With the rapid development of the image generation technologies, the
mal...
This paper focuses on an important type of black-box attacks, i.e.,
tran...
Graph Neural Networks (GNNs) have shown remarkable success in graph
repr...
The current success of Graph Neural Networks (GNNs) usually relies on lo...
Heterogeneous graph learning has drawn significant attentions in recent
...
The transferability and robustness of adversarial examples are two pract...
Most of the adversarial attack methods suffer from large perceptual
dist...
Graph Neural Networks (GNNs) have achieved tremendous success in graph
r...
With the development of deep neural networks, digital fake paintings can...
Recently, Human Attribute Recognition (HAR) has become a hot topic due t...
Image forensics aims to detect the manipulation of digital images. Curre...
In this paper, we carry out a performance analysis from a probabilistic
...