Cited By
View all- Liu YAn JZhang WWu DGu JLin ZWang WCai JKankanhalli MPrabhakaran BBoll SSubramanian RZheng LSingh VCesar PXie LXu D(2024)Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based CustomizationProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681243(3587-3596)Online publication date: 28-Oct-2024
- Qu ZXi ZLu WLuo XWang QLi B(2024)DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network ScenariosIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337280319(3943-3957)Online publication date: 2024
- Al-Maliki SQayyum AAli HAbdallah MQadir JHoang DNiyato DAl-Fuqaha A(2024)Adversarial Machine Learning for Social Good: Reframing the Adversary as an AllyIEEE Transactions on Artificial Intelligence10.1109/TAI.2024.33834075:9(4322-4343)Online publication date: Sep-2024
- Show More Cited By