2022 IEEE International Conference on Big Data (Big Data) 2022
DOI: 10.1109/bigdata55660.2022.10021100
|View full text |Cite
|
Sign up to set email alerts
|

Robust Text CAPTCHAs Using Adversarial Examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…Recently, ViT [14] receives notable attention for its outstanding performance on various tasks. Meanwhile, some works [38,49] have demonstrated that ViT models exhibit lower adversarial transferability than CNNs when used as surrogates, and a recent work [43] argues that this is because the current attacks are not strong enough to fully exploit the transferability potential of ViT. Complementarily, we provide a different viewpoint that the transferability of ViT may have been restrained by its own training paradigm.…”
Section: Analyses and Discussionmentioning
confidence: 81%
“…Recently, ViT [14] receives notable attention for its outstanding performance on various tasks. Meanwhile, some works [38,49] have demonstrated that ViT models exhibit lower adversarial transferability than CNNs when used as surrogates, and a recent work [43] argues that this is because the current attacks are not strong enough to fully exploit the transferability potential of ViT. Complementarily, we provide a different viewpoint that the transferability of ViT may have been restrained by its own training paradigm.…”
Section: Analyses and Discussionmentioning
confidence: 81%
“…e adversarial example is the weakness of the ML classifier, and it can be used as a tool to defend against the inference attack launched by the ML classifiers. Many works including [7][8][9][10][11][12][13] have been proposed to defend against inference attack using the idea of the adversarial example. Liu et al [7] proposed the stealth algorithm of elaborating adversarial examples to resist the automatic detection system based on the Faster RCNN framework.…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al [11] proposed the schemes to protect the privacy of the Internet user, which used the idea of adversarial example. Shao et al [12] proposed the robust text CAPTCHAs scheme based on the adversarial example. Li and Lin [13] proposed to use adversarial perturbation for face deidentification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although Vision Transformer (ViT) seems promising for the vision tasks in terms of accuracy, it suffers from a few underlying problems like, a) Robustness against adversarial attacks Shao et al (2022); Mahmood et al (2021), and b) Extraction of local features ; Yuan et al (2021).…”
Section: Introductionmentioning
confidence: 99%