The following publications are possibly variants of this publication:
- Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual SimilarityYajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang. IJCAI 2021: 3125-3133 [doi]
- Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter EffectAthena Sayles, Ashish Hooda, Mohit Gupta, Rahul Chatterjee 0001, Earlence Fernandes. cvpr 2021: 14666-14675 [doi]
- Generating transferable adversarial examples based on perceptually-aligned perturbationHongqiao Chen, Keda Lu, Xianmin Wang, Jin Li. mlc, 12(11):3295-3307, 2021. [doi]
- Adversarial transformation network with adaptive perturbations for generating adversarial examplesGuoyin Zhang, Qingan Da, Sizhao Li, Jianguo Sun, Wenshan Wang, Qing Hu, Jiashuai Lu. ijbic, 20(2):94-103, 2022. [doi]
- Weighted Adaptive Perturbations Adversarial Training for Improving RobustnessYan Wang, Dongmei Zhang, Haiyang Zhang. pricai 2022: 402-415 [doi]