@article{bb146200,
        AUTHOR = "Chen, S. and He, Z.B. and Sun, C.J. and Yang, J. and Huang, X.L.",
        TITLE = "Universal Adversarial Attack on Attention and the Resulting Dataset
DAmageNet",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "2188-2197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142176"}

@article{bb146201,
        AUTHOR = "Kim, J.",
        TITLE = "On Optimality of Deterministic Rules in Adversarial Bayesian
Detection",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "757-761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142177"}

@article{bb146202,
        AUTHOR = "Sun, X.X. and Cheng, G. and Pei, L. and Han, J.W.",
        TITLE = "Query-efficient decision-based attack via sampling distribution
reshaping",
        JOURNAL = PR,
        VOLUME = "129",
        YEAR = "2022",
        PAGES = "108728",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142178"}

@article{bb146203,
        AUTHOR = "Chen, S.M. and Zhang, Q.Q. and Lin, D.Y. and Wang, S.Y.",
        TITLE = "A Class of Nonlinear Kalman Filters Under a Generalized Measurement
Model With False Data Injection Attacks",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "1187-1191",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142179"}

@article{bb146204,
        AUTHOR = "Chen, M. and Wang, Y.J. and Zhu, X.T.",
        TITLE = "Few-shot Website Fingerprinting attack with Meta-Bias Learning",
        JOURNAL = PR,
        VOLUME = "130",
        YEAR = "2022",
        PAGES = "108739",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142180"}

@article{bb146205,
        AUTHOR = "Zhang, Z. and Wang, X.G. and Lu, G.M. and Shen, F.M. and Zhu, L.",
        TITLE = "Targeted Attack of Deep Hashing Via Prototype-Supervised Adversarial
Networks",
        JOURNAL = MultMed,
        VOLUME = "24",
        YEAR = "2022",
        PAGES = "3392-3404",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142181"}

@article{bb146206,
        AUTHOR = "Wang, T.S. and Zhu, L. and Zhang, Z. and Zhang, H.X. and Han, J.W.",
        TITLE = "Targeted Adversarial Attack Against Deep Cross-Modal Hashing
Retrieval",
        JOURNAL = CirSysVideo,
        VOLUME = "33",
        YEAR = "2023",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "6159-6172",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142182"}

@inproceedings{bb146207,
        AUTHOR = "Wang, X.G. and Zhang, Z. and Wu, B.Y. and Shen, F.M. and Lu, G.M.",
        TITLE = "Prototype-supervised Adversarial Network for Targeted Attack of Deep
Hashing",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "16352-16361",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142183"}

@article{bb146208,
        AUTHOR = "He, Z. and Wang, W. and Dong, J. and Tan, T.N.",
        TITLE = "Revisiting ensemble adversarial attack",
        JOURNAL = SP:IC,
        VOLUME = "107",
        YEAR = "2022",
        PAGES = "116747",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142184"}

@article{bb146209,
        AUTHOR = "Akhtar, N. and Jalwana, M.A.A.K. and Bennamoun, M. and Mian, A.",
        TITLE = "Attack to Fool and Explain Deep Networks",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "5980-5995",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142185"}

@article{bb146210,
        AUTHOR = "Ma, K. and Xu, Q.Q. and Zeng, J.S. and Cao, X.C. and Huang, Q.M.",
        TITLE = "Poisoning Attack Against Estimating From Pairwise Comparisons",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "6393-6408",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142186"}

@article{bb146211,
        AUTHOR = "Deng, Y.P. and Karam, L.J.",
        TITLE = "Frequency-Tuned Universal Adversarial Attacks on Texture Recognition",
        JOURNAL = IP,
        VOLUME = "31",
        YEAR = "2022",
        PAGES = "5856-5868",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142187"}

@article{bb146212,
        AUTHOR = "Giulivi, L. and Jere, M. and Rossi, L. and Koushanfar, F. and Ciocarlie, G. and Hitaj, B. and Boracchi, G.",
        TITLE = "Adversarial scratches: Deployable attacks to CNN classifiers",
        JOURNAL = PR,
        VOLUME = "133",
        YEAR = "2023",
        PAGES = "108985",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142188"}

@article{bb146213,
        AUTHOR = "Lin, X.X. and Zhou, C. and Wu, J. and Yang, H. and Wang, H.B. and Cao, Y. and Wang, B.",
        TITLE = "Exploratory Adversarial Attacks on Graph Neural Networks for
Semi-Supervised Node Classification",
        JOURNAL = PR,
        VOLUME = "133",
        YEAR = "2023",
        PAGES = "109042",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142189"}

