@inproceedings{bb144400,
        AUTHOR = "Wang, D. and Lin, J. and Wang, Y.G.",
        TITLE = "Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "546-550",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140388"}

@inproceedings{bb144401,
        AUTHOR = "Aneja, S. and Markhasin, L. and Nießner, M.",
        TITLE = "TAFIM: Targeted Adversarial Attacks Against Facial Image Manipulations",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "XIV:58-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140389"}

@inproceedings{bb144402,
        AUTHOR = "Long, Y.Y. and Zhang, Q.L. and Zeng, B. and Gao, L.L. and Liu, X.L. and Zhang, J. and Song, J.K.",
        TITLE = "Frequency Domain Model Augmentation for Adversarial Attack",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "IV:549-566",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140390"}

@inproceedings{bb144403,
        AUTHOR = "Yuan, Z. and Zhang, J. and Shan, S.G.",
        TITLE = "Adaptive Image Transformations for Transfer-Based Adversarial Attack",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:1-17",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140391"}

@inproceedings{bb144404,
        AUTHOR = "Cao, Y.L. and Xiao, C.W. and Anandkumar, A. and Xu, D. and Pavone, M.",
        TITLE = "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:36-52",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140392"}

@inproceedings{bb144405,
        AUTHOR = "Bai, J.W. and Gao, K.F. and Gong, D.H. and Xia, S.T. and Li, Z.F. and Liu, W.",
        TITLE = "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:104-121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140393"}

@inproceedings{bb144406,
        AUTHOR = "Liu, G. and Huang, X.W. and Yi, X.P.",
        TITLE = "Adversarial Label Poisoning Attack on Graph Neural Networks via Label
Propagation",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:227-243",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140394"}

@inproceedings{bb144407,
        AUTHOR = "Byun, J. and Shim, K. and Go, H. and Kim, C.",
        TITLE = "Hidden Conditional Adversarial Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "1306-1310",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140395"}

@inproceedings{bb144408,
        AUTHOR = "Son, M.J. and Kwon, M.J. and Kim, H.S. and Byun, J. and Cho, S. and Kim, C.",
        TITLE = "Adaptive Warping Network for Transferable Adversarial Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3056-3060",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140396"}

@inproceedings{bb144409,
        AUTHOR = "Cao, X.Y. and Gong, N.Z.Q.",
        TITLE = "MPAF: Model Poisoning Attacks to Federated Learning based on Fake
Clients",
        BOOKTITLE = FedVision22,
        YEAR = "2022",
        PAGES = "3395-3403",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140397"}

@inproceedings{bb144410,
        AUTHOR = "Xu, Q.L. and Tao, G.H. and Zhang, X.Y.",
        TITLE = "Bounded Adversarial Attack on Deep Content Features",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15182-15191",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140398"}

@inproceedings{bb144411,
        AUTHOR = "Luo, C. and Lin, Q.L. and Xie, W.C. and Wu, B.Z. and Xie, J.H. and Shen, L.L.",
        TITLE = "Frequency-driven Imperceptible Adversarial Attack on Semantic
Similarity",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15294-15303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140399"}

@inproceedings{bb144412,
        AUTHOR = "Suryanto, N. and Kim, Y. and Kang, H. and Larasati, H.T. and Yun, Y.Y. and Le, T.T.H. and Yang, H. and Oh, S.Y. and Kim, H.",
        TITLE = "DTA: Physical Camouflage Attacks using Differentiable Transformation
Network",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15284-15293",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140400"}

@inproceedings{bb144413,
        AUTHOR = "Zhong, Y.Q. and Liu, X.M. and Zhai, D. and Jiang, J.J. and Ji, X.Y.",
        TITLE = "Shadows can be Dangerous: Stealthy and Effective Physical-world
Adversarial Attack by Natural Phenomenon",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15324-15333",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140401"}

@inproceedings{bb144414,
        AUTHOR = "Tong, A.C.H.",
        TITLE = "Symmetric adversarial poisoning against deep learning",
        BOOKTITLE = IPTA20,
        YEAR = "2020",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140402"}

@inproceedings{bb144415,
        AUTHOR = "Li, Y.M. and Wen, C.C. and Juefei Xu, F. and Feng, C.",
        TITLE = "Fooling LiDAR Perception via Adversarial Trajectory Perturbation",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7878-7887",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140403"}

