Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

Backdoor attacks and countermeasures on deep learning: A comprehensive review

Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu… - arXiv preprint arXiv …, 2020 - arxiv.org
This work provides the community with a timely comprehensive review of backdoor attacks
and countermeasures on deep learning. According to the attacker's capability and affected …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

A zeroth-order block coordinate descent algorithm for huge-scale black-box optimization

HQ Cai, Y Lou, D McKenzie… - … Conference on Machine …, 2021 - proceedings.mlr.press
We consider the zeroth-order optimization problem in the huge-scale setting, where the
dimension of the problem is so large that performing even basic vector operations on the …

Crafting adversarial perturbations via transformed image component swapping

A Agarwal, N Ratha, M Vatsa… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Adversarial attacks have been demonstrated to fool the deep classification networks. There
are two key characteristics of these attacks: firstly, these perturbations are mostly additive …

Query-efficient decision-based attack via sampling distribution reshaping

X Sun, G Cheng, L Pei, J Han - Pattern Recognition, 2022 - Elsevier
With a limited query budget and only the final decision of a target model, how to find
adversarial examples with low-magnitude distortion has attracted great attention among …

Improving transferability of universal adversarial perturbation with feature disruption

D Wang, W Yao, T Jiang, X Chen - IEEE Transactions on Image …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) are shown to be vulnerable to universal adversarial
perturbations (UAP), a single quasi-imperceptible perturbation that deceives the DNNs on …

Robust and secure quality monitoring for welding through platform-as-a-service: A resistance and submerged arc welding study

P Stavropoulos, A Papacharalampopoulos… - Machines, 2023 - mdpi.com
For smart manufacturing systems, quality monitoring of welding has already started to shift
from empirical modeling to knowledge integration directly from the captured data by utilizing …

Exploring robustness connection between artificial and natural adversarial examples

A Agarwal, N Ratha, M Vatsa… - Proceedings of the IEEE …, 2022 - openaccess.thecvf.com
Although recent deep neural network algorithm has shown tremendous success in several
computer vision tasks, their vulnerability against minute adversarial perturbations has raised …

Generative high-capacity image hiding based on residual CNN in wavelet domain

X Zhu, Z Lai, Y Liang, J Xiong, J Wu - Applied Soft Computing, 2022 - Elsevier
Image hiding is the process of hiding a secret image in another meaningful image or other
carriers so that the secret image remains imperceptible and can be recovered securely at …