2020
DOI: 10.32604/cmc.2020.07421
|View full text |Cite
|
Sign up to set email alerts
|

Defend Against Adversarial Samples by Using Perceptual Hash

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…In the meantime, many efforts have been devoted to defend against adversarial examples 32–37 . Existing research try to implement defense in three different categories: robust optimization, certified robustness, and detection defense.…”
Section: Adversarial Defense and Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the meantime, many efforts have been devoted to defend against adversarial examples 32–37 . Existing research try to implement defense in three different categories: robust optimization, certified robustness, and detection defense.…”
Section: Adversarial Defense and Detectionmentioning
confidence: 99%
“…In the meantime, many efforts have been devoted to defend against adversarial examples. [32][33][34][35][36][37] Existing research try to implement defense in three different categories: robust optimization, certified robustness, and detection defense. In the robust optimization, various adversarial training methods [27][28][29] belong to the kind of effective defense technologies against adversarial attacks.…”
Section: Adversarial Defense and Detectionmentioning
confidence: 99%
“…In the meantime, many efforts have been devoted to defend against adversarial examples (Xie et al 2018;Guo et al 2018;Samangouei et al 2018;Song et al 2017;Liao et al 2018;Liu et al 2020;Yang et al 2020;Wang et al 2020). Existing researches try to implement defense in three different categories: robust optimization, certified robustness and detection defense.…”
Section: B Adversarial Defense and Detectionmentioning
confidence: 99%
“…As shown in Fig. 2, for one of the videos used in this study, most of the frames of the NIR video are near duplicates when compared using perceptual hashing [15,19]. Attempting to augment the training set by, for example, (i) tiling video's initial frame with many ROIs (see Fig.…”
Section: Related Workmentioning
confidence: 99%
“…Fig.2. Perceptual hashing algorithm[15,19] applied on one of the perfusion videos used in this study. Selected images till the end of the perfusion t = 860s are near duplicates of the first frame.…”
mentioning
confidence: 99%