajar, et al.
Published: (2022-06-01)
by: Aziz Fajar, et al.
Published: (2022-06-01)
The effect of resizing on the natural appearance of scintigraphic images: an image similarity analysis
by: Siraj Ghassel, et al.
Published: (2025-02-01)
by: Siraj Ghassel, et al.
Published: (2025-02-01)
DTFA: Adversarial attack with discrete cosine transform noise and target features on deep neural networks
by: Dong Yang, et al.
Published: (2023-04-01)
by: Dong Yang, et al.
Published: (2023-04-01)
An Open Image Resizing Framework for Remote Sensing Applications and Beyond
by: Donatella Occorsio, et al.
Published: (2023-08-01)
by: Donatella Occorsio, et al.
Published: (2023-08-01)
Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination
by: Xinlei Liu, et al.
Published: (2025-01-01)
by: Xinlei Liu, et al.
Published: (2025-01-01)
Distillation-Based Cross-Model Transferable Adversarial Attack for Remote Sensing Image Classification
by: Xiyu Peng, et al.
Published: (2025-05-01)
by: Xiyu Peng, et al.
Published: (2025-05-01)
Image and video resizing algorithm based on importance diffusion and adaptive scaling
by: WANG Hui-qian1, et al.
Published: (2011-01-01)
by: WANG Hui-qian1, et al.
Published: (2011-01-01)
Image and video resizing algorithm based on importance diffusion and adaptive scaling
by: WANG Hui-qian1, et al.
Published: (2011-01-01)
by: WANG Hui-qian1, et al.
Published: (2011-01-01)
Adversarial Example Attack Method Based on Salient Region Optimization
by: Zheming LI, Jindong WANG, Jianzhong HOU, Wei LI, Shihua ZHANG, Hengwei ZHANG
Published: (2023-09-01)
by: Zheming LI, Jindong WANG, Jianzhong HOU, Wei LI, Shihua ZHANG, Hengwei ZHANG
Published: (2023-09-01)
Hadamard’s Defense Against Adversarial Examples
by: Angello Hoyos, et al.
Published: (2021-01-01)
by: Angello Hoyos, et al.
Published: (2021-01-01)
Transferable adversarial attacks for multi-model systems coupling image fusion with classification models
by: Pengcheng Zhu, et al.
Published: (2025-04-01)
by: Pengcheng Zhu, et al.
Published: (2025-04-01)
Adversarial example defense algorithm for MNIST based on image reconstruction
by: Zhongyuan QIN, et al.
Published: (2022-02-01)
by: Zhongyuan QIN, et al.
Published: (2022-02-01)
Adversarial example defense algorithm for MNIST based on image reconstruction
by: QIN Zhongyuan, HE Zhaoxiang, et al.
Published: (2022-02-01)
by: QIN Zhongyuan, HE Zhaoxiang, et al.
Published: (2022-02-01)
A Hybrid Adversarial Attack for Different Application Scenarios
by: Xiaohu Du, et al.
Published: (2020-05-01)
by: Xiaohu Du, et al.
Published: (2020-05-01)
Adversarial Examples Detection Method Based on Image Denoising and Compression
by: Feiyu WANG, Fan ZHANG, Jiayu DU, Hongle LEI, Xiaofeng QI
Published: (2023-10-01)
by: Feiyu WANG, Fan ZHANG, Jiayu DU, Hongle LEI, Xiaofeng QI
Published: (2023-10-01)
Global Feature Attention Network: Addressing the Threat of Adversarial Attack for Aerial Image Semantic Segmentation
by: Zhen Wang, et al.
Published: (2023-02-01)
by: Zhen Wang, et al.
Published: (2023-02-01)
Detection of Tampering by Image Resizing Using Local Tchebichef Moments
by: Dengyong Zhang, et al.
Published: (2019-07-01)
by: Dengyong Zhang, et al.
Published: (2019-07-01)
A Robust Adversarial Example Attack Based on Video Augmentation
by: Mingyong Yin, et al.
Published: (2023-02-01)
by: Mingyong Yin, et al.
