Physical adversarial attack meets computer vision: A decade survey

H Wei, H Tang, X Jia, Z Wang, H Yu, Z Li… - … on Pattern Analysis …, 2024 - ieeexplore.ieee.org
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision,
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …

Deep learning for text style transfer: A survey

D Jin, Z Jin, Z Hu, O Vechtomova… - Computational …, 2022 - direct.mit.edu
Text style transfer is an important task in natural language generation, which aims to control
certain attributes in the generated text, such as politeness, emotion, humor, and many …

Perceptual adversarial robustness: Defense against unseen threat models

C Laidlaw, S Singla, S Feizi - arXiv preprint arXiv:2006.12655, 2020 - arxiv.org
A key challenge in adversarial robustness is the lack of a precise mathematical
characterization of human perception, used in the very definition of adversarial attacks that …

A review of black-box adversarial attacks on image classification

Y Zhu, Y Zhao, Z Hu, T Luo, L He - Neurocomputing, 2024 - Elsevier
In recent years, deep learning-based image classification models have been extensively
studied in academia and widely applied in industry. However, deep learning is inherently …

Styleadv: Meta style adversarial training for cross-domain few-shot learning

Y Fu, Y Xie, Y Fu, YG Jiang - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
Abstract Cross-Domain Few-Shot Learning (CD-FSL) is a recently emerging task that tackles
few-shot learning across different domains. It aims at transferring prior knowledge learned …

Hotcold block: Fooling thermal infrared detectors with a novel wearable design

H Wei, Z Wang, X Jia, Y Zheng, H Tang… - Proceedings of the …, 2023 - ojs.aaai.org
Adversarial attacks on thermal infrared imaging expose the risk of related applications.
Estimating the security of these systems is essential for safely deploying them in the real …

Language model agnostic gray-box adversarial attack on image captioning

N Aafaq, N Akhtar, W Liu, M Shah… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Adversarial susceptibility of neural image captioning is still under-explored due to the
complex multi-model nature of the task. We introduce a GAN-based adversarial attack to …

Exploring effective data for surrogate training towards black-box attack

X Sun, G Cheng, H Li, L Pei… - Proceedings of the IEEE …, 2022 - openaccess.thecvf.com
Without access to the training data where a black-box victim model is deployed, training a
surrogate model for black-box adversarial attack is still a struggle. In terms of data, we …

StyLess: boosting the transferability of adversarial examples

K Liang, B Xiao - Proceedings of the IEEE/CVF Conference …, 2023 - openaccess.thecvf.com
Adversarial attacks can mislead deep neural networks (DNNs) by adding imperceptible
perturbations to benign examples. The attack transferability enables adversarial examples to …

Adversarial training with distribution normalization and margin balance

Z Cheng, F Zhu, XY Zhang, CL Liu - Pattern Recognition, 2023 - Elsevier
Adversarial training is the most effective method to improve adversarial robustness.
However, it does not explicitly regularize the feature space during training. Adversarial …