2020
DOI: 10.1007/978-3-030-58592-1_24
|View full text |Cite
|
Sign up to set email alerts
|

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(35 citation statements)
references
References 35 publications
0
28
0
Order By: Relevance
“…Since then, an arms race between the generation of adversarial example attacks and defenses to thwart them, has taken off. Researchers have proposed attacks and defenses in image and video classification [20,11,12,24,28,8,25,10], and object detection [3,21,30,13].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Since then, an arms race between the generation of adversarial example attacks and defenses to thwart them, has taken off. Researchers have proposed attacks and defenses in image and video classification [20,11,12,24,28,8,25,10], and object detection [3,21,30,13].…”
Section: Introductionmentioning
confidence: 99%
“…Among existing defense mechanisms, checking intrinsic context consistencies within the input data has recently been showcased to be very effective, in various tasks. For example, spatial consistency has been used to detect adversarial attacks against semantic segmentation [26]; temporal consistency has been used to detect adversarial attacks against video classification [8,25]; object-object context along with other kinds of context has been used to detect adversarial examples against objection detection [13]; audiovisual correlation has been used to detect adversarial examples against audio-visual speech recognition [15].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations