A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks

Y Li, B Xie, S Guo, Y Yang, B Xiao - ACM Computing Surveys, 2024 - dl.acm.org
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …

Adversarial attacks in computer vision: a survey

C Li, H Wang, W Yao, T Jiang - Journal of Membrane Computing, 2024 - Springer
Deep learning, as an important topic of artificial intelligence, has been widely applied in
various fields, especially in computer vision applications, such as image classification and …

Efficient polar coordinates attack with adaptive activation strategy

Y Ren, H Zhu, C Liu, C Li - Expert Systems with Applications, 2024 - Elsevier
In the realm of decision-based attacks, which aim to mislead target models by manipulating
output labels, the advent of the polar coordinates attack has marked a significant evolution …

MC-Net: Realistic Sample Generation for Black-Box Attacks

M Duan, K Jiao, S Yu, Z Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
One area of current research on adversarial attacks is how to generate plausible adversarial
examples when only a small number of datasets are available. Current adversarial attack …

Sustainable Self-evolution Adversarial Training

W Wang, C Wang, H Qi, M Ye, X Qian, P Wang… - Proceedings of the …, 2024 - dl.acm.org
With the wide application of deep neural network models in various computer vision tasks,
there has been a proliferation of adversarial example generation strategies aimed at deeply …

[HTML][HTML] FFA: Foreground Feature Approximation Digitally against Remote Sensing Object Detection

R Zhu, S Ma, L He, W Ge - Remote Sensing, 2024 - mdpi.com
In recent years, research on adversarial attack techniques for remote sensing object
detection (RSOD) has made great progress. Still, most of the research nowadays is on end …

DTA: distribution transform-based attack for query-limited scenario

R Liu, W Zhou, X Jin, S Gao, Y Wang, R Wang - Cybersecurity, 2024 - Springer
In generating adversarial examples, the conventional black-box attack methods rely on
sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is …

Spectral regularization for adversarially-robust representation learning

S Yang, JA Zavatone-Veth, C Pehlevan - arXiv preprint arXiv:2405.17181, 2024 - arxiv.org
The vulnerability of neural network classifiers to adversarial attacks is a major obstacle to
their deployment in safety-critical applications. Regularization of network parameters during …

Bullet-Screen-Emoji Attack with Temporal Difference Noise for Video Action Recognition

Y Zhang, H Zhang, J Li, Z Shi, J Yang… - … on Circuits and …, 2024 - ieeexplore.ieee.org
Recent studies have shown that video action recognition models are also vulnerable to
fooling by adversarial samples. However, currently existing video attack methods usually …

Theoretical Corrections and the Leveraging of Reinforcement Learning to Enhance Triangle Attack

N Meng, C Manicke, D Chen, Y Lao, C Ding… - arXiv preprint arXiv …, 2024 - arxiv.org
Adversarial examples represent a serious issue for the application of machine learning
models in many sensitive domains. For generating adversarial examples, decision based …