@inproceedings{bb144416,
        AUTHOR = "Wang, X.S. and He, X.R. and Wang, J.D. and He, K.",
        TITLE = "Admix: Enhancing the Transferability of Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16138-16147",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140404"}

@inproceedings{bb144417,
        AUTHOR = "Chen, S. and Kahla, M. and Jia, R. and Qi, G.J.",
        TITLE = "Knowledge-Enriched Distributional Model Inversion Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16158-16167",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140405"}

@inproceedings{bb144418,
        AUTHOR = "Zhou, M. and Wang, L. and Niu, Z.X. and Zhang, Q.L. and Xu, Y.H. and Zheng, N.N. and Hua, G.",
        TITLE = "Practical Relative Order Attack in Deep Ranking",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16393-16402",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140406"}

@inproceedings{bb144419,
        AUTHOR = "Shafran, A. and Peleg, S. and Hoshen, Y.",
        TITLE = "Membership Inference Attacks are Easier on Difficult Problems",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "14800-14809",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140407"}

@inproceedings{bb144420,
        AUTHOR = "Naseer, M. and Khan, S. and Hayat, M. and Khan, F.S. and Porikli, F.M.",
        TITLE = "On Generating Transferable Targeted Perturbations",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7688-7697",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140408"}

@inproceedings{bb144421,
        AUTHOR = "Chen, H. and Fu, C. and Zhao, J. and Koushanfar, F.",
        TITLE = "ProFlip: Targeted Trojan Attack with Progressive Bit Flips",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7698-7707",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140409"}

@inproceedings{bb144422,
        AUTHOR = "Rony, J. and Granger, E. and Pedersoli, M. and Ayed, I.B.",
        TITLE = "Augmented Lagrangian Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7718-7727",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140410"}

@inproceedings{bb144423,
        AUTHOR = "Yuan, Z. and Zhang, J. and Jia, Y. and Tan, C. and Xue, T. and Shan, S.G.",
        TITLE = "Meta Gradient Adversarial Attack",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7728-7737",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140411"}

@inproceedings{bb144424,
        AUTHOR = "Park, G.Y. and Lee, S.W.",
        TITLE = "Reliably fast adversarial training via latent adversarial
perturbation",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7738-7747",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140412"}

@inproceedings{bb144425,
        AUTHOR = "Tu, J. and Wang, T. and Wang, J.K. and Manivasagam, S. and Ren, M. and Urtasun, R.",
        TITLE = "Adversarial Attacks On Multi-Agent Communication",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7748-7757",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140413"}

@inproceedings{bb144426,
        AUTHOR = "Feng, W.W. and Wu, B.Y. and Zhang, T.Z. and Zhang, Y. and Zhang, Y.D.",
        TITLE = "Meta-Attack: Class-agnostic and Model-agnostic Physical Adversarial
Attack",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7767-7776",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140414"}

@inproceedings{bb144427,
        AUTHOR = "Kim, J.Y. and Hua, B.S. and Nguyen, D.T. and Yeung, S.K.",
        TITLE = "Minimal Adversarial Examples for Deep Learning on 3D Point Clouds",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7777-7786",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140415"}

@inproceedings{bb144428,
        AUTHOR = "Stutz, D. and Hein, M. and Schiele, B.",
        TITLE = "Relating Adversarially Robust Generalization to Flat Minima",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7787-7797",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140416"}

@inproceedings{bb144429,
        AUTHOR = "Li, C. and Gao, S.Q. and Deng, C. and Liu, W. and Huang, H.",
        TITLE = "Adversarial Attack on Deep Cross-Modal Hamming Retrieval",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "2198-2207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140417"}

@inproceedings{bb144430,
        AUTHOR = "Duan, R.J. and Chen, Y.F. and Niu, D. and Yang, Y. and Qin, A.K. and He, Y.",
        TITLE = "AdvDrop: Adversarial Attack to DNNs by Dropping Information",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7486-7495",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140418"}

@inproceedings{bb144431,
        AUTHOR = "Hwang, J. and Kim, J.H. and Choi, J.H. and Lee, J.S.",
        TITLE = "Just One Moment: Structural Vulnerability of Deep Action Recognition
against One Frame Attack",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7648-7656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140419"}