@article{bb146214,
        AUTHOR = "Zhao, C.L. and Ni, B.B. and Mei, S.B.",
        TITLE = "Explore Adversarial Attack via Black Box Variational Inference",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "2088-2092",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142190"}

@article{bb146215,
        AUTHOR = "Bai, T. and Wang, H. and Wen, B.",
        TITLE = "Targeted Universal Adversarial Examples for Remote Sensing",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "22",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142191"}

@article{bb146216,
        AUTHOR = "Zhang, Y.C. and Zhang, Y. and Qi, J.H. and Bin, K.C. and Wen, H. and Tong, X.Q. and Zhong, P.",
        TITLE = "Adversarial Patch Attack on Multi-Scale Object Detection for UAV
Remote Sensing Images",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "21",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142192"}

@article{bb146217,
        AUTHOR = "Agarwal, A. and Ratha, N. and Vatsa, M. and Singh, R.",
        TITLE = "Crafting Adversarial Perturbations via Transformed Image Component
Swapping",
        JOURNAL = IP,
        VOLUME = "31",
        YEAR = "2022",
        PAGES = "7338-7349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142193"}

@article{bb146218,
        AUTHOR = "Kazemi, E. and Kerdreux, T. and Wang, L.Q.",
        TITLE = "Minimally Distorted Structured Adversarial Attacks",
        JOURNAL = IJCV,
        VOLUME = "131",
        YEAR = "2023",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "160-176",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142194"}

@article{bb146219,
        AUTHOR = "Yuan, H.J. and Chu, Q. and Zhu, F. and Zhao, R. and Liu, B. and Yu, N.H.",
        TITLE = "AutoMA: Towards Automatic Model Augmentation for Transferable
Adversarial Attacks",
        JOURNAL = MultMed,
        VOLUME = "25",
        YEAR = "2023",
        PAGES = "203-213",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142195"}

@article{bb146220,
        AUTHOR = "Wei, X.X. and Guo, Y. and Yu, J.",
        TITLE = "Adversarial Sticker: A Stealthy Attack Method in the Physical World",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "2711-2725",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142196"}

@article{bb146221,
        AUTHOR = "Guo, Y. and Li, Q.Z. and Zuo, W.M. and Chen, H.",
        TITLE = "An Intermediate-Level Attack Framework on the Basis of Linear
Regression",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "2726-2735",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142197"}

@article{bb146222,
        AUTHOR = "Qin, C. and Gao, S.Y. and Zhang, X.P. and Feng, G.R.",
        TITLE = "CADW: CGAN-Based Attack on Deep Robust Image Watermarking",
        JOURNAL = MultMedMag,
        VOLUME = "30",
        YEAR = "2023",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "28-35",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142198"}

@article{bb146223,
        AUTHOR = "Lin, G.Y. and Pan, Z.S. and Zhou, X.Y. and Duan, Y. and Bai, W. and Zhan, D. and Zhu, L. and Zhao, G. and Li, T.",
        TITLE = "Boosting Adversarial Transferability with Shallow-Feature Attack on
SAR Images",
        JOURNAL = RS,
        VOLUME = "15",
        YEAR = "2023",
        NUMBER = "10",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142199"}

@article{bb146224,
        AUTHOR = "Sun, X.X. and Cheng, G. and Li, H. and Pei, L. and Han, J.W.",
        TITLE = "On Single-Model Transferable Targeted Attacks:
A Closer Look at Decision-Level Optimization",
        JOURNAL = IP,
        VOLUME = "32",
        YEAR = "2023",
        PAGES = "2972-2984",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142200"}

@article{bb146225,
        AUTHOR = "Pan, J.H. and Foo, L.G. and Zheng, Q.C. and Fan, Z.P. and Rahmani, H. and Ke, Q.H. and Liu, J.",
        TITLE = "GradMDM: Adversarial Attack on Dynamic Networks",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "11374-11381",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142201"}

@inproceedings{bb146226,
        AUTHOR = "Pan, J.H. and Zheng, Q.C. and Fan, Z.P. and Rahmani, H. and Ke, Q.H. and Liu, J.",
        TITLE = "GradAuto: Energy-Oriented Attack on Dynamic Neural Networks",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "IV:637-653",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142202"}

@article{bb146227,
        AUTHOR = "Bai, J.W. and Wu, B.Y. and Li, Z.F. and Xia, S.T.",
        TITLE = "Versatile Weight Attack via Flipping Limited Bits",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "13653-13665",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142203"}

