2020
DOI: 10.1007/978-3-030-58520-4_40
|View full text |Cite
|
Sign up to set email alerts
|

Open-Set Adversarial Defense

Abstract: Previous studies have shown the vulnerability of vision transformers to adversarial patches, but these studies all rely on a critical assumption: the attack patches must be perfectly aligned with the patches used for linear projection in vision transformers. Due to this stringent requirement, deploying adversarial patches for vision transformers in the physical world becomes impractical, unlike their effectiveness on CNNs. This paper proposes a novel method for generating an adversarial patch (G-Patch) that ov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
3

Relationship

4
6

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…There are also examples providing specialized defenses for computer vision tasks other than standard classification, e.g. tracking [440], open-set recognition [441], face recognition [442]. Goldblum et al [443] proposed a method to infer robust models for few-shot classification tasks based on adversarially robust meta-learners.…”
Section: E Miscellaneous Methodsmentioning
confidence: 99%
“…There are also examples providing specialized defenses for computer vision tasks other than standard classification, e.g. tracking [440], open-set recognition [441], face recognition [442]. Goldblum et al [443] proposed a method to infer robust models for few-shot classification tasks based on adversarially robust meta-learners.…”
Section: E Miscellaneous Methodsmentioning
confidence: 99%
“…Zhang et al [39] induce a sparsity constraint on features for open set classification. Further, Shao et al [36] defend against open set adversarial attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This stream has been repeatedly validated as effective, especially under strong adaptive attacks in the challenging white-box setting [4]. It has been widely used as a fundamental defense backbone [5,6,7].…”
Section: Introductionmentioning
confidence: 99%