Adversarial T-shirt! Evading Person Detectors in A Physical World

It is known that deep neural networks (DNNs) are vulnerable to adversarial attacks. The so-called physical adversarial examples deceive DNN-based decisionmakers by attaching adversarial patches to real objects... (read more)

PDF Abstract ECCV 2020 PDF ECCV 2020 Abstract

Tasks


Datasets


Results from the Paper


  Submit results from this paper to get state-of-the-art GitHub badges and help the community compare results to other papers.

Methods used in the Paper


METHOD TYPE
Average Pooling
Pooling Operations
Global Average Pooling
Pooling Operations
1x1 Convolution
Convolutions
Batch Normalization
Normalization
Max Pooling
Pooling Operations
Darknet-19
Convolutional Neural Networks
YOLOv2
Object Detection Models
RPN
Region Proposal
Softmax
Output Functions
Convolution
Convolutions
RoIPool
RoI Feature Extractors
Faster R-CNN
Object Detection Models