@article{bb146228,
        AUTHOR = "Zhang, S.H. and Zuo, D.X. and Yang, Y.L. and Zhang, X.W.",
        TITLE = "A Transferable Adversarial Belief Attack With Salient Region
Perturbation Restriction",
        JOURNAL = MultMed,
        VOLUME = "25",
        YEAR = "2023",
        PAGES = "4296-4306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142204"}

@article{bb146229,
        AUTHOR = "Liang, X.Y. and Qian, Y. and Huang, J.C. and Ling, X. and Wang, B. and Wu, C.M. and Swaileh, W.",
        TITLE = "Towards desirable decision boundary by Moderate-Margin Adversarial
Training",
        JOURNAL = PRL,
        VOLUME = "173",
        YEAR = "2023",
        PAGES = "30-37",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142205"}

@article{bb146230,
        AUTHOR = "Zheng, S.J. and Liu, W.Q. and Shen, S.Q. and Zang, Y. and Wen, C. and Cheng, M. and Wang, C.",
        TITLE = "Adaptive local adversarial attacks on 3D point clouds",
        JOURNAL = PR,
        VOLUME = "144",
        YEAR = "2023",
        PAGES = "109825",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142206"}

@article{bb146231,
        AUTHOR = "Li, Y. and Pan, Q. and Feng, Z.W. and Cambria, E.",
        TITLE = "Few pixels attacks with generative model",
        JOURNAL = PR,
        VOLUME = "144",
        YEAR = "2023",
        PAGES = "109849",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142207"}

@article{bb146232,
        AUTHOR = "Xiao, Y. and Zhou, J.Z. and Chen, K.Y. and Liu, Z.B.",
        TITLE = "Revisiting the transferability of adversarial examples via
source-agnostic adversarial feature inducing method",
        JOURNAL = PR,
        VOLUME = "144",
        YEAR = "2023",
        PAGES = "109828",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142208"}

@article{bb146233,
        AUTHOR = "Mao, Z.S. and Lu, Y.Q. and Cheng, Z. and Shen, X.",
        TITLE = "Enhancing transferability of adversarial examples with pixel-level
scale variation",
        JOURNAL = SP:IC,
        VOLUME = "118",
        YEAR = "2023",
        PAGES = "117020",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142209"}

@article{bb146234,
        AUTHOR = "Sun, J.L. and Yao, W. and Jiang, T. and Chen, X.Q.",
        TITLE = "Efficient search of comprehensively robust neural architectures via
multi-fidelity evaluation",
        JOURNAL = PR,
        VOLUME = "146",
        YEAR = "2024",
        PAGES = "110038",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142210"}

@article{bb146235,
        AUTHOR = "Mumcu, F. and Yilmaz, Y.",
        TITLE = "Sequential architecture-agnostic black-box attack design and analysis",
        JOURNAL = PR,
        VOLUME = "147",
        YEAR = "2024",
        PAGES = "110066",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142211"}

@article{bb146236,
        AUTHOR = "Chen, T. and Ma, Z.",
        TITLE = "Toward Robust Neural Image Compression: Adversarial Attack and Model
Finetuning",
        JOURNAL = CirSysVideo,
        VOLUME = "33",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "7842-7856",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142212"}

@article{bb146237,
        AUTHOR = "Wan, C. and Huang, F. and Zhao, X.F.",
        TITLE = "Average Gradient-Based Adversarial Attack",
        JOURNAL = MultMed,
        VOLUME = "25",
        YEAR = "2023",
        PAGES = "9572-9585",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142213"}

@article{bb146238,
        AUTHOR = "Akers, M. and Barton, A.",
        TITLE = "Forming Adversarial Example Attacks Against Deep Neural Networks With
Reinforcement Learning",
        JOURNAL = Computer,
        VOLUME = "57",
        YEAR = "2024",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "88-99",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142214"}

@article{bb146239,
        AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Chen, X.Q.",
        TITLE = "Improving Transferability of Universal Adversarial Perturbation With
Feature Disruption",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "722-737",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142215"}

@article{bb146240,
        AUTHOR = "Wei, X.X. and Zhao, S.",
        TITLE = "Boosting Adversarial Transferability With Learnable Patch-Wise Masks",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "3778-3787",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142216"}

@article{bb146241,
        AUTHOR = "Li, J. and Wei, X.M.",
        TITLE = "Research on efficient detection network method for remote sensing
images based on self attention mechanism",
        JOURNAL = IVC,
        VOLUME = "142",
        YEAR = "2024",
        PAGES = "104884",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142217"}

