Frequency-constrained transferable adversarial attack on image manipulation detection and localization
Crossref DOI link: https://doi.org/10.1007/s00371-024-03482-4
Published Online: 2024-06-05
Published Print: 2024-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zeng, Yijia
Pun, Chi-Man
Text and Data Mining valid from 2024-06-05
Version of Record valid from 2024-06-05
Article History
Accepted: 13 May 2024
First Online: 5 June 2024
Declarations
:
: The authors declare no conflict of interest.