@inproceedings{bb144432,
        AUTHOR = "Moayeri, M. and Feizi, S.",
        TITLE = "Sample Efficient Detection and Classification of Adversarial Attacks
via Self-Supervised Embeddings",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7657-7666",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140420"}

@inproceedings{bb144433,
        AUTHOR = "Wang, Z.B. and Guo, H.C. and Zhang, Z.F. and Liu, W.X. and Qin, Z. and Ren, K.",
        TITLE = "Feature Importance-aware Transferable Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7619-7628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140421"}

@inproceedings{bb144434,
        AUTHOR = "Wang, X. and Lin, S.Y. and Zhang, H. and Zhu, Y.F. and Zhang, Q.S.",
        TITLE = "Interpreting Attributions and Interactions of Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "1075-1084",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140422"}

@inproceedings{bb144435,
        AUTHOR = "Kumar, C. and Kumar, D. and Shao, M.",
        TITLE = "Generative Adversarial Attack on Ensemble Clustering",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "3839-3848",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140423"}

@inproceedings{bb144436,
        AUTHOR = "Du, A. and Chen, B. and Chin, T.J. and Law, Y.W. and Sasdelli, M. and Rajasegaran, R. and Campbell, D.",
        TITLE = "Physical Adversarial Attacks on an Aerial Imagery Object Detector",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "3798-3808",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140424"}

@inproceedings{bb144437,
        AUTHOR = "Zhao, B.Y. and Lao, Y.J.",
        TITLE = "Towards Class-Oriented Poisoning Attacks Against Neural Networks",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "2244-2253",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140425"}

@inproceedings{bb144438,
        AUTHOR = "Chen, Z.H. and Wang, C.H. and Crandall, D.",
        TITLE = "Semantically Stealthy Adversarial Attacks against Segmentation Models",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "2846-2855",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140426"}

@inproceedings{bb144439,
        AUTHOR = "Yin, M.J. and Li, S. and Song, C.Y. and Asif, M.S. and Roy Chowdhury, A.K. and Krishnamurthy, S.V.",
        TITLE = "ADC: Adversarial attacks against object Detection that evade Context
consistency checks",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "2836-2845",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140427"}

@inproceedings{bb144440,
        AUTHOR = "Li, X.R. and Cui, W.Y. and Huang, J.W. and Wang, W.Y. and Chen, J.W.",
        TITLE = "Regularized Intermediate Layers Attack:
Adversarial Examples With High Transferability",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "1904-1908",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140428"}

@inproceedings{bb144441,
        AUTHOR = "Bai, T. and Zhao, J. and Zhu, J.L. and Han, S.D. and Chen, J.F. and Li, B. and Kot, A.",
        TITLE = "AI-GAN: Attack-Inspired Generation of Adversarial Examples",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "2543-2547",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140429"}

@inproceedings{bb144442,
        AUTHOR = "Abdelfattah, M. and Yuan, K.W. and Wang, Z.J. and Ward, R.",
        TITLE = "Towards Universal Physical Attacks on Cascaded Camera-Lidar 3d Object
Detection Models",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "3592-3596",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140430"}

@inproceedings{bb144443,
        AUTHOR = "Gurulingan, N.K. and Arani, E. and Zonooz, B.",
        TITLE = "UniNet: A Unified Scene Understanding Network and Exploring
Multi-Task Relationships through the Lens of Adversarial Attacks",
        BOOKTITLE = DeepMTL21,
        YEAR = "2021",
        PAGES = "2239-2248",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140431"}

@inproceedings{bb144444,
        AUTHOR = "Ding, Y.Z. and Thakur, N. and Li, B.X.",
        TITLE = "AdvFoolGen: Creating Persistent Troubles for Deep Classifiers",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "142-151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140432"}

@inproceedings{bb144445,
        AUTHOR = "Boloor, A. and Wu, T. and Naughton, P. and Chakrabarti, A. and Zhang, X. and Vorobeychik, Y.",
        TITLE = "Can Optical Trojans Assist Adversarial Perturbations?",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "122-131",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140433"}

@inproceedings{bb144446,
        AUTHOR = "Gnanasambandam, A. and Sherman, A.M. and Chan, S.H.",
        TITLE = "Optical Adversarial Attack",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "92-101",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140434"}

