Picture for Donghua Wang

Donghua Wang

Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization

Add code
Jul 09, 2024
Figure 1 for Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
Figure 2 for Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
Figure 3 for Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
Figure 4 for Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
Viaarxiv icon

Universal Perturbation-based Secret Key-Controlled Data Hiding

Add code
Nov 03, 2023
Viaarxiv icon

Adversarial Examples in the Physical World: A Survey

Add code
Nov 01, 2023
Viaarxiv icon

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

Add code
Jul 14, 2023
Figure 1 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 2 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 3 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 4 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Viaarxiv icon

Impact of Light and Shadow on Robustness of Deep Neural Networks

Add code
May 23, 2023
Viaarxiv icon

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

Add code
Apr 20, 2023
Figure 1 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 2 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 3 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 4 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Viaarxiv icon

A Survey on Physical Adversarial Attack in Computer Vision

Add code
Sep 28, 2022
Figure 1 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 2 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 3 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 4 for A Survey on Physical Adversarial Attack in Computer Vision
Viaarxiv icon