Skip to main navigation
Skip to search
Skip to main content
PolyU Scholars Hub Home
Help & FAQ
Home
Researchers
Units
Research output
Prizes
Activities
Press/Media
Student theses
Search by expertise, name or affiliation
Dual Attention Adversarial Attacks With Limited Perturbations
Mingxing Duan
, Yunchuan Qin
, Jiayan Deng
, Kenli Li
,
Bin Xiao
Department of Computing
The Hong Kong Polytechnic University
Research output
:
Journal article publication
›
Journal article
›
Academic research
›
peer-review
11
Citations (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Dual Attention Adversarial Attacks With Limited Perturbations'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Adversarial Attack
100%
Adversarial Examples
100%
Dual Attention
100%
Perturbance
50%
Adversarial Network
50%
Encoder
16%
Difficult Problem
16%
Face Recognition System
16%
Decoder
16%
Forgoing
16%
Effective Area
16%
Algorithm Comparison
16%
Network Attention
16%
Defensiveness
16%
True or False
16%
Spatial Attention Network
16%
Generated Samples
16%
Channel Weighting
16%
Attack Performance
16%
Attack Target
16%
Gradient Optimization Algorithm
16%
Global Perturbation
16%
Channel Attention Network
16%
Engineering
Input Image
100%
Effective Area
100%
Spatial Attention
100%
Discriminator
100%
Generated Sample
100%
Computer Science
Adversarial Machine Learning
100%
Adversarial Example
100%
Attention (Machine Learning)
33%
Recognition System
16%
Face Recognition
16%
Discriminator
16%
Effective Area
16%
Optimization Algorithm
16%