ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2409.04982
  4. Cited By
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

8 September 2024
Xinheng Xie
Kureha Yamaguchi
Margaux Leblanc
Simon Malzard
Varun Chhabra
Victoria Nockles
Yue-bo Wu
    AAML
ArXivPDFHTML

Papers citing "2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures"

34 / 34 papers shown
Title
On the signature of an image
On the signature of an image
J. Diehl
K. Ebrahimi-Fard
Fabian A. Harang
S. Tindel
128
3
0
29 Feb 2024
Novelty Detection on Radio Astronomy Data using Signatures
Novelty Detection on Radio Astronomy Data using Signatures
Paola Arrubarrena
M. Lemercier
Bojan Nikolic
Terry Lyons
Thomas Cass
53
5
0
22 Feb 2024
2-d signature of images and texture classification
2-d signature of images and texture classification
Shenmin Zhang
Guang Lin
S. Tindel
63
5
0
10 May 2022
A Review of Adversarial Attack and Defense for Classification Methods
A Review of Adversarial Attack and Defense for Classification Methods
Yao Li
Minhao Cheng
Cho-Jui Hsieh
T. C. Lee
AAML
52
68
0
18 Nov 2021
Backdoor Attacks on Self-Supervised Learning
Backdoor Attacks on Self-Supervised Learning
Aniruddha Saha
Ajinkya Tejankar
Soroush Abbasi Koohpayegani
Hamed Pirsiavash
SSL
AAML
46
109
0
21 May 2021
Denoising Diffusion Probabilistic Models
Denoising Diffusion Probabilistic Models
Jonathan Ho
Ajay Jain
Pieter Abbeel
DiffM
522
18,008
0
19 Jun 2020
Dimensionless Anomaly Detection on Multivariate Streams with Variance
  Norm and Path Signature
Dimensionless Anomaly Detection on Multivariate Streams with Variance Norm and Path Signature
Zhen Shao
Peter Foster
Thomas Cochrane
Imanol Perez Arribas
Terry Lyons
26
8
0
05 Jun 2020
Systematic Evaluation of Backdoor Data Poisoning Attacks on Image
  Classifiers
Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Loc Truong
Chace Jones
Brian Hutchinson
Andrew August
Brenda Praggastis
Robert J. Jasper
Nicole Nichols
Aaron Tuor
AAML
45
50
0
24 Apr 2020
Square Attack: a query-efficient black-box adversarial attack via random
  search
Square Attack: a query-efficient black-box adversarial attack via random search
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
Matthias Hein
AAML
75
987
0
29 Nov 2019
Deep Neural Rejection against Adversarial Examples
Deep Neural Rejection against Adversarial Examples
Angelo Sotgiu
Ambra Demontis
Marco Melis
Battista Biggio
Giorgio Fumera
Xiaoyi Feng
Fabio Roli
AAML
54
69
0
01 Oct 2019
On Evaluating Adversarial Robustness
On Evaluating Adversarial Robustness
Nicholas Carlini
Anish Athalye
Nicolas Papernot
Wieland Brendel
Jonas Rauber
Dimitris Tsipras
Ian Goodfellow
Aleksander Madry
Alexey Kurakin
ELM
AAML
81
901
0
18 Feb 2019
Spectral Signatures in Backdoor Attacks
Spectral Signatures in Backdoor Attacks
Brandon Tran
Jerry Li
Aleksander Madry
AAML
85
788
0
01 Nov 2018
Backdoor Embedding in Convolutional Neural Network Models via Invisible
  Perturbation
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
C. Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
SILM
85
313
0
30 Aug 2018
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A
  Survey
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
Naveed Akhtar
Ajmal Mian
AAML
89
1,867
0
02 Jan 2018
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Battista Biggio
Fabio Roli
AAML
114
1,409
0
08 Dec 2017
One pixel attack for fooling deep neural networks
One pixel attack for fooling deep neural networks
Jiawei Su
Danilo Vasconcellos Vargas
Kouichi Sakurai
AAML
117
2,323
0
24 Oct 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model
  Supply Chain
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
99
1,770
0
22 Aug 2017
A signature-based machine learning model for bipolar disorder and
  borderline personality disorder
A signature-based machine learning model for bipolar disorder and borderline personality disorder
Imanol Perez Arribas
K. Saunders
G. Goodwin
Terry Lyons
146
97
0
22 Jul 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
283
12,060
0
19 Jun 2017
Detecting Adversarial Image Examples in Deep Networks with Adaptive
  Noise Reduction
Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction
Bin Liang
Hongcheng Li
Miaoqiang Su
Xirong Li
Wenchang Shi
Xiaofeng Wang
AAML
86
217
0
23 May 2017
On the (Statistical) Detection of Adversarial Examples
On the (Statistical) Detection of Adversarial Examples
Kathrin Grosse
Praveen Manoharan
Nicolas Papernot
Michael Backes
Patrick McDaniel
AAML
73
712
0
21 Feb 2017
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
461
3,140
0
04 Nov 2016
Learning Spatial-Semantic Context with Fully Convolutional Recurrent
  Network for Online Handwritten Chinese Text Recognition
Learning Spatial-Semantic Context with Fully Convolutional Recurrent Network for Online Handwritten Chinese Text Recognition
Zecheng Xie
Zenghui Sun
Lianwen Jin
Hao Ni
Terry Lyons
70
124
0
09 Oct 2016
Densely Connected Convolutional Networks
Densely Connected Convolutional Networks
Gao Huang
Zhuang Liu
Laurens van der Maaten
Kilian Q. Weinberger
PINN
3DV
731
36,781
0
25 Aug 2016
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OOD
AAML
243
8,548
0
16 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
517
5,893
0
08 Jul 2016
Deep Residual Learning for Image Recognition
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
2.1K
193,814
0
10 Dec 2015
Rethinking the Inception Architecture for Computer Vision
Rethinking the Inception Architecture for Computer Vision
Christian Szegedy
Vincent Vanhoucke
Sergey Ioffe
Jonathon Shlens
Z. Wojna
3DV
BDL
838
27,303
0
02 Dec 2015
Adversarial Manipulation of Deep Representations
Adversarial Manipulation of Deep Representations
S. Sabour
Yanshuai Cao
Fartash Faghri
David J. Fleet
GAN
AAML
73
286
0
16 Nov 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
250
19,017
0
20 Dec 2014
Very Deep Convolutional Networks for Large-Scale Image Recognition
Very Deep Convolutional Networks for Large-Scale Image Recognition
Karen Simonyan
Andrew Zisserman
FAtt
MDE
1.5K
100,330
0
04 Sep 2014
Rough paths, Signatures and the modelling of functions on streams
Rough paths, Signatures and the modelling of functions on streams
Terry Lyons
189
136
0
18 May 2014
Visualizing and Understanding Convolutional Networks
Visualizing and Understanding Convolutional Networks
Matthew D. Zeiler
Rob Fergus
FAtt
SSL
563
15,874
0
12 Nov 2013
Poisoning Attacks against Support Vector Machines
Poisoning Attacks against Support Vector Machines
Battista Biggio
B. Nelson
Pavel Laskov
AAML
109
1,587
0
27 Jun 2012
1