T-sea: Transfer-based self-ensemble attack on object detection

H Huang, Z Chen, H Chen, Y Wang… - Proceedings of the …, 2023 - openaccess.thecvf.com
Compared to query-based black-box attacks, transfer-based black-box attacks do not
require any information of the attacked models, which ensures their secrecy. However, most …

Parallel rectangle flip attack: A query-based black-box attack against object detection

S Liang, B Wu, Y Fan, X Wei, X Cao - arXiv preprint arXiv:2201.08970, 2022 - arxiv.org
Object detection has been widely used in many safety-critical tasks, such as autonomous
driving. However, its vulnerability to adversarial examples has not been sufficiently studied …

A large-scale multiple-objective method for black-box attack against object detection

S Liang, L Li, Y Fan, X Jia, J Li, B Wu, X Cao - European Conference on …, 2022 - Springer
Recent studies have shown that detectors based on deep models are vulnerable to
adversarial examples, even in the black-box scenario where the attacker cannot access the …

Generalizable black-box adversarial attack with meta learning

F Yin, Y Zhang, B Wu, Y Feng, J Zhang… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
In the scenario of black-box adversarial attack, the target model's parameters are unknown,
and the attacker aims to find a successful adversarial perturbation based on query feedback …

Towards transferable targeted attack

M Li, C Deng, T Li, J Yan, X Gao… - Proceedings of the …, 2020 - openaccess.thecvf.com
An intriguing property of adversarial examples is their transferability, which suggests that
black-box attacks are feasible in real-world applications. Previous works mostly study the …

Delving into data: Effectively substitute training for black-box attack

W Wang, B Yin, T Yao, L Zhang, Y Fu… - Proceedings of the …, 2021 - openaccess.thecvf.com
Deep models have shown their vulnerability when processing adversarial samples. As for
the black-box attack, without access to the architecture and weights of the attacked model …

Square attack: a query-efficient black-box adversarial attack via random search

M Andriushchenko, F Croce, N Flammarion… - European conference on …, 2020 - Springer
Abstract We propose the Square Attack, a score-based black-box l_2 l 2-and l_ ∞ l∞-
adversarial attack that does not rely on local gradient information and thus is not affected by …

Boosting black-box attack with partially transferred conditional adversarial distribution

Y Feng, B Wu, Y Fan, L Liu, Z Li… - Proceedings of the …, 2022 - openaccess.thecvf.com
This work studies black-box adversarial attacks against deep neural networks (DNNs),
where the attacker can only access the query feedback returned by the attacked DNN …

Towards efficient data free black-box adversarial attack

J Zhang, B Li, J Xu, S Wu, S Ding… - Proceedings of the …, 2022 - openaccess.thecvf.com
Classic black-box adversarial attacks can take advantage of transferable adversarial
examples generated by a similar substitute model to successfully fool the target model …

Simulating unknown target models for query-efficient black-box attacks

C Ma, L Chen, JH Yong - … of the IEEE/CVF Conference on …, 2021 - openaccess.thecvf.com
Many adversarial attacks have been proposed to investigate the security issues of deep
neural networks. In the black-box setting, current model stealing attacks train a substitute …