Published: (2023-02-01)
Adversarial Examples Generation Method Based on Random Translation Transformation
by: LI Zheming, ZHANG Hengwei, MA Junqiang, WANG Jindong, YANG Bo
Published: (2022-11-01)
by: LI Zheming, ZHANG Hengwei, MA Junqiang, WANG Jindong, YANG Bo
Published: (2022-11-01)
Research on adversarial attacks and defense performance of image classification models for automated driving systems
by: TANG Jun, et al.
Published: (2025-01-01)
by: TANG Jun, et al.
Published: (2025-01-01)
Enhancing the robustness of vision transformer defense against adversarial attacks based on squeeze-and-excitation module
by: YouKang Chang, et al.
Published: (2023-01-01)
by: YouKang Chang, et al.
Published: (2023-01-01)
Detecting Adversarial Examples Using Surrogate Models
by: Borna Feldsar, et al.
Published: (2023-11-01)
by: Borna Feldsar, et al.
Published: (2023-11-01)
Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters
by: Dang Duy Thang, et al.
Published: (2020-01-01)
by: Dang Duy Thang, et al.
Published: (2020-01-01)
Review of Research on Adversarial Attack in Three Kinds of Images
by: XU Yuhui, PAN Zhisong, XU Kun
Published: (2024-12-01)
by: XU Yuhui, PAN Zhisong, XU Kun
Published: (2024-12-01)
Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
by: Samer Y. Khamaiseh, et al.
Published: (2022-01-01)
by: Samer Y. Khamaiseh, et al.
Published: (2022-01-01)
Adversarial Examples for Image Cropping: Gradient-Based and Bayesian-Optimized Approaches for Effective Adversarial Attack
by: Masatomo Yoshida, et al.
Published: (2024-01-01)
by: Masatomo Yoshida, et al.
Published: (2024-01-01)
Content-aware image resizing based on random-carving with probability
by: Ying-chun GUO, et al.
Published: (2017-06-01)
by: Ying-chun GUO, et al.
Published: (2017-06-01)
Content-aware image resizing based on random-carving with probability
by: Ying-chun GUO, et al.
Published: (2017-06-01)
by: Ying-chun GUO, et al.
Published: (2017-06-01)
A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach
by: Mohammed Nasser Al-Andoli, et al.
Published: (2024-01-01)
by: Mohammed Nasser Al-Andoli, et al.
Published: (2024-01-01)
An adversarial example attack method based on predicted bounding box adaptive deformation in optical remote sensing images
by: Leyu Dai, et al.
Published: (2024-05-01)
by: Leyu Dai, et al.
Published: (2024-05-01)
Image Classification Adversarial Example Defense Method Based on Conditional Diffusion Model
by: CHEN Zimin, GUAN Zhitao
Published: (2024-12-01)
by: CHEN Zimin, GUAN Zhitao
Published: (2024-12-01)
Adversarial attacks and defenses in deep learning
by: Ximeng LIU, et al.
Published: (2020-10-01)
by: Ximeng LIU, et al.
Published: (2020-10-01)
Adversarial attacks and defenses in deep learning
by: LIU Ximeng, et al.
Published: (2020-10-01)
by: LIU Ximeng, et al.
Published: (2020-10-01)
GReAT: A Graph Regularized Adversarial Training Method
by: Samet Bayram, et al.
Published: (2024-01-01)
by: Samet Bayram, et al.
Published: (2024-01-01)
Sparse Adversarial Video Attacks via Superpixel-Based Jacobian Computation
by: Zhenyu Du, et al.
Published: (2022-05-01)
by: Zhenyu Du, et al.
Published: (2022-05-01)
Scale-Adaptive Adversarial Patch Attack for Remote Sensing Image Aircraft Detection
by: Mingming Lu, et al.
Published: (2021-10-01)
by: Mingming Lu, et al.
Published: (2021-10-01)
Similar Items
-
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01) -
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
by: Haoran Lyu, et al.
Published: (2024-03-01) -
Similarity criterion for image resizing
by: Hua Shungang, et al.
Published: (2011-01-01) -
Resizer Swin Transformer-Based Classification Using sMRI for Alzheimer’s Disease
by: Yihang Huang, et al.
Published: (2023-08-01) -
Reconstructing and resizing 3D images from DICOM files
by: Aziz Fajar, et al.
Published: (2022-06-01)
