Journal articles on the topic 'Physical adversarial attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Physical adversarial attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Kaichen, Tzungyu Tsai, Honggang Yu, Tsung-Yi Ho, and Yier Jin. "Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 1088–95. http://dx.doi.org/10.1609/aaai.v34i01.5459.
Full textBi, Chuanxiang, Shang Shi, and Jian Qu. "Enhancing Autonomous Driving: A Novel Approach of Mixed Attack and Physical Defense Strategies." ASEAN Journal of Scientific and Technological Reports 28, no. 1 (2024): e254093. https://doi.org/10.55164/ajstr.v28i1.254093.
Full textZhang, Ximin, Jinyin Chen, Haibin Zheng, and Zhenguang Liu. "PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 10 (2025): 10230–38. https://doi.org/10.1609/aaai.v39i10.33110.
Full textJiang, Wei, Tianyuan Zhang , Shuangcheng Liu , Weiyu Ji , Zichao Zhang , and Gang Xiao . "Exploring the Physical-World Adversarial Robustness of Vehicle Detection." Electronics 12, no. 18 (2023): 3921. http://dx.doi.org/10.3390/electronics12183921.
Full textWei, Hui, Zhixiang Wang, Xuemei Jia, et al. "HOTCOLD Block: Fooling Thermal Infrared Detectors with a Novel Wearable Design." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 12 (2023): 15233–41. http://dx.doi.org/10.1609/aaai.v37i12.26777.
Full textSheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh, and Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)." Sensors 23, no. 12 (2023): 5459. http://dx.doi.org/10.3390/s23125459.
Full textHuang, Hong, Yang Yang, and Yunfei Wang. "AdvFaceGAN: a face dual-identity impersonation attack method based on generative adversarial networks." PeerJ Computer Science 11 (June 11, 2025): e2904. https://doi.org/10.7717/peerj-cs.2904.
Full textQiu, Shilin, Qihe Liu, Shijie Zhou, and Chunjiang Wu. "Review of Artificial Intelligence Adversarial Attack and Defense Technologies." Applied Sciences 9, no. 5 (2019): 909. http://dx.doi.org/10.3390/app9050909.
Full textCai, Wei, Xingyu Di, Xin Wang, Weijie Gao, and Haoran Jia. "Stealthy Vehicle Adversarial Camouflage Texture Generation Based on Neural Style Transfer." Entropy 26, no. 11 (2024): 903. http://dx.doi.org/10.3390/e26110903.
Full textTiliwalidi, Kalibinuer, Bei Hui, Chengyin Hu, and Jingjing Ge. "Adversarial Camera Patch: An Effective and Robust Physical-World Attack on Object Detectors." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 374–84. http://dx.doi.org/10.34190/iccws.19.1.2044.
Full textLuo, Binyan, Hang Cao, Jiahao Cui, et al. "SAR-PATT: A Physical Adversarial Attack for SAR Image Automatic Target Recognition." Remote Sensing 17, no. 1 (2024): 21. https://doi.org/10.3390/rs17010021.
Full textStein, Zvi, Adir Hazan, and Adrian Stern. "Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks." Sensors 25, no. 7 (2025): 2301. https://doi.org/10.3390/s25072301.
Full textKim, Jeonghun, Hunmin Yang, and Se-Yoon Oh. "Camouflaged Adversarial Patch Attack on Object Detector." Journal of the Korea Institute of Military Science and Technology 26, no. 1 (2023): 44–53. http://dx.doi.org/10.9766/kimst.2023.26.1.044.
Full textGomez-Alanis, Alejandro, Jose A. Gonzalez-Lopez, and Antonio M. Peinado. "GANBA: Generative Adversarial Network for Biometric Anti-Spoofing." Applied Sciences 12, no. 3 (2022): 1454. http://dx.doi.org/10.3390/app12031454.
Full textDeng, Binyue, Denghui Zhang, Fashan Dong, Junjian Zhang, Muhammad Shafiq, and Zhaoquan Gu. "Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images." Remote Sensing 15, no. 4 (2023): 885. http://dx.doi.org/10.3390/rs15040885.
Full textWang, Donghua, Tingsong Jiang, Jialiang Sun, et al. "FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 2 (2022): 2414–22. http://dx.doi.org/10.1609/aaai.v36i2.20141.