@article{bb146242,
        AUTHOR = "Wei, X.X. and Huang, Y. and Sun, Y.T. and Yu, J.",
        TITLE = "Unified Adversarial Patch for Visible-Infrared Cross-Modal Attacks in
the Physical World",
        JOURNAL = PAMI,
        VOLUME = "46",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "2348-2363",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142218"}

@inproceedings{bb146243,
        AUTHOR = "Wei, X.X. and Huang, Y. and Sun, Y.T. and Yu, J.",
        TITLE = "Unified Adversarial Patch for Cross-modal Attacks in the Physical
World",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4422-4431",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142219"}

@article{bb146244,
        AUTHOR = "Ran, Y. and Wang, W.J. and Li, M.J. and Li, L.C. and Wang, Y.G. and Li, J.",
        TITLE = "Cross-Shaped Adversarial Patch Attack",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "2289-2303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142220"}

@article{bb146245,
        AUTHOR = "Liu, T.F. and Yang, C. and Liu, X. and Han, R.D. and Ma, J.F.",
        TITLE = "RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "2586-2598",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142221"}

@article{bb146246,
        AUTHOR = "Yuan, Z. and Zhang, J. and Jiang, Z.Y. and Li, L.L. and Shan, S.G.",
        TITLE = "Adaptive Perturbation for Adversarial Attack",
        JOURNAL = PAMI,
        VOLUME = "46",
        YEAR = "2024",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5663-5676",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142222"}

@article{bb146247,
        AUTHOR = "Tao, A. and Duan, Y. and Wang, Y.Q. and Lu, J.W. and Zhou, J.",
        TITLE = "Dynamics-Aware Adversarial Attack of Adaptive Neural Networks",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "5505-5518",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142223"}

@article{bb146248,
        AUTHOR = "Li, X. and Zhu, G.P. and Wang, S. and Zhou, Y.C. and Zhang, X.P.",
        TITLE = "Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6391-6402",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142224"}

@inproceedings{bb146249,
        AUTHOR = "Zhang, M. and Yu, N. and Wen, R. and Backes, M. and Zhang, Y.",
        TITLE = "Generated Distributions Are All You Need for Membership Inference
Attacks Against Generative Models",
        BOOKTITLE = WACV24,
        YEAR = "2024",
        PAGES = "4827-4837",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142225"}

@inproceedings{bb146250,
        AUTHOR = "Dubinski, J. and Kowalczuk, A. and Pawlak, S. and Rokita, P. and Trzcinski, T. and Morawiecki, P.",
        TITLE = "Towards More Realistic Membership Inference Attacks on Large
Diffusion Models",
        BOOKTITLE = WACV24,
        YEAR = "2024",
        PAGES = "4848-4857",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142226"}

@inproceedings{bb146251,
        AUTHOR = "Cohen, G. and Giryes, R.",
        TITLE = "Membership Inference Attack Using Self Influence Functions",
        BOOKTITLE = WACV24,
        YEAR = "2024",
        PAGES = "4880-4889",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142227"}

@inproceedings{bb146252,
        AUTHOR = "Ledda, E. and Angioni, D. and Piras, G. and Fumera, G. and Biggio, B. and Roli, F.",
        TITLE = "Adversarial Attacks Against Uncertainty Quantification",
        BOOKTITLE = Uncertainty23,
        YEAR = "2023",
        PAGES = "4601-4610",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142228"}

@inproceedings{bb146253,
        AUTHOR = "Tal, O.B. and Haviv, A. and Bermano, A.H.",
        TITLE = "OMG-Attack: Self-Supervised On-Manifold Generation of Transferable
Evasion Attacks",
        BOOKTITLE = AROW23,
        YEAR = "2023",
        PAGES = "3698-3708",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142229"}

@inproceedings{bb146254,
        AUTHOR = "Ambati, R. and Akhtar, N. and Mian, A. and Rawat, Y.S.",
        TITLE = "PRAT: PRofiling Adversarial aTtacks",
        BOOKTITLE = AROW23,
        YEAR = "2023",
        PAGES = "3669-3678",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142230"}

@inproceedings{bb146255,
        AUTHOR = "Ko, M. and Jin, M. and Wang, C.G. and Jia, R.",
        TITLE = "Practical Membership Inference Attacks Against Large-Scale
Multi-Modal Models: A Pilot Study",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4848-4858",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142231"}

