LESSON: Multi-label adversarial false data injection attack for deep learning locational detection

J Tian, C Shen, B Wang, X Xia… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep learning methods can not only detect false data injection attacks (FDIA) but also locate
attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep …

Improving adversarial transferability through hybrid augmentation

P Zhu, Z Fan, S Guo, K Tang, X Li - Computers & Security, 2024 - Elsevier
Many works have shown that the adversarial examples being generated on a known
substitute model have the ability to mislead other unknown black-box models, which has …

Symattack: symmetry-aware imperceptible adversarial attacks on 3D point clouds

K Tang, Z Wang, W Peng, L Huang, L Wang… - Proceedings of the …, 2024 - dl.acm.org
Adversarial attacks on point clouds are crucial for assessing and improving the adversarial
robustness of 3D deep learning models. Despite leveraging various geometric constraints …

MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation

S Guo, X Li, P Zhu, B Wang, Z Mu, J Zhao - Information Sciences, 2024 - Elsevier
Many black-box adversarial attack algorithms perform attacks on machine learning models
based on the transferability of adversarial examples, and the input transformation-based …

A general black-box adversarial attack on graph-based fake news detectors

P Zhu, Z Pan, Y Liu, J Tian, K Tang, Z Wang - arXiv preprint arXiv …, 2024 - arxiv.org
Graph Neural Network (GNN)-based fake news detectors apply various methods to construct
graphs, aiming to learn distinctive news embeddings for classification. Since the …

Enhancing adversarial transferability with local transformation

Y Zhang, J Hong, Q Bai, H Liang, P Zhu… - Complex & Intelligent …, 2025 - Springer
Robust deep learning models have demonstrated significant applicability in real-world
scenarios. The utilization of adversarial attacks plays a crucial role in assessing the …

Hept attack: heuristic perpendicular trial for hard-label attacks under limited query budgets

Q Li, X Li, X Cui, K Tang, P Zhu - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Exploring adversarial attacks on deep neural networks (DNNs) is crucial for assessing and
enhancing their adversarial robustness. Among various attack types, hard-label attacks that …

Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds

K Tang, X He, W Peng, J Wu, Y Shi, D Liu… - Proceedings of the …, 2024 - ojs.aaai.org
Adversarial attacks on 3D point clouds often exhibit unsatisfactory imperceptibility, which
primarily stems from the disregard for manifold-aware distortion, ie, distortion of the …

Deep keypoints adversarial attack on face recognition systems

E BenSaid, M Neji, M Jabberi, AM Alimi - Neurocomputing, 2025 - Elsevier
Face recognition systems based on deep learning have recently demonstrated an
outstanding success in solving complex issues. Yet they turn out to be very vulnerable to …

A Blockchain-Based Fairness Guarantee Approach for Privacy-Preserving Collaborative Training in Computing Force Network

Z Sun, W Li, J Liang, L Yin, C Li, N Wei, J Zhang… - Mathematics, 2024 - mdpi.com
The advent of the big data era has brought unprecedented data demands. The integration of
computing resources with network resources in the computing force network enables the …