Full textOyama, Tatsuya, Shunsuke Okura, Kota Yoshida, and Takeshi Fujino. "Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface." Sensors 23, no. 10 (2023): 4742. http://dx.doi.org/10.3390/s23104742.
Full textDimitriu, Adonisz, Tamás Vilmos Michaletzky, and Viktor Remeli. "Improving Transferability of Physical Adversarial Attacks on Object Detectors Through Multi-Model Optimization." Applied Sciences 14, no. 23 (2024): 11423. https://doi.org/10.3390/app142311423.
Full textZhou, Shuangju, Yang Li, Wenyi Tan, Chenxing Zhao, Xin Zhou, and Quan Pan. "Infrared Adversarial Patch Generation Based on Reinforcement Learning." Mathematics 12, no. 21 (2024): 3335. http://dx.doi.org/10.3390/math12213335.
Full textXue, Meng, Kuang Peng, Xueluan Gong, Qian Zhang, Yanjiao Chen, and Routing Li. "Echo." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, no. 3 (2023): 1–24. http://dx.doi.org/10.1145/3610874.
Full textZhou, Yuxuan, Huangxun Chen, Chenyu Huang, and Qian Zhang. "WiAdv." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3534618.
Full textLi, Hao, Fanggao Wan, Yue Su, Yue Wu, Mingyang Zhang, and Maoguo Gong. "AdvDisplay: Adversarial Display Assembled by Thermoelectric Cooler for Fooling Thermal Infrared Detectors." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 17 (2025): 18279–86. https://doi.org/10.1609/aaai.v39i17.34011.
Full textZhang, Yichuang, Yu Zhang, Jiahao Qi, et al. "Adversarial Patch Attack on Multi-Scale Object Detection for UAV Remote Sensing Images." Remote Sensing 14, no. 21 (2022): 5298. http://dx.doi.org/10.3390/rs14215298.
Full textLal, Sheeba, Saeed Ur Rehman, Jamal Hussain Shah, et al. "Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition." Sensors 21, no. 11 (2021): 3922. http://dx.doi.org/10.3390/s21113922.
Full textLee, Seungyeol, Seongwoo Hong, Gwangyeol Kim, and Jaecheol Ha. "SSIM-Based Autoencoder Modeling to Defeat Adversarial Patch Attacks." Sensors 24, no. 19 (2024): 6461. http://dx.doi.org/10.3390/s24196461.
Full textGuesmi, Amira, Muhammad Abdullah Hanif, and Muhammad Shafique. "AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems." Information 14, no. 12 (2023): 634. http://dx.doi.org/10.3390/info14120634.
Full textAlmedires, Motaz Abdulaziz, Ahmed Elkhalil, and Mohammed Amin. "Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 4–22. https://doi.org/10.63180/jcsra.thestap.2025.3.2.
Full textChen, Yuanwan, Yalun Wu, Xiaoshu Cui, Qiong Li, Jiqiang Liu, and Wenjia Niu. "Reflective Adversarial Attacks against Pedestrian Detection Systems for Vehicles at Night." Symmetry 16, no. 10 (2024): 1262. http://dx.doi.org/10.3390/sym16101262.
Full textKim, Tae Hoon, Moez Krichen, Meznah A. Alamro, and Gabreil Avelino Sampedro. "A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles." Electronics 13, no. 12 (2024): 2420. http://dx.doi.org/10.3390/electronics13122420.
Full textWang, Zhen, Buhong Wang, Chuanlei Zhang, and Yaohui Liu. "Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction." Remote Sensing 15, no. 6 (2023): 1690. http://dx.doi.org/10.3390/rs15061690.
Full textDAIMO, Renya, and Satoshi ONO. "Projection-Based Physical Adversarial Attack for Monocular Depth Estimation." IEICE Transactions on Information and Systems E106.D, no. 1 (2023): 31–35. http://dx.doi.org/10.1587/transinf.2022mul0001.
Full textSingh, Vinit Kumar. "A Deep Neural Network Assisted Physical Layer Security Mechanism for Wireless Networks." International Journal for Research in Applied Science and Engineering Technology 13, no. 7 (2025): 109–18. https://doi.org/10.22214/ijraset.2025.72926.
Full textXue, Wei, Zhiming Chen, Weiwei Tian, Yunhua Wu, and Bing Hua. "A Cascade Defense Method for Multidomain Adversarial Attacks under Remote Sensing Detection." Remote Sensing 14, no. 15 (2022): 3559. http://dx.doi.org/10.3390/rs14153559.
