Visual adversarial attacks and defenses
Submission form for adding a new adversarial attack for tasks that use videos as input to the table in the webpage http://cis.eecs.qmul.ac.uk//VisualAdversarial/visualadversarial.html
Sign in to Google to save your progress. Learn more
Contact *
Please add your email address - we will contact you prior to inclusion on the table if we have enquiries or questions about your submission
Method name *
Attack type *
Required
Approach *
Datasets *
Required
Tasks *
Required
Reference *
Add the reference of the publication following the format of this example:                                                                               Adversarial examples for edge detection: they exist, and they transfer, Cosgrove, C., Yuille, A., Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2020.                                                                                                            Title, authors (Surname, Initial of the names), Conference/Journal, Year
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy