Skip to main content

Showing 1–4 of 4 results for author: Tarchoun, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00173  [pdf, other

    cs.CV cs.CR

    Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

    Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Adversarial patches exemplify the tangible manifestation of the threat posed by adversarial attacks on Machine Learning (ML) models in real-world scenarios. Robustness against these attacks is of the utmost importance when designing computer vision applications, especially for safety-critical domains such as CCTV systems. In most practical situations, monitoring open spaces requires multi-view sys… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  2. arXiv:2311.12914  [pdf, other

    cs.CV cs.CR

    Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches

    Authors: Quazi Mishkatul Alam, Bilel Tarchoun, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: The latest generation of transformer-based vision models has proven to be superior to Convolutional Neural Network (CNN)-based models across several vision tasks, largely attributed to their remarkable prowess in relation modeling. Deformable vision transformers significantly reduce the quadratic complexity of attention modeling by using sparse attention structures, enabling them to incorporate fe… ▽ More

    Submitted 25 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 12 pages, 14 figures

    ACM Class: I.4

  3. arXiv:2304.10029  [pdf, other

    cs.CR cs.CV cs.LG

    Jedi: Entropy-based Localization and Removal of Adversarial Patches

    Authors: Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Real-world adversarial physical patches were shown to be successful in compromising state-of-the-art models in a variety of computer vision applications. Existing defenses that are based on either input gradient or features analysis have been compromised by recent GAN-based attacks that generate naturalistic patches. In this paper, we propose Jedi, a new defense against adversarial patches that is… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 9 pages, 11 figures. To appear in CVPR 2023

  4. arXiv:2110.04887  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

    Authors: Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub

    Abstract: While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adversarial attacks consist of additive noise to an input which can fool a detector. Recently, successful real-world printable adversarial patches were proven efficient against state-of-the-art neural networks. In… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

    Comments: To appear in the 20th CyberWorlds Conference