ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2008.01919
  4. Cited By
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples

Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples

5 August 2020
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
Xiaoguang Han
    AAML
ArXivPDFHTML

Papers citing "Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples"

21 / 21 papers shown
Title
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage
Wenbo Zhang
Ju Jia
Xiaojun Jia
Yihao Huang
Xuzhao Li
Cong Wu
Lina Wang
AAML
44
0
0
15 Apr 2025
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models
Xiaojun Jia
Sensen Gao
Simeng Qin
Ke Ma
Xianrui Li
Yihao Huang
Wei Dong
Yang Liu
Xiaochun Cao
AAML
VLM
62
2
0
17 Mar 2025
Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution
Yihao Huang
Xin Luo
Yihao Huang
Felix Juefei-Xu
Xiaojun Jia
Weikai Miao
G. Pu
Yang Liu
64
1
0
06 Mar 2025
Perception-guided Jailbreak against Text-to-Image Models
Perception-guided Jailbreak against Text-to-Image Models
Yihao Huang
Le Liang
Tianlin Li
Xiaojun Jia
Run Wang
Weikai Miao
G. Pu
Yang Liu
46
7
0
20 Aug 2024
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise
  Regression Tasks
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks
Zhiyuan Cheng
Zhaoyi Liu
Tengda Guo
Shiwei Feng
Dongfang Liu
Mingjie Tang
Xiangyu Zhang
AAML
41
3
0
01 Apr 2024
Boosting Transferability in Vision-Language Attacks via Diversification
  along the Intersection Region of Adversarial Trajectory
Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory
Sensen Gao
Xiaojun Jia
Xuhong Ren
Ivor Tsang
Qing Guo
AAML
43
14
0
19 Mar 2024
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style
  Transfer
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Yuxin Cao
Ziyu Zhao
Xi Xiao
Derui Wang
Minhui Xue
Jin Lu
AAML
24
4
0
15 Dec 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing Guo
Yihao Huang
Xiaofei Xie
Lei Ma
Jianjun Zhao
AAML
34
48
0
23 Apr 2023
Improving Fast Adversarial Training with Prior-Guided Knowledge
Improving Fast Adversarial Training with Prior-Guided Knowledge
Xiaojun Jia
Yong Zhang
Xingxing Wei
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
41
26
0
01 Apr 2023
Object-fabrication Targeted Attack for Object Detection
Object-fabrication Targeted Attack for Object Detection
Xuchong Zhang
Changfeng Sun
Haoliang Han
Hang Wang
Hongbin Sun
Nanning Zheng
AAML
27
0
0
13 Dec 2022
ConfounderGAN: Protecting Image Data Privacy with Causal Confounder
ConfounderGAN: Protecting Image Data Privacy with Causal Confounder
Qi Tian
Kun Kuang
Ke Jiang
Furui Liu
Zhihua Wang
Fei Wu
27
7
0
04 Dec 2022
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
Xinwei Liu
Jian Liu
Yang Bai
Jindong Gu
Tao Chen
Xiaojun Jia
Xiaochun Cao
AAML
WIGM
33
26
0
17 Jul 2022
Feasibility of Inconspicuous GAN-generated Adversarial Patches against
  Object Detection
Feasibility of Inconspicuous GAN-generated Adversarial Patches against Object Detection
Svetlana Pavlitskaya
Bianca-Marina Codau
J. Marius Zöllner
AAML
16
11
0
15 Jul 2022
LAS-AT: Adversarial Training with Learnable Attack Strategy
LAS-AT: Adversarial Training with Learnable Attack Strategy
Xiaojun Jia
Yong Zhang
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
47
131
0
13 Mar 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
24
71
0
22 Jan 2022
Reversible Attack based on Local Visual Adversarial Perturbation
Reversible Attack based on Local Visual Adversarial Perturbation
Li Chen
Shaowei Zhu
Z. Yin
AAML
19
4
0
06 Oct 2021
Adversarial Relighting Against Face Recognition
Adversarial Relighting Against Face Recognition
Qian Zhang
Qing Guo
Ruijun Gao
Felix Juefei Xu
Hongkai Yu
Wei Feng
AAML
14
19
0
18 Aug 2021
Inconspicuous Adversarial Patches for Fooling Image Recognition Systems
  on Mobile Devices
Inconspicuous Adversarial Patches for Fooling Image Recognition Systems on Mobile Devices
Tao Bai
Jinqi Luo
Jun Zhao
AAML
31
30
0
29 Jun 2021
Generating Adversarial yet Inconspicuous Patches with a Single Image
Generating Adversarial yet Inconspicuous Patches with a Single Image
Jinqi Luo
Tao Bai
Jun Zhao
AAML
27
6
0
21 Sep 2020
ComDefend: An Efficient Image Compression Model to Defend Adversarial
  Examples
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
H. Foroosh
AAML
69
264
0
30 Nov 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
326
5,847
0
08 Jul 2016
1