Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack D Wang, T Jiang, J Sun, W Zhou, Z Gong, X Zhang, W Yao, X Chen Proceedings of the AAAI conference on artificial intelligence 36 (2), 2414-2422, 2022 | 62 | 2022 |
Targeted speech adversarial example generation with generative adversarial network D Wang, L Dong, R Wang, D Yan, J Wang IEEE Access 8, 124503-124513, 2020 | 31 | 2020 |
A survey on physical adversarial attack in computer vision D Wang, W Yao, T Jiang, G Tang, X Chen arXiv preprint arXiv:2209.14262, 2022 | 22 | 2022 |
Adversarial examples attack and countermeasure for speech recognition system: A survey D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong International Conference on Security and Privacy in Digital Economy, 443-468, 2020 | 19 | 2020 |
Rfla: A stealthy reflected light adversarial attack in the physical world D Wang, W Yao, T Jiang, C Li, X Chen Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 11 | 2023 |
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors J Sun, W Yao, T Jiang, D Wang, X Chen Neural Networks 163, 256-271, 2023 | 9 | 2023 |
Fast speech adversarial example generation for keyword spotting system with conditional GAN D Wang, L Dong, R Wang, D Yan Computer Communications 179, 145-156, 2021 | 5 | 2021 |
Improving transferability of universal adversarial perturbation with feature disruption D Wang, W Yao, T Jiang, X Chen IEEE Transactions on Image Processing, 2023 | 2 | 2023 |
Natural weather-style black-box adversarial attacks against optical aerial detectors G Tang, W Yao, T Jiang, W Zhou, Y Yang, D Wang IEEE Transactions on Geoscience and Remote Sensing, 2023 | 2 | 2023 |
A plug-and-play defensive perturbation for copyright protection of dnn-based applications D Wang, W Yao, T Jiang, W Zhou, L Lin, X Chen arXiv preprint arXiv:2304.10679, 2023 | 2 | 2023 |
Defending and Detecting Audio Adversarial Example using Frame Offsets. Y Gong, D Yan, T Mao, D Wang, R Wang KSII Transactions on Internet & Information Systems 15 (4), 2021 | 2 | 2021 |
AdvOps: Decoupling adversarial examples D Wang, W Yao, T Jiang, X Chen Pattern Recognition 149, 110252, 2024 | 1 | 2024 |
Efficient generation of speech adversarial examples with generative model D Wang, R Wang, L Dong, D Yan, Y Ren International Workshop on Digital Watermarking, 251-264, 2020 | 1 | 2020 |
Universal Perturbation-based Secret Key-Controlled Data Hiding D Wang, W Yao, T Jiang, X Chen arXiv preprint arXiv:2311.01696, 2023 | | 2023 |
Adversarial Examples in the Physical World: A Survey J Wang, D Wang, J Hu, S Wu, T Jiang, W Yao, A Liu, X Liu arXiv preprint arXiv:2311.01473, 2023 | | 2023 |
Naturalistic-Aware Adversarial Texture Black-Box Attack for 3d Objects Against Object Detection in the Physical World D Wang, W Yao, T Jiang, W Zhou, C Li, X Chen Available at SSRN 4545326, 0 | | |