Full textZhao, Ling, Xun Lv, Lili Zhu, et al. "A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects." Journal of Imaging 11, no. 1 (2025): 25. https://doi.org/10.3390/jimaging11010025.
Full textYang, Zhongguo, Irshad Ahmed Abbasi, Fahad Algarni, Sikandar Ali, and Mingzhu Zhang. "An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding." Security and Communication Networks 2021 (March 9, 2021): 1–11. http://dx.doi.org/10.1155/2021/5537041.
Full textWang, Yichen, Yuxuan Chou, Ziqi Zhou, et al. "Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 8 (2025): 8069–77. https://doi.org/10.1609/aaai.v39i8.32870.
Full textZhao, Renhe, Dongqi He, and Fangyi You. "Neural Network-Adaptive Secure Control for Nonlinear Cyber-Physical Systems Against Adversarial Attacks." Applied Sciences 15, no. 7 (2025): 3893. https://doi.org/10.3390/app15073893.
Full textAlzaidy, Sharoug, and Hamad Binsalleeh. "Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification." Applied Sciences 14, no. 4 (2024): 1673. http://dx.doi.org/10.3390/app14041673.
Full textJeong, Hyeon-Jae, Jubin Lee, Yu-Seung Ma, and Seung-Ik Lee. "Attack Success Rate Analysis of Adversarial Patch in Physical Environment." Journal of KIISE 50, no. 2 (2023): 185–95. http://dx.doi.org/10.5626/jok.2023.50.2.185.
Full textZolotukhin, Mikhail, Di Zhang, Timo Hämäläinen, and Parsa Miraghaei. "On Attacking Future 5G Networks with Adversarial Examples: Survey." Network 3, no. 1 (2022): 39–90. http://dx.doi.org/10.3390/network3010003.
Full textLi, Bo, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, and Zhiming Gu. "Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks." Energies 18, no. 12 (2025): 3145. https://doi.org/10.3390/en18123145.
Full textLee, Xian Yeow, Sambit Ghadai, Kai Liang Tan, Chinmay Hegde, and Soumik Sarkar. "Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 4577–84. http://dx.doi.org/10.1609/aaai.v34i04.5887.
Full textZhou, Buxiang, Xuan Li, Tianlei Zang, Yating Cai, Jiale Wu, and Shijun Wang. "The Detection of False Data Injection Attack for Cyber–Physical Power Systems Considering a Multi-Attack Mode." Applied Sciences 13, no. 19 (2023): 10596. http://dx.doi.org/10.3390/app131910596.
Full textLiu, Qiao, Guang Gong, Yong Wang, and Hui Li. "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach." Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7843843.
Full textFarraj, Abdallah, and Eman Hammad. "A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments." Sensors 24, no. 16 (2024): 5171. http://dx.doi.org/10.3390/s24165171.
Full textIslam, Md Tawfiqul. "A QUANTITATIVE ASSESSMENT OF SECURE NEURAL NETWORK ARCHITECTURES FOR FAULT DETECTION IN INDUSTRIAL CONTROL SYSTEMS." Review of Applied Science and Technology 02, no. 04 (2023): 01–24. https://doi.org/10.63125/3m7gbs97.
Full textKADIRE, SUMALATA, V. SAI ANJANI, P AKSHITHA, and V. RAMYA SRI. "SECURITY ANALYSIS AND EXPLOITATION OF IC CHIP LEVEL COUNTER QUANTITY AGAINST BODILY OCCURRENCES." Industrial Engineering Journal 53, no. 12 (2024): 154–61. https://doi.org/10.36893/iej.2024.v53i12.020.
Full textCultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (2023): 9886. http://dx.doi.org/10.3390/s23249886.
Full textLi, Kunzhan, Fengyong Li, Baonan Wang, and Meijing Shan. "False data injection attack sample generation using an adversarial attention-diffusion model in smart grids." AIMS Energy 12, no. 6 (2024): 1271–93. https://doi.org/10.3934/energy.2024058.
Full textNiu, Luyao, Bhaskar Ramasubramanian, Andrew Clark, and Radha Poovendran. "Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments." Games 14, no. 2 (2023): 30. http://dx.doi.org/10.3390/g14020030.
Full text