@inproceedings{bb144447,
        AUTHOR = "Lennon, M. and Drenkow, N. and Burlina, P.",
        TITLE = "Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "112-121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140435"}

@inproceedings{bb144448,
        AUTHOR = "Yu, Y.R. and Gao, X.T. and Xu, C.Z.",
        TITLE = "LAFEAT: Piercing Through Adversarial Defenses with Latent Features",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "5731-5741",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140436"}

@inproceedings{bb144449,
        AUTHOR = "Wang, X.S. and He, K.",
        TITLE = "Enhancing the Transferability of Adversarial Attacks through Variance
Tuning",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "1924-1933",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140437"}

@inproceedings{bb144450,
        AUTHOR = "Pony, R. and Naeh, I. and Mannor, S.",
        TITLE = "Over-the-Air Adversarial Flickering Attacks against Video Recognition
Networks",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "515-524",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140438"}

@inproceedings{bb144451,
        AUTHOR = "Rampini, A. and Pestarini, F. and Cosmo, L. and Melzi, S. and Rodola, E.",
        TITLE = "Universal Spectral Adversarial Attacks for Deformable Shapes",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "3215-3225",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140439"}

@inproceedings{bb144452,
        AUTHOR = "Rezaei, S. and Liu, X.",
        TITLE = "On the Difficulty of Membership Inference Attacks",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "7888-7896",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140440"}

@inproceedings{bb144453,
        AUTHOR = "Kariyappa, S. and Prakash, A. and Qureshi, M.K.",
        TITLE = "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient
Estimation",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "13809-13818",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140441"}

@inproceedings{bb144454,
        AUTHOR = "Duan, R.J. and Mao, X.F. and Qin, A.K. and Chen, Y.F. and Ye, S. and He, Y. and Yang, Y.",
        TITLE = "Adversarial Laser Beam:
Effective Physical-World Attack to DNNs in a Blink",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "16057-16066",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140442"}

@inproceedings{bb144455,
        AUTHOR = "Chen, Z.K. and Xie, L.X. and Pang, S.M. and He, Y. and Tian, Q.",
        TITLE = "Appending Adversarial Frames for Universal Video Attack",
        BOOKTITLE = WACV21,
        YEAR = "2021",
        PAGES = "3198-3207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140443"}

@inproceedings{bb144456,
        AUTHOR = "Cancela, B. and Bolon Canedo, V. and Alonso Betanzos, A.",
        TITLE = "A delayed Elastic-Net approach for performing adversarial attacks",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "378-384",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140444"}

@inproceedings{bb144457,
        AUTHOR = "Li, X.C. and Zhang, X.Y. and Yin, F. and Liu, C.L.",
        TITLE = "F-mixup: Attack CNNs From Fourier Perspective",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "541-548",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140445"}

@inproceedings{bb144458,
        AUTHOR = "Grosse, K. and Smith, M.T. and Backes, M.",
        TITLE = "Killing Four Birds with one Gaussian Process:
The Relation between different Test-Time Attacks",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "4696-4703",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140446"}

@inproceedings{bb144459,
        AUTHOR = "Barati, R. and Safabakhsh, R. and Rahmati, M.",
        TITLE = "Towards Explaining Adversarial Examples Phenomenon in Artificial
Neural Networks",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "7036-7042",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140447"}

@inproceedings{bb144460,
        AUTHOR = "Li, W.J. and Tondi, B. and Ni, R.R. and Barni, M.",
        TITLE = "Increased-confidence Adversarial Examples for Deep Learning
Counter-forensics",
        BOOKTITLE = MMForWild20,
        YEAR = "2020",
        PAGES = "411-424",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140448"}

@inproceedings{bb144461,
        AUTHOR = "Dong, X.S. and Liu, H. and Ji, R.R. and Cao, L.J. and Ye, Q.X. and Liu, J.Z. and Tian, Q.",
        TITLE = "API-net: Robust Generative Classifier via a Single Discriminator",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XIII:379-394",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140449"}

@inproceedings{bb144462,
        AUTHOR = "Liu, A.S. and Huang, T.R. and Liu, X.L. and Xu, Y.T. and Ma, Y.Q. and Chen, X.Y. and Maybank, S.J. and Tao, D.C.",
        TITLE = "Spatiotemporal Attacks for Embodied Agents",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XVII:122-138",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140450"}

