ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2407.06552
  4. Cited By
DLOVE: A new Security Evaluation Tool for Deep Learning Based
  Watermarking Techniques

DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques

9 July 2024
Sudev Kumar Padhi
Sk. Subidh Ali
    AAML
ArXivPDFHTML

Papers citing "DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques"

11 / 11 papers shown
Title
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity
  Deep Hiding
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding
Hangcheng Liu
Tao Xiang
Shangwei Guo
Han Li
Tianwei Zhang
Xiaofeng Liao
85
5
0
03 Aug 2023
MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of
  Real and Simulated JPEG Compression
MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression
Zhaoyang Jia
Han Fang
Weiming Zhang
46
156
0
18 Aug 2021
Distortion Agnostic Deep Watermarking
Distortion Agnostic Deep Watermarking
Xiyang Luo
Ruohan Zhan
Huiwen Chang
Feng Yang
P. Milanfar
WIGM
47
161
0
14 Jan 2020
HiDDeN: Hiding Data With Deep Networks
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
52
747
0
26 Jul 2018
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
Richard Y. Zhang
Phillip Isola
Alexei A. Efros
Eli Shechtman
Oliver Wang
EGVM
327
11,734
0
11 Jan 2018
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
273
12,029
0
19 Jun 2017
Delving into Transferable Adversarial Examples and Black-box Attacks
Delving into Transferable Adversarial Examples and Black-box Attacks
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
AAML
133
1,731
0
08 Nov 2016
Spatial Transformer Networks
Spatial Transformer Networks
Max Jaderberg
Karen Simonyan
Andrew Zisserman
Koray Kavukcuoglu
292
7,379
0
05 Jun 2015
U-Net: Convolutional Networks for Biomedical Image Segmentation
U-Net: Convolutional Networks for Biomedical Image Segmentation
Olaf Ronneberger
Philipp Fischer
Thomas Brox
SSeg
3DV
1.6K
76,917
0
18 May 2015
Microsoft COCO: Common Objects in Context
Microsoft COCO: Common Objects in Context
Nayeon Lee
Michael Maire
Serge J. Belongie
Lubomir Bourdev
Ross B. Girshick
James Hays
Pietro Perona
Deva Ramanan
C. L. Zitnick
Piotr Dollár
ObjD
375
43,524
0
01 May 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
243
14,893
1
21 Dec 2013
1