Invisible adaptive attacks

JB Nielsen, M Strefler - Cryptology ePrint Archive, 2014 - eprint.iacr.org
… an invisible adaptive attack (IAA) against cryptographic protocols. Or rather, it is a class of
attacks, where the protocol itself is the attack… The problem is that to notice the above attack in a …

Invisible adversarial attack against deep neural networks: An adaptive penalization approach

Z Wang, M Song, S Zheng, Z Zhang… - … on Dependable and …, 2019 - ieeexplore.ieee.org
adaptive penalty policies based on image characteristics. We first propose a coarsegrained
adaptive attack by … fine-grained adaptive attack, called JND-based adversarial attack, which …

Indirect invisible poisoning attacks on domain adaptation

J Wu, J He - Proceedings of the 27th ACM SIGKDD Conference on …, 2021 - dl.acm.org
… by a family of instantiated poisoning attack algorithms. • Extensive … invisible poisoning
attack framework I2Attack in Section 4, followed by a family of instantiated poisoning attacks

Improving the invisibility of adversarial examples with perceptually adaptive perturbation

Y Zhang, Y Tan, H Sun, Y Zhao, Q Zhang, Y Li - Information Sciences, 2023 - Elsevier
… Perceptual Sensitive Attack (PS Attack) to address this flaw with a perceptually adaptive
scheme… We propose a novel adversarial attack based on a perceptually adaptive scheme called …

Invisible backdoor attack with sample-specific triggers

Y Li, Y Li, B Wu, L Li, R He… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
… In this part, we explore whether the one trained on another dataset can still be adapted
for generating poisoned samples of a new dataset (without any fine-tuning) in our …

Poison ink: Robust and invisible backdoor attack

J Zhang, C Dongdong, Q Huang, J Liao… - … on Image Processing, 2022 - ieeexplore.ieee.org
Adaptive robustness evaluation has become the standard in … of Poison Ink against some
adaptive defense techniques, taking … We first test the robustness of Poison Ink to adaptive pre-…

[PDF][PDF] INVISIBLE ATTACKS

F Al-Askandrani, E Amos, J Beckman, N Boreddy… - cerias.purdue.edu
attacks that exploit vulnerabilities in the information technology enabled systems. This report
analyzes documented cyber attacks on … exploitation can easily be adapted to the intermodal …

Backdoor embedding in convolutional neural network models via invisible perturbation

H Zhong, C Liao, AC Squicciarini, S Zhu… - Proceedings of the Tenth …, 2020 - dl.acm.org
attack, which we refer to as a backdoor injection attack. The … Accordingly, we hypothesize
that if we can find an adaptive … of the target class, an attack will have high chances of success, …

Invisible backdoor attack with attention and steganography

W Chen, X Xu, X Wang, H Zhou, Z Li, Y Chen - Computer Vision and Image …, 2024 - Elsevier
… a novel stealthy backdoor attack, where the … attack modes named ASBA and ATBA, where
ASBA utilizes the steganographic network for attack, while ATBA is a backdoor attack without …

Rethinking the invisible protection against unauthorized image usage in stable diffusion

S An, L Yan, S Cheng, G Shen, K Zhang, Q Xu… - 33rd USENIX Security …, 2024 - usenix.org
attacks are in Section 2.2. We want to emphasize that our goal is not to facilitate attacks, but
… We also examine the adaptive protection under the single image manipulation setting using …