ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1904.08653
  4. Cited By
Fooling automated surveillance cameras: adversarial patches to attack
  person detection

Fooling automated surveillance cameras: adversarial patches to attack person detection

18 April 2019
Simen Thys
W. V. Ranst
Toon Goedemé
    AAML
ArXivPDFHTML

Papers citing "Fooling automated surveillance cameras: adversarial patches to attack person detection"

50 / 275 papers shown
Title
Beyond 3D Siamese Tracking: A Motion-Centric Paradigm for 3D Single
  Object Tracking in Point Clouds
Beyond 3D Siamese Tracking: A Motion-Centric Paradigm for 3D Single Object Tracking in Point Clouds
Chaoda Zheng
Xu Yan
Haiming Zhang
Baoyuan Wang
Sheng-Hsien Cheng
Shuguang Cui
Zhen Li
3DPC
30
74
0
03 Mar 2022
Enhance transferability of adversarial examples with model architecture
Enhance transferability of adversarial examples with model architecture
Mingyuan Fan
Wenzhong Guo
Shengxing Yu
Zuobin Ying
Ximeng Liu
SILM
AAML
24
7
0
28 Feb 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
19
0
0
25 Feb 2022
Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Kien Do
Haripriya Harikumar
Hung Le
D. Nguyen
T. Tran
Santu Rana
Dang Nguyen
Willy Susilo
Svetha Venkatesh
AAML
23
13
0
24 Feb 2022
Developing Imperceptible Adversarial Patches to Camouflage Military
  Assets From Computer Vision Enabled Technologies
Developing Imperceptible Adversarial Patches to Camouflage Military Assets From Computer Vision Enabled Technologies
Christopher Wise
Jo Plested
AAML
15
7
0
17 Feb 2022
Tubes Among Us: Analog Attack on Automatic Speaker Identification
Tubes Among Us: Analog Attack on Automatic Speaker Identification
Shimaa Ahmed
Yash R. Wani
Ali Shahin Shamsabadi
Mohammad Yaghini
Ilia Shumailov
Nicolas Papernot
Kassem Fawaz
AAML
46
4
0
06 Feb 2022
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding
  Attacks via Patch-agnostic Masking
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking
Chong Xiang
Alexander Valtchanov
Saeed Mahloujifar
Prateek Mittal
AAML
16
21
0
03 Feb 2022
Thermal and Visual Tracking of Photovoltaic Plants for Autonomous UAV
  inspection
Thermal and Visual Tracking of Photovoltaic Plants for Autonomous UAV inspection
Luca Morando
Carmine Tommaso Recchiuto
Jacopo Calla
Paolo Scuteri
A. Sgorbissa
17
31
0
02 Feb 2022
Hiding Behind Backdoors: Self-Obfuscation Against Generative Models
Hiding Behind Backdoors: Self-Obfuscation Against Generative Models
Siddhartha Datta
N. Shadbolt
SILM
AAML
AI4CE
25
2
0
24 Jan 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object
  Detectors in the Physical World
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Hua Ma
Yinshan Li
Yansong Gao
A. Abuadbba
Zhi-Li Zhang
Anmin Fu
Hyoungshick Kim
S. Al-Sarawi
N. Surya
Derek Abbott
21
34
0
21 Jan 2022
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints
Amira Guesmi
Khaled N. Khasawneh
Nael B. Abu-Ghazaleh
Ihsen Alouani
AAML
20
14
0
05 Jan 2022
Revisiting and Advancing Fast Adversarial Training Through The Lens of
  Bi-Level Optimization
Revisiting and Advancing Fast Adversarial Training Through The Lens of Bi-Level Optimization
Yihua Zhang
Guanhua Zhang
Prashant Khanduri
Min-Fong Hong
Shiyu Chang
Sijia Liu
AAML
41
86
0
23 Dec 2021
A Review on Visual Privacy Preservation Techniques for Active and
  Assisted Living
A Review on Visual Privacy Preservation Techniques for Active and Assisted Living
Siddharth Ravi
Pau Climent-Pérez
Francisco Flórez-Revuelta
37
33
0
17 Dec 2021
Do You See What I See? Capabilities and Limits of Automated Multimedia
  Content Analysis
Do You See What I See? Capabilities and Limits of Automated Multimedia Content Analysis
Carey Shenkman
Dhanaraj Thakur
Emma Llansó
27
8
0
15 Dec 2021
Segment and Complete: Defending Object Detectors against Adversarial
  Patch Attacks with Robust Patch Detection
Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection
Jiangjiang Liu
Alexander Levine
Chun Pong Lau
Ramalingam Chellappa
S. Feizi
AAML
32
77
0
08 Dec 2021
Attack-Centric Approach for Evaluating Transferability of Adversarial
  Samples in Machine Learning Models
Attack-Centric Approach for Evaluating Transferability of Adversarial Samples in Machine Learning Models
Tochukwu Idika
Ismail Akturk
SILM
AAML
36
0
0
03 Dec 2021
Adversarial Attacks against a Satellite-borne Multispectral Cloud
  Detector
Adversarial Attacks against a Satellite-borne Multispectral Cloud Detector
Andrew Du
Yee Wei Law
Michele Sasdelli
Bo Chen
Ken Clarke
M. Brown
Tat-Jun Chin
AAML
30
11
0
03 Dec 2021
Adversarial Mask: Real-World Universal Adversarial Attack on Face
  Recognition Model
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model
Alon Zolfi
S. Avidan
Yuval Elovici
A. Shabtai
AAML
PICV
27
23
0
21 Nov 2021
Defense Against Explanation Manipulation
Defense Against Explanation Manipulation
Ruixiang Tang
Ninghao Liu
Fan Yang
Na Zou
Xia Hu
AAML
46
11
0
08 Nov 2021
Addressing Privacy Threats from Machine Learning
Addressing Privacy Threats from Machine Learning
Mary Anne Smart
29
2
0
25 Oct 2021
Certified Patch Robustness via Smoothed Vision Transformers
Certified Patch Robustness via Smoothed Vision Transformers
Hadi Salman
Saachi Jain
Eric Wong
Aleksander Mkadry
AAML
70
58
0
11 Oct 2021
Adversarial Attacks in a Multi-view Setting: An Empirical Study of the
  Adversarial Patches Inter-view Transferability
Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability
Bilel Tarchoun
Ihsen Alouani
Anouar Ben Khalifa
Mohamed Ali Mahjoub
AAML
17
6
0
10 Oct 2021
Adversarial Token Attacks on Vision Transformers
Adversarial Token Attacks on Vision Transformers
Ameya Joshi
Gauri Jagatap
C. Hegde
ViT
30
19
0
08 Oct 2021
Robust Feature-Level Adversaries are Interpretability Tools
Robust Feature-Level Adversaries are Interpretability Tools
Stephen Casper
Max Nadeau
Dylan Hadfield-Menell
Gabriel Kreiman
AAML
53
27
0
07 Oct 2021
You Cannot Easily Catch Me: A Low-Detectable Adversarial Patch for
  Object Detectors
You Cannot Easily Catch Me: A Low-Detectable Adversarial Patch for Object Detectors
Zijian Zhu
Hang Su
Chang-rui Liu
Wenzhao Xiang
Shibao Zheng
AAML
13
6
0
30 Sep 2021
Adversarial Semantic Contour for Object Detection
Adversarial Semantic Contour for Object Detection
Yichi Zhang
Zijian Zhu
Xiao Yang
Jun Zhu
ObjD
AAML
33
4
0
30 Sep 2021
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view
  Physical Adversarial Attack
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack
Donghua Wang
Tingsong Jiang
Jialiang Sun
Weien Zhou
Xiaoya Zhang
Zhiqiang Gong
W. Yao
Xiaoqian Chen
AAML
39
101
0
15 Sep 2021
Dodging Attack Using Carefully Crafted Natural Makeup
Dodging Attack Using Carefully Crafted Natural Makeup
Nitzan Bitton-Guetta
A. Shabtai
Inderjeet Singh
Satoru Momiyama
Yuval Elovici
AAML
16
20
0
14 Sep 2021
Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection
  Sensor Fusion Models
Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models
Wonseok Park
Nan Liu
Qi Alfred Chen
Z. Morley Mao
AAML
3DPC
31
12
0
13 Sep 2021
Learning Coated Adversarial Camouflages for Object Detectors
Learning Coated Adversarial Camouflages for Object Detectors
Yexin Duan
Jialin Chen
Xingyu Zhou
Junhua Zou
Zhengyun He
Jin Zhang
Wu Zhang
Zhisong Pan
AAML
14
26
0
01 Sep 2021
Physical Adversarial Attacks on an Aerial Imagery Object Detector
Physical Adversarial Attacks on an Aerial Imagery Object Detector
Andrew Du
Bo Chen
Tat-Jun Chin
Yee Wei Law
Michele Sasdelli
Ramesh Rajasegaran
Dillon Campbell
AAML
33
60
0
26 Aug 2021
Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
M. Lennon
Nathan G. Drenkow
Philippe Burlina
AAML
19
8
0
16 Aug 2021
Adversarial Attacks on Multi-task Visual Perception for Autonomous
  Driving
Adversarial Attacks on Multi-task Visual Perception for Autonomous Driving