@inproceedings{bb144463,
        AUTHOR = "Fan, Y.B. and Wu, B.Y. and Li, T.H. and Zhang, Y. and Li, M.Y. and Li, Z.F. and Yang, Y.J.",
        TITLE = "Sparse Adversarial Attack via Perturbation Factorization",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXII:35-50",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140451"}

@inproceedings{bb144464,
        AUTHOR = "Guo, J.F. and Liu, C.",
        TITLE = "Practical Poisoning Attacks on Neural Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVII:142-158",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140452"}

@inproceedings{bb144465,
        AUTHOR = "Costales, R. and Mao, C. and Norwitz, R. and Kim, B. and Yang, J.",
        TITLE = "Live Trojan Attacks on Deep Neural Networks",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3460-3469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140453"}

@inproceedings{bb144466,
        AUTHOR = "Haque, M. and Chauhan, A. and Liu, C. and Yang, W.",
        TITLE = "ILFO: Adversarial Attack on Adaptive Neural Networks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "14252-14261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140454"}

@inproceedings{bb144467,
        AUTHOR = "Zhou, M. and Wu, J. and Liu, Y. and Liu, S. and Zhu, C.",
        TITLE = "DaST: Data-Free Substitute Training for Adversarial Attacks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "231-240",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140455"}

@inproceedings{bb144468,
        AUTHOR = "Ganeshan, A. and Vivek, B.S. and Radhakrishnan, V.B.",
        TITLE = "FDA: Feature Disruptive Attack",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "8068-8078",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140456"}

@inproceedings{bb144469,
        AUTHOR = "Han, J. and Dong, X. and Zhang, R. and Chen, D. and Zhang, W. and Yu, N. and Luo, P. and Wang, X.",
        TITLE = "Once a MAN: Towards Multi-Target Attack via Learning Multi-Target
Adversarial Network Once",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "5157-5166",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140457"}

@inproceedings{bb144470,
        AUTHOR = "Deng, Y. and Karam, L.J.",
        TITLE = "Universal Adversarial Attack Via Enhanced Projected Gradient Descent",
        BOOKTITLE = ICIP20,
        YEAR = "2020",
        PAGES = "1241-1245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140458"}

@inproceedings{bb144471,
        AUTHOR = "Sun, C. and Chen, S. and Cai, J. and Huang, X.",
        TITLE = "Type I Attack For Generative Models",
        BOOKTITLE = ICIP20,
        YEAR = "2020",
        PAGES = "593-597",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140459"}

@inproceedings{bb144472,
        AUTHOR = "Braunegg, A. and Chakraborty, A. and Krumdick, M. and Lape, N. and Leary, S. and Manville, K. and Merkhofer, E. and Strickhart, L. and Walmer, M.",
        TITLE = "Apricot: A Dataset of Physical Adversarial Attacks on Object Detection",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXI:35-50",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140460"}

@inproceedings{bb144473,
        AUTHOR = "Zhang, H. and Zhu, L.C. and Zhu, Y. and Yang, Y.",
        TITLE = "Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XX:240-256",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140461"}

@inproceedings{bb144474,
        AUTHOR = "Gao, L.L. and Zhang, Q.L. and Song, J.K. and Liu, X.L. and Shen, H.T.",
        TITLE = "Patch-wise Attack for Fooling Deep Neural Network",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVIII:307-322",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140462"}

@inproceedings{bb144475,
        AUTHOR = "Bai, J.W. and Chen, B. and Li, Y.M. and Wu, D.X. and Guo, W.W. and Xia, S.T. and Yang, E.H.",
        TITLE = "Targeted Attack for Deep Hashing Based Retrieval",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "I:618-634",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140463"}

@inproceedings{bb144476,
        AUTHOR = "Nakka, K.K. and Salzmann, M.",
        TITLE = "Indirect Local Attacks for Context-aware Semantic Segmentation Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "V:611-628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140464"}

@inproceedings{bb144477,
        AUTHOR = "Wu, Z.X. and Lim, S.N. and Davis, L.S. and Goldstein, T.",
        TITLE = "Making an Invisibility Cloak: Real World Adversarial Attacks on Object
Detectors",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "IV:1-17",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140465"}

