Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions

T Long, Q Gao, L Xu, Z Zhou - Computers & Security, 2022 - Elsevier
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Automatic prompt augmentation and selection with chain-of-thought from labeled data

KS Shum, S Diao, T Zhang - arXiv preprint arXiv:2302.12822, 2023 - arxiv.org
Chain-of-thought prompting (CoT) advances the reasoning abilities of large language
models (LLMs) and achieves superior performance in arithmetic, commonsense, and …

Towards efficient data free black-box adversarial attack

J Zhang, B Li, J Xu, S Wu, S Ding… - Proceedings of the …, 2022 - openaccess.thecvf.com
Classic black-box adversarial attacks can take advantage of transferable adversarial
examples generated by a similar substitute model to successfully fool the target model …

Improving the transferability of adversarial samples with adversarial transformations

W Wu, Y Su, MR Lyu, I King - Proceedings of the IEEE/CVF …, 2021 - openaccess.thecvf.com
Although deep neural networks (DNNs) have achieved tremendous performance in diverse
vision challenges, they are surprisingly susceptible to adversarial examples, which are born …

Black-box prompt learning for pre-trained language models

S Diao, Z Huang, R Xu, X Li, Y Lin, X Zhou… - arXiv preprint arXiv …, 2022 - arxiv.org
The increasing scale of general-purpose Pre-trained Language Models (PLMs) necessitates
the study of more efficient adaptation across different downstream tasks. In this paper, we …

Query efficient black-box adversarial attack on deep neural networks

Y Bai, Y Wang, Y Zeng, Y Jiang, ST Xia - Pattern Recognition, 2023 - Elsevier
Deep neural networks (DNNs) have demonstrated excellent performance on various tasks,
yet they are under the risk of adversarial examples that can be easily generated when the …

Backpropagating linearly improves transferability of adversarial examples

Y Guo, Q Li, H Chen - Advances in neural information …, 2020 - proceedings.neurips.cc
The vulnerability of deep neural networks (DNNs) to adversarial examples has drawn great
attention from the community. In this paper, we study the transferability of such examples …

Boosting adversarial transferability by achieving flat local maxima

Z Ge, H Liu, W Xiaosen, F Shang… - Advances in Neural …, 2023 - proceedings.neurips.cc
Transfer-based attack adopts the adversarial examples generated on the surrogate model to
attack various models, making it applicable in the physical world and attracting increasing …