Adversarial Token Attacks on Vision Transformers.
Ameya JoshiGauri JagatapChinmay HegdePublished in: CoRR (2021)
Keyphrases
- vision system
- countermeasures
- real time
- computer vision
- security mechanisms
- multi agent
- neural network
- java card
- watermarking scheme
- visual perception
- multiscale
- security protocols
- active vision
- ddos attacks
- image watermarking
- cryptographic protocols
- machine learning
- security threats
- terrorist attacks
- digital image watermarking