Login / Signup
Towards Transferable Adversarial Attacks on Vision Transformers.
Zhipeng Wei
Jingjing Chen
Micah Goldblum
Zuxuan Wu
Tom Goldstein
Yu-Gang Jiang
Published in:
AAAI (2022)
Keyphrases
</>
computer vision
vision system
countermeasures
real time
traffic analysis
active vision
neural network
computer security
watermarking algorithm
multiscale
watermarking scheme
security mechanisms
anomaly detection
security protocols
security threats
genetic algorithm
terrorist attacks
malicious users
data corruption