Donghua Wang

Orcid: 0000-0003-4685-8232

Affiliations:
  • Zhejiang University, College of Computer Science and Technology, Hangzhou, China
  • Ningbo University, College of Information Science and Engineering, Ningbo, China


According to our database1, Donghua Wang authored at least 22 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Improving the Transferability of Adversarial Examples by Feature Augmentation.
IEEE Trans. Neural Networks Learn. Syst., September, 2025

Universal Multi-View Black-Box Attack Against Object Detectors via Layout Optimization.
IEEE Trans. Circuits Syst. Video Technol., July, 2025

Optimizing Latent Variables in Integrating Transfer and Query Based Attack Framework.
IEEE Trans. Pattern Anal. Mach. Intell., January, 2025

2024
Improving Transferability of Universal Adversarial Perturbation With Feature Disruption.
IEEE Trans. Image Process., 2024

AdvOps: Decoupling adversarial examples.
Pattern Recognit., 2024

An invisible, robust copyright protection method for DNN-generated content.
Neural Networks, 2024

Improving the Transferability of Adversarial Examples by Feature Augmentation.
CoRR, 2024

QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

2023
Natural Weather-Style Black-Box Adversarial Attacks Against Optical Aerial Detectors.
IEEE Trans. Geosci. Remote. Sens., 2023

Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors.
Neural Networks, 2023

Universal Perturbation-based Secret Key-Controlled Data Hiding.
CoRR, 2023

Adversarial Examples in the Physical World: A Survey.
CoRR, 2023

Impact of Light and Shadow on Robustness of Deep Neural Networks.
CoRR, 2023

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications.
CoRR, 2023

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
A Survey on Physical Adversarial Attack in Computer Vision.
CoRR, 2022

FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Defending and Detecting Audio Adversarial Example using Frame Offsets.
KSII Trans. Internet Inf. Syst., 2021

Fast speech adversarial example generation for keyword spotting system with conditional GAN.
Comput. Commun., 2021

2020
Targeted Speech Adversarial Example Generation With Generative Adversarial Network.
IEEE Access, 2020

Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey.
Proceedings of the Security and Privacy in Digital Economy, 2020

Efficient Generation of Speech Adversarial Examples with Generative Model.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020


  Loading...