A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks

Y Li, B Xie, S Guo, Y Yang, B Xiao - ACM Computing Surveys, 2024 - dl.acm.org
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …

Improving the transferability of adversarial samples by path-augmented method

J Zhang, J Huang, W Wang, Y Li… - Proceedings of the …, 2023 - openaccess.thecvf.com
Deep neural networks have achieved unprecedented success on diverse vision tasks.
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …

Transferable adversarial attacks on vision transformers with token gradient regularization

J Zhang, Y Huang, W Wu… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Vision transformers (ViTs) have been successfully deployed in a variety of computer vision
tasks, but they are still vulnerable to adversarial samples. Transfer-based attacks use a local …

Sibling-attack: Rethinking transferable adversarial attacks against face recognition

Z Li, B Yin, T Yao, J Guo, S Ding… - Proceedings of the …, 2023 - openaccess.thecvf.com
A hard challenge in developing practical face recognition (FR) attacks is due to the black-
box nature of the target FR model, ie, inaccessible gradient and parameter information to …

An adaptive model ensemble adversarial attack for boosting adversarial transferability

B Chen, J Yin, S Chen, B Chen… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
While the transferability property of adversarial examples allows the adversary to perform
black-box attacks ie, the attacker has no knowledge about the target model), the transfer …

A survey on transferability of adversarial examples across deep neural networks

J Gu, X Jia, P de Jorge, W Yu, X Liu, A Ma… - arXiv preprint arXiv …, 2023 - arxiv.org
The emergence of Deep Neural Networks (DNNs) has revolutionized various domains,
enabling the resolution of complex tasks spanning image recognition, natural language …

Harnessing perceptual adversarial patches for crowd counting

S Liu, J Wang, A Liu, Y Li, Y Gao, X Liu… - Proceedings of the 2022 …, 2022 - dl.acm.org
Crowd counting, which has been widely adopted for estimating the number of people in
safety-critical scenes, is shown to be vulnerable to adversarial examples in the physical …

Revisiting the transferability of adversarial examples via source-agnostic adversarial feature inducing method

Y Xiao, J Zhou, K Chen, Z Liu - Pattern Recognition, 2023 - Elsevier
Though deep neural networks (DNNs) have revealed their extraordinary performance in the
fields of computer vision, it is evident that the vulnerability of DNNs to adversarial attacks …

Mttm: Metamorphic testing for textual content moderation software

W Wang, J Huang, W Wu, J Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
The exponential growth of social media platforms such as Twitter and Facebook has
revolutionized textual communication and textual content publication in human society …

Detecting adversarial data by probing multiple perturbations using expected perturbation score

S Zhang, F Liu, J Yang, Y Yang, C Li… - … on machine learning, 2023 - proceedings.mlr.press
Adversarial detection aims to determine whether a given sample is an adversarial one
based on the discrepancy between natural and adversarial distributions. Unfortunately …