@inproceedings{bb146256,
        AUTHOR = "Dong, J.S. and Qiu, H. and Li, Y.M. and Zhang, T.W. and Li, Y.J. and Lai, Z. and Zhang, C. and Xia, S.T.",
        TITLE = "One-bit Flip is All You Need: When Bit-flip Attack Meets Model
Training",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4665-4675",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142232"}

@inproceedings{bb146257,
        AUTHOR = "Ma, W.S. and Li, Y.D. and Jia, X.F. and Xu, W.",
        TITLE = "Transferable Adversarial Attack for Both Vision Transformers and
Convolutional Networks via Momentum Integrated Gradients",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4607-4616",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142233"}

@inproceedings{bb146258,
        AUTHOR = "Chen, X.Q. and Gao, X.T. and Zhao, J.J. and Ye, K.J. and Xu, C.Z.",
        TITLE = "AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion
Models",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4539-4549",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142234"}

@inproceedings{bb146259,
        AUTHOR = "Zhou, T. and Ye, Q. and Luo, W.H. and Zhang, K. and Shi, Z.G. and Chen, J.M.",
        TITLE = "F&F Attack: Adversarial Attack against Multiple Object Trackers
by Inducing False Negatives and False Positives",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4550-4560",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142235"}

@inproceedings{bb146260,
        AUTHOR = "Qian, Y. and He, S. and Zhao, C.Y. and Sha, J.Q. and Wang, W. and Wang, B.",
        TITLE = "LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping
Vulnerable Frequency Regions",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4487-4498",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142236"}

@inproceedings{bb146261,
        AUTHOR = "Maho, T. and Moosavi Dezfooli, S.M. and Furon, T.",
        TITLE = "How to choose your best allies for a transferable attack?",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4519-4528",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142237"}

@inproceedings{bb146262,
        AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Li, C. and Chen, X.Q.",
        TITLE = "RFLA:
A Stealthy Reflected Light Adversarial Attack in the Physical World",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4432-4442",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142238"}

@inproceedings{bb146263,
        AUTHOR = "Zhou, Z.Q. and Hu, S. and Zhao, R.Z. and Wang, Q. and Zhang, L.Y. and Hou, J.H. and Jin, H.",
        TITLE = "Downstream-agnostic Adversarial Examples",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4322-4332",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142239"}

@inproceedings{bb146264,
        AUTHOR = "Kim, H.S. and Son, M.J. and Kim, M. and Kwon, M.J. and Kim, C.",
        TITLE = "Breaking Temporal Consistency: Generating Video Universal Adversarial
Perturbations Using Image Models",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4302-4311",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142240"}

@inproceedings{bb146265,
        AUTHOR = "Stolik, T. and Lang, I. and Avidan, S.",
        TITLE = "SAGA: Spectral Adversarial Geometric Attack on 3D Meshes",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4261-4271",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142241"}

@inproceedings{bb146266,
        AUTHOR = "Zeng, H. and Zhang, T. and Chen, B.W. and Peng, A.",
        TITLE = "Enhancing Targeted Transferability Via Suppressing High-Confidence
Labels",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3309-3313",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142242"}

@inproceedings{bb146267,
        AUTHOR = "Kim, Y. and Cho, S.J. and Byun, J. and Kwon, M.J. and Kim, C.",
        TITLE = "Improving Adversarial Transferability Via Feature Translation",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3359-3363",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142243"}

@inproceedings{bb146268,
        AUTHOR = "Coscia, P. and Genovese, A. and Scotti, F. and Piuri, V.",
        TITLE = "Adversarial Defect Synthesis for Industrial Products in Low Data
Regime",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "1360-1364",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142244"}

@inproceedings{bb146269,
        AUTHOR = "Lin, Z. and Peng, A. and Zeng, H. and Wu, K.J. and Yu, W.X.",
        TITLE = "An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3439-3443",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142245"}

@inproceedings{bb146270,
        AUTHOR = "Ma, M.Z. and Zheng, W.J. and Lv, W.L. and Ren, L. and Su, H. and Yin, Z.X.",
        TITLE = "Multi-Label Adversarial Attack Based on Label Correlation",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "2050-2054",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142246"}

@inproceedings{bb146271,
        AUTHOR = "Wu, T. and Luo, T. and Wunsch, D.C.",
        TITLE = "GNP Attack: Transferable Adversarial Examples Via Gradient Norm
Penalty",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3110-3114",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142247"}

@inproceedings{bb146272,
        AUTHOR = "Sha, Z. and He, X.L. and Yu, N. and Backes, M. and Zhang, Y.",
        TITLE = "Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image
Encoders",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16373-16383",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142248"}

