Latest papers

2 papers
defense IEEE Access Jan 1, 2026 · Jan 2026

Rectifying Adversarial Examples Using Their Vulnerabilities

Fumiya Morimoto, Ryuto Morita, Satoshi Ono · Kagoshima University

Defends against adversarial examples by re-attacking them across the decision boundary to recover correct original labels

Input Manipulation Attack vision
2 citations 1 influentialPDF
attack IEICE Transactions on Informat... Dec 31, 2025 · Dec 2025

Projection-based Adversarial Attack using Physics-in-the-Loop Optimization for Monocular Depth Estimation

Takeru Kusakabe, Yudai Hirose, Mashiho Mukaida et al. · Kagoshima University

Projects adversarial light patterns onto objects using physics-in-the-loop black-box optimization to fool monocular depth estimation DNNs

Input Manipulation Attack vision
PDF