The following publications are possibly variants of this publication:
- RIA: A Reversible Network-based Imperceptible Adversarial AttackFanxiao Li, RenYang Liu, Zhenli He, Song Gao, Yunyun Dong, Wei Zhou. ictai 2022: 996-1001 [doi]
- WiFi Interference-Based Adversarial Attacks on NTC Using CSI SensingJunye Li 0003, Deepak Mishra 0001, Dilip Krishnaswamy, Ayon Chakraborty, Joseph G. Davis, Aruna Seneviratne. icc 2022: 4354-4359 [doi]
- Imperceptible and Reliable Adversarial AttackJiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma, Naixue Xiong. fcs2 2022: 49-62 [doi]
- Attack Evaluations of Deep Learning Empowered WiFi Sensing in IoT SystemsJianchao Song, Cheng Qian, Yifan Guo, Kun Hua, Wei Yu 0002. infocom 2023: 1-6 [doi]
- Imperceptible adversarial attack with entropy feature and segmentation-based constraintRongdong Li, Qinliang Lin, Yinglong Fu, Weicheng Xie 0001, LinLin Shen. iccpr 2021: 12-17 [doi]
- Making Adversarial Attack Imperceptible in Frequency Domain: A Watermark-based FrameworkHanxiu Zhang, Guitao Cao, Xinyue Zhang, Jing Xiang, Chunwei Wu. icmcs 2023: 43-48 [doi]
- Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch InjectionWenye Liu, Chip-Hong Chang, Fan Zhang, Xiaoxuan Lou. dac 2020: 1-6 [doi]