iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1609/AAAI.V38I4.28147
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:27:00Z","timestamp":1725773220917},"reference-count":0,"publisher":"Association for the Advancement of Artificial Intelligence (AAAI)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAAI"],"abstract":"Adversarial attacks involve adding perturbations to the source image to cause misclassification by the target model, which demonstrates the potential of attacking face recognition models. Existing adversarial face image generation methods still can\u2019t achieve satisfactory performance because of low transferability and high detectability. In this paper, we propose a unified framework Adv-Diffusion that can generate imperceptible adversarial identity perturbations in the latent space but not the raw pixel space, which utilizes strong inpainting capabilities of the latent diffusion model to generate realistic adversarial images. Specifically, we propose the identity-sensitive conditioned diffusion generative model to generate semantic perturbations in the surroundings. The designed adaptive strength-based adversarial perturbation algorithm can ensure both attack transferability and stealthiness. Extensive qualitative and quantitative experiments on the public FFHQ and CelebA-HQ datasets prove the proposed method achieves superior performance compared with the state-of-the-art methods without an extra generative model training process. The source code is available at https:\/\/github.com\/kopper-xdu\/Adv-Diffusion.<\/jats:p>","DOI":"10.1609\/aaai.v38i4.28147","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T09:27:43Z","timestamp":1711358863000},"page":"3585-3593","source":"Crossref","is-referenced-by-count":1,"title":["Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"],"prefix":"10.1609","volume":"38","author":[{"given":"Decheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xijun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunlei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Nannan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ruimin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[]}],"member":"9382","published-online":{"date-parts":[[2024,3,24]]},"container-title":["Proceedings of the AAAI Conference on Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/download\/28147\/28296","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/download\/28147\/28297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/download\/28147\/28296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T09:27:43Z","timestamp":1711358863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/28147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,24]]},"references-count":0,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,3,25]]}},"URL":"https:\/\/doi.org\/10.1609\/aaai.v38i4.28147","relation":{},"ISSN":["2374-3468","2159-5399"],"issn-type":[{"value":"2374-3468","type":"electronic"},{"value":"2159-5399","type":"print"}],"subject":[],"published":{"date-parts":[[2024,3,24]]}}}