@inproceedings{bb144478,
        AUTHOR = "Li, Q.Z. and Guo, Y.W. and Chen, H.",
        TITLE = "Yet Another Intermediate-level Attack",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XVI: 241-257",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140466"}

@inproceedings{bb144479,
        AUTHOR = "Li, M. and Deng, C. and Li, T. and Yan, J. and Gao, X. and Huang, H.",
        TITLE = "Towards Transferable Targeted Attack",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "638-646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140467"}

@inproceedings{bb144480,
        AUTHOR = "Gupta, S. and Dube, P. and Verma, A.",
        TITLE = "Improving the affordability of robustness training for DNNs",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3383-3392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140468"}

@inproceedings{bb144481,
        AUTHOR = "Zhang, Z. and Wu, T.",
        TITLE = "Learning Ordered Top-k Adversarial Attacks via Adversarial
Distillation",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3364-3373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140469"}

@inproceedings{bb144482,
        AUTHOR = "Chen, X. and Yan, X. and Zheng, F. and Jiang, Y. and Xia, S. and Zhao, Y. and Ji, R.",
        TITLE = "One-Shot Adversarial Attacks on Visual Tracking With Dual Attention",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "10173-10182",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140470"}

@inproceedings{bb144483,
        AUTHOR = "Zhou, H. and Chen, D. and Liao, J. and Chen, K. and Dong, X. and Liu, K. and Zhang, W. and Hua, G. and Yu, N.",
        TITLE = "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack
of Point Cloud Based Deep Networks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "10353-10362",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140471"}

@inproceedings{bb144484,
        AUTHOR = "Machiraju, H. and Balasubramanian, V.N.",
        TITLE = "A Little Fog for a Large Turn",
        BOOKTITLE = WACV20,
        YEAR = "2020",
        PAGES = "2891-2900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140472"}

@inproceedings{bb144485,
        AUTHOR = "Yang, C.H. and Liu, Y. and Chen, P. and Ma, X. and Tsai, Y.J.",
        TITLE = "When Causal Intervention Meets Adversarial Examples and Image Masking
for Deep Neural Networks",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "3811-3815",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140473"}

@inproceedings{bb144486,
        AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.",
        TITLE = "Image Decomposition and Classification Through a Generative Model",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "400-404",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140474"}

@inproceedings{bb144487,
        AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.",
        TITLE = "Universal Perturbation Attack Against Image Retrieval",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4898-4907",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140475"}

@inproceedings{bb144488,
        AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.",
        TITLE = "The LogBarrier Adversarial Attack:
Making Effective Use of Decision Boundary Information",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4861-4869",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140476"}

@inproceedings{bb144489,
        AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.",
        TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation",
        BOOKTITLE = NeruArch19,
        YEAR = "2019",
        PAGES = "2045-2048",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140477"}

@inproceedings{bb144490,
        AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.",
        TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to
Output-Size Specifications",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "12252-12261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140478"}

@inproceedings{bb144491,
        AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.",
        TITLE = "SparseFool: A Few Pixels Make a Big Difference",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "9079-9088",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140479"}

@inproceedings{bb144492,
        AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.",
        TITLE = "Trust Region Based Adversarial Attack on Neural Networks",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11342-11351",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140480"}

@inproceedings{bb144493,
        AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.",
        TITLE = "Adversarial Attacks Beyond the Image Space",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4297-4306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140481"}

@inproceedings{bb144494,
        AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.",
        TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect
Adversarial Attacks?",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4752-4761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140482"}

@inproceedings{bb144495,
        AUTHOR = "Liu, X.Q. and Hsieh, C.J.",
        TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11226-11235",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140483"}

@inproceedings{bb144496,
        AUTHOR = "Gupta, P. and Rahtu, E.",
        TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks",
        BOOKTITLE = GCPR19,
        YEAR = "2019",
        PAGES = "401-413",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140484"}

@inproceedings{bb144497,
        AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.",
        TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and
Machine",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "83-92",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140485"}

@inproceedings{bb144498,
        AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.",
        TITLE = "Fooling Vision and Language Models Despite Localization and Attention
Mechanism",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "4951-4961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140486"}

@inproceedings{bb144499,
        AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.",
        TITLE = "Boosting Adversarial Attacks with Momentum",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "9185-9193",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT140487"}

Last update:Apr 10, 2024 at 09:54:40