Skip to main content
Fig. 1 | Visual Computing for Industry, Biomedicine, and Art

Fig. 1

From: Local imperceptible adversarial attacks against human pose estimation networks

Fig. 1

Overview of the proposed method. We frame local imperceptible adversarial attacks on HPE into two alternative optimizations. One is for perturbation strength refinement; the other is for critical pixel selection. Strength refinement is used for finding what strength to add, while pixel selection is used for finding which pixels to modify. The process is repeated until the iteration reaches the predefined value

Back to article page