A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions

T Long, Q Gao, L Xu, Z Zhou - Computers & Security, 2022 - Elsevier
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …

Square attack: a query-efficient black-box adversarial attack via random search

M Andriushchenko, F Croce, N Flammarion… - European conference on …, 2020 - Springer
Abstract We propose the Square Attack, a score-based black-box l_2 l 2-and l_ ∞ l∞-
adversarial attack that does not rely on local gradient information and thus is not affected by …

Universal adversarial examples in remote sensing: Methodology and benchmark

Y Xu, P Ghamisi - IEEE Transactions on Geoscience and …, 2022 - ieeexplore.ieee.org
Deep neural networks have achieved great success in many important remote sensing
tasks. Nevertheless, their vulnerability to adversarial examples should not be neglected. In …

Query efficient black-box adversarial attack on deep neural networks

Y Bai, Y Wang, Y Zeng, Y Jiang, ST Xia - Pattern Recognition, 2023 - Elsevier
Deep neural networks (DNNs) have demonstrated excellent performance on various tasks,
yet they are under the risk of adversarial examples that can be easily generated when the …

Universal adversarial attack on attention and the resulting dataset damagenet

S Chen, Z He, C Sun, J Yang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Adversarial attacks on deep neural networks (DNNs) have been found for several years.
However, the existing adversarial attacks have high success rates only when the information …

Sparse-rs: a versatile framework for query-efficient sparse black-box adversarial attacks

F Croce, M Andriushchenko, ND Singh… - Proceedings of the …, 2022 - ojs.aaai.org
We propose a versatile framework based on random search, Sparse-RS, for score-based
sparse targeted and untargeted attacks in the black-box setting. Sparse-RS does not rely on …

The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models

T Chaalan, S Pang, J Kamruzzaman, I Gondal… - ACM Computing …, 2024 - dl.acm.org
Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the
training data of machine learning models, thereby manipulating their behavior. This process …

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning

S Jain, AM Crețu, YA de Montjoye - 31st USENIX Security Symposium …, 2022 - usenix.org
End-to-end encryption (E2EE) by messaging platforms enable people to securely and
privately communicate with one another. Its widespread adoption however raised concerns …

Meta-learning the search distribution of black-box random search based adversarial attacks

M Yatsura, J Metzen, M Hein - Advances in Neural …, 2021 - proceedings.neurips.cc
Adversarial attacks based on randomized search schemes have obtained state-of-the-art
results in black-box robustness evaluation recently. However, as we demonstrate in this …

Sparse adversarial attack via bi-objective optimization

P Williams, K Li, G Min - International Conference on Evolutionary Multi …, 2023 - Springer
Neural classifiers have achieved near human level performances when applied to several
real-world tasks. Despite their successes, recent works have demonstrated their vulnerability …