Follow
Donghua Wang
Title
Cited by
Cited by
Year
Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack
D Wang, T Jiang, J Sun, W Zhou, Z Gong, X Zhang, W Yao, X Chen
Proceedings of the AAAI conference on artificial intelligence 36 (2), 2414-2422, 2022
622022
Targeted speech adversarial example generation with generative adversarial network
D Wang, L Dong, R Wang, D Yan, J Wang
IEEE Access 8, 124503-124513, 2020
312020
A survey on physical adversarial attack in computer vision
D Wang, W Yao, T Jiang, G Tang, X Chen
arXiv preprint arXiv:2209.14262, 2022
222022
Adversarial examples attack and countermeasure for speech recognition system: A survey
D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong
International Conference on Security and Privacy in Digital Economy, 443-468, 2020
192020
Rfla: A stealthy reflected light adversarial attack in the physical world
D Wang, W Yao, T Jiang, C Li, X Chen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
112023
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors
J Sun, W Yao, T Jiang, D Wang, X Chen
Neural Networks 163, 256-271, 2023
92023
Fast speech adversarial example generation for keyword spotting system with conditional GAN
D Wang, L Dong, R Wang, D Yan
Computer Communications 179, 145-156, 2021
52021
Improving transferability of universal adversarial perturbation with feature disruption
D Wang, W Yao, T Jiang, X Chen
IEEE Transactions on Image Processing, 2023
22023
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou, Y Yang, D Wang
IEEE Transactions on Geoscience and Remote Sensing, 2023
22023
A plug-and-play defensive perturbation for copyright protection of dnn-based applications
D Wang, W Yao, T Jiang, W Zhou, L Lin, X Chen
arXiv preprint arXiv:2304.10679, 2023
22023
Defending and Detecting Audio Adversarial Example using Frame Offsets.
Y Gong, D Yan, T Mao, D Wang, R Wang
KSII Transactions on Internet & Information Systems 15 (4), 2021
22021
AdvOps: Decoupling adversarial examples
D Wang, W Yao, T Jiang, X Chen
Pattern Recognition 149, 110252, 2024
12024
Efficient generation of speech adversarial examples with generative model
D Wang, R Wang, L Dong, D Yan, Y Ren
International Workshop on Digital Watermarking, 251-264, 2020
12020
Universal Perturbation-based Secret Key-Controlled Data Hiding
D Wang, W Yao, T Jiang, X Chen
arXiv preprint arXiv:2311.01696, 2023
2023
Adversarial Examples in the Physical World: A Survey
J Wang, D Wang, J Hu, S Wu, T Jiang, W Yao, A Liu, X Liu
arXiv preprint arXiv:2311.01473, 2023
2023
Naturalistic-Aware Adversarial Texture Black-Box Attack for 3d Objects Against Object Detection in the Physical World
D Wang, W Yao, T Jiang, W Zhou, C Li, X Chen
Available at SSRN 4545326, 0
The system can't perform the operation now. Try again later.
Articles 1–16