Ibrahim Sobh
Ahmed Hamed
V. Kumar
S. Yogamani
AAML
45
20
0
15 Jul 2021
When and How to Fool Explainable Models (and Humans) with Adversarial
  Examples
When and How to Fool Explainable Models (and Humans) with Adversarial Examples
Jon Vadillo
Roberto Santana
Jose A. Lozano
SILM
AAML
36
12
0
05 Jul 2021
Inconspicuous Adversarial Patches for Fooling Image Recognition Systems
  on Mobile Devices
Inconspicuous Adversarial Patches for Fooling Image Recognition Systems on Mobile Devices
Tao Bai
Jinqi Luo
Jun Zhao
AAML
31
30
0
29 Jun 2021
Data Poisoning Won't Save You From Facial Recognition
Data Poisoning Won't Save You From Facial Recognition
Evani Radiya-Dixit
Sanghyun Hong
Nicholas Carlini
Florian Tramèr
AAML
PICV
22
57
0
28 Jun 2021
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion
  based Perception in Autonomous Driving Under Physical-World Attacks
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Yulong Cao*
Ningfei Wang*
Chaowei Xiao
Dawei Yang
Jin Fang
Ruigang Yang
Qi Alfred Chen
Mingyan D. Liu
Bo-wen Li
AAML
29
219
0
17 Jun 2021
What Can Knowledge Bring to Machine Learning? -- A Survey of Low-shot
  Learning for Structured Data
What Can Knowledge Bring to Machine Learning? -- A Survey of Low-shot Learning for Structured Data
Yang Hu
Adriane P. Chapman
Guihua Wen
Dame Wendy Hall
44
24
0
11 Jun 2021
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or
  WITHOUT Signature
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature
Binxiu Liang
Jiachun Li
Jianjun Huang
AAML
33
12
0
09 Jun 2021
Revisiting Hilbert-Schmidt Information Bottleneck for Adversarial
  Robustness
Revisiting Hilbert-Schmidt Information Bottleneck for Adversarial Robustness
Zifeng Wang
T. Jian
A. Masoomi
Stratis Ioannidis
Jennifer Dy
AAML
29
25
0
04 Jun 2021
Local Aggressive Adversarial Attacks on 3D Point Cloud
Local Aggressive Adversarial Attacks on 3D Point Cloud
Yiming Sun
F. Chen
Zhiyu Chen
Mingjie Wang
3DPC
AAML
29
16
0
19 May 2021
Real-time Detection of Practical Universal Adversarial Perturbations
Real-time Detection of Practical Universal Adversarial Perturbations
Kenneth T. Co
Luis Muñoz-González
Leslie Kanthan
Emil C. Lupu
AAML
33
6
0
16 May 2021
IPatch: A Remote Adversarial Patch
IPatch: A Remote Adversarial Patch
Yisroel Mirsky
AAML
22
12
0
30 Apr 2021
Inspect, Understand, Overcome: A Survey of Practical Methods for AI
  Safety
Inspect, Understand, Overcome: A Survey of Practical Methods for AI Safety
Sebastian Houben
Stephanie Abrecht
Maram Akila
Andreas Bär
Felix Brockherde
...
Serin Varghese
Michael Weber
Sebastian J. Wirkert
Tim Wirtz
Matthias Woehrle
AAML
13
58
0
29 Apr 2021
Learning Transferable 3D Adversarial Cloaks for Deep Trained Detectors
Learning Transferable 3D Adversarial Cloaks for Deep Trained Detectors
Arman Maesumi
Mingkang Zhu
Yi Wang
Tianlong Chen
Zhangyang Wang
Minh Nguyen
30
8
0
22 Apr 2021
Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box
  Vulnerabilities
Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities
Julia Rosenzweig
Joachim Sicking
Sebastian Houben
Michael Mock
Maram Akila
AAML
39
3
0
22 Apr 2021
Jacobian Regularization for Mitigating Universal Adversarial
  Perturbations
Jacobian Regularization for Mitigating Universal Adversarial Perturbations
Kenneth T. Co
David Martínez-Rego
Emil C. Lupu
AAML
26
8
0
21 Apr 2021
Fashion-Guided Adversarial Attack on Person Segmentation
Fashion-Guided Adversarial Attack on Person Segmentation
Marc Treu
Trung-Nghia Le
H. Nguyen
Junichi Yamagishi
Isao Echizen
AAML
33
12
0
17 Apr 2021
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Xingxing Wei
Yingjie Guo
Jie Yu
AAML
30
115
0
14 Apr 2021
DeepBlur: A Simple and Effective Method for Natural Image Obfuscation
DeepBlur: A Simple and Effective Method for Natural Image Obfuscation
Tao Li
Minsoo Choi
PICV
AAML
15
18
0
31 Mar 2021
Previous
123456
Next