Search Results for author: Donghua Wang

Found 8 papers, 3 papers with code

Universal Perturbation-based Secret Key-Controlled Data Hiding

no code implementations3 Nov 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen

In this paper, we propose a novel universal perturbation-based secret key-controlled data-hiding method, realizing data hiding with a single universal perturbation and data decoding with the secret key-controlled decoder.

Adversarial Examples in the Physical World: A Survey

1 code implementation1 Nov 2023 Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu

However, current research on physical adversarial examples (PAEs) lacks a comprehensive understanding of their unique characteristics, leading to limited significance and understanding.

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

1 code implementation ICCV 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

In this paper, we propose a novel Reflected Light Attack (RFLA), featuring effective and stealthy in both the digital and physical world, which is implemented by placing the color transparent plastic sheet and a paper cut of a specific shape in front of the mirror to create different colored geometries on the target object.

Adversarial Attack Object

Impact of Light and Shadow on Robustness of Deep Neural Networks

no code implementations23 May 2023 Chengyin Hu, Weiwen Shi, Chao Li, Jialiang Sun, Donghua Wang, Junqi Wu, Guijian Tang

Deep neural networks (DNNs) have made remarkable strides in various computer vision tasks, including image classification, segmentation, and object detection.

Image Classification object-detection +1

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

no code implementations20 Apr 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen

Then, we extract the copyright information from the encoded copyrighted image with the devised copyright decoder.

Style Transfer

Differential Evolution based Dual Adversarial Camouflage: Fooling Human Eyes and Object Detectors

no code implementations17 Oct 2022 Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen

In the first stage, we optimize the global texture to minimize the discrepancy between the rendered object and the scene images, making human eyes difficult to distinguish.

Object

A Survey on Physical Adversarial Attack in Computer Vision

no code implementations28 Sep 2022 Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen

Then, we discuss the existing physical attacks and focus on the technique for improving the robustness of physical attacks under complex physical environmental conditions.

Adversarial Attack object-detection +2

FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack

1 code implementation15 Sep 2021 Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen

To bridge the gap between digital attacks and physical attacks, we exploit the full 3D vehicle surface to propose a robust Full-coverage Camouflage Attack (FCA) to fool detectors.

Adversarial Attack object-detection +1

Cannot find the paper you are looking for? You can Submit a new open access paper.