Average gradient-based adversarial attack

C Wan, F Huang, X Zhao - IEEE Transactions on Multimedia, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) are vulnerable to adversarial attacks which can fool the
classifiers by adding small perturbations to the original example. The added perturbations in …

Adaptive image transformations for transfer-based adversarial attack

Z Yuan, J Zhang, S Shan - European Conference on Computer Vision, 2022 - Springer
Adversarial attacks provide a good way to study the robustness of deep learning models.
One category of methods in transfer-based black-box attack utilizes several image …

Adversarial obstacle generation against lidar-based 3d object detection

J Wang, F Li, X Zhang, H Sun - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
LiDAR sensors are widely used in many safety-critical applications such as autonomous
driving and drone control, and the collected data called point clouds are subsequently …

Boosting adversarial transferability with learnable patch-wise masks

X Wei, S Zhao - IEEE Transactions on Multimedia, 2023 - ieeexplore.ieee.org
Adversarial examples have attracted widespread attention in security-critical applications
because of their transferability across different models. Although many methods have been …

Learning to Transform Dynamically for Better Adversarial Transferability

R Zhu, Z Zhang, S Liang, Z Liu… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Adversarial examples crafted by adding perturbations imperceptible to humans can deceive
neural networks. Recent studies identify the adversarial transferability across various …

Exploring transferability of multimodal adversarial samples for vision-language pre-training models with contrastive learning

Y Wang, W Hu, Y Dong, H Zhang, H Su… - arXiv preprint arXiv …, 2023 - arxiv.org
The integration of visual and textual data in Vision-Language Pre-training (VLP) models is
crucial for enhancing vision-language understanding. However, the adversarial robustness …

Local patch autoaugment with multi-agent collaboration

S Lin, T Yu, R Feng, X Li, X Yu, L Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data augmentation (DA) plays a critical role in improving the generalization of deep learning
models. Recent works on automatically searching for DA policies from data have achieved …

Sok: Pitfalls in evaluating black-box attacks

F Suya, A Suri, T Zhang, J Hong… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Numerous works study black-box attacks on image classifiers, where adversaries generate
adversarial examples against unknown target models without having access to their internal …

Enhancing targeted attack transferability via diversified weight pruning

HJ Wang, YY Wu, ST Chen - Proceedings of the IEEE/CVF …, 2024 - openaccess.thecvf.com
Malicious attackers generate adversarial instances by introducing imperceptible
perturbations into data. Even in the black-box setting where model details are concealed …

Boosting Adversarial Training with Hardness-Guided Attack Strategy

S He, J Wei, C Zhang, X Xu, J Song… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The susceptibility of deep neural networks (DNNs) to adversarial examples has raised
significant concerns regarding the security and reliability of artificial intelligence systems …