Abstract: Most existing adversarial attack methods for remote sensing images merely add adversarial perturbations or patches, resulting in visually unnatural modifications. Clouds are common ...
Abstract: With the rapid development of the Internet, face recognition technology is widely used, which makes the protection of face database especially important. To protect the recognized faces, a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results