@inproceedings{bb146273,
        AUTHOR = "Feng, W.W. and Xu, N. and Zhang, T.Z. and Zhang, Y.D.",
        TITLE = "Dynamic Generative Targeted Attacks with Pattern Injection",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16404-16414",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142249"}

@inproceedings{bb146274,
        AUTHOR = "Takahashi, H. and Liu, J.J. and Liu, Y.",
        TITLE = "Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12198-12207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142250"}

@inproceedings{bb146275,
        AUTHOR = "Wei, Z.P. and Chen, J.J. and Wu, Z. and Jiang, Y.G.",
        TITLE = "Enhancing the Self-Universality for Transferable Targeted Attacks",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12281-12290",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142251"}

@inproceedings{bb146276,
        AUTHOR = "Chen, W.X. and Song, D. and Li, B.",
        TITLE = "TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "4035-4044",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142252"}

@inproceedings{bb146277,
        AUTHOR = "Zhuang, H.M. and Zhang, Y.H. and Liu, S.",
        TITLE = "A Pilot Study of Query-Free Adversarial Attack against Stable
Diffusion",
        BOOKTITLE = AML23,
        YEAR = "2023",
        PAGES = "2385-2392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142253"}

@inproceedings{bb146278,
        AUTHOR = "Brown, D. and Kvinge, H.",
        TITLE = "Making Corgis Important for Honeycomb Classification:
Adversarial Attacks on Concept-based Explainability Tools",
        BOOKTITLE = TAG-PRA23,
        YEAR = "2023",
        PAGES = "620-627",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142254"}

@inproceedings{bb146279,
        AUTHOR = "Shukla, N. and Banerjee, S.",
        TITLE = "Generating Adversarial Attacks in the Latent Space",
        BOOKTITLE = GCV23,
        YEAR = "2023",
        PAGES = "730-739",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142255"}

@inproceedings{bb146280,
        AUTHOR = "Zhang, L. and Wang, X.D.",
        TITLE = "Advfilter: Adversarial Example Generated by Perturbing Optical Path",
        BOOKTITLE = "ACCVWS22",
        YEAR = "2022",
        PAGES = "33-44",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142256"}

@inproceedings{bb146281,
        AUTHOR = "Koren, T. and Talker, L. and Dinerstein, M. and Vitek, R.",
        TITLE = "Consistent Semantic Attacks on Optical Flow",
        BOOKTITLE = ACCV22,
        YEAR = "2022",
        PAGES = "VII:501-517",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142257"}

@inproceedings{bb146282,
        AUTHOR = "Wu, H. and Wang, J. and Zhang, J.W. and Luo, X.Y. and Ma, B.",
        TITLE = "Improving the Transferability of Adversarial Attacks Through Both Front
and Rear Vector Method",
        BOOKTITLE = IWDW22,
        YEAR = "2022",
        PAGES = "83-97",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142258"}

@inproceedings{bb146283,
        AUTHOR = "Waseda, F. and Nishikawa, S. and Le, T.N. and Nguyen, H.H. and Echizen, I.",
        TITLE = "Closer Look at the Transferability of Adversarial Examples:
How They Fool Different Models Differently",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "1360-1368",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142259"}

@inproceedings{bb146284,
        AUTHOR = "Aich, A. and Li, S. and Song, C. and Asif, M.S. and Krishnamurthy, S.V. and Roy Chowdhury, A.K.",
        TITLE = "Leveraging Local Patch Differences in Multi-Object Scenes for
Generative Adversarial Attacks",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "1308-1318",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142260"}

@inproceedings{bb146285,
        AUTHOR = "Shapira, A. and Zolfi, A. and Demetrio, L. and Biggio, B. and Shabtai, A.",
        TITLE = "Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep
Object Detectors",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "4560-4569",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142261"}

@inproceedings{bb146286,
        AUTHOR = "Tan, H.X. and Kotthaus, H.",
        TITLE = "Explainability-Aware One Point Attack for Point Cloud Neural Networks",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "4570-4579",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142262"}

@inproceedings{bb146287,
        AUTHOR = "Chen, C.C. and Zhu, W.J. and Peng, B. and Lu, H.J.",
        TITLE = "Towards Robust Community Detection via Extreme Adversarial Attacks",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "2231-2237",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142263"}

@inproceedings{bb146288,
        AUTHOR = "Tavallali, P. and Behzadan, V. and Alizadeh, A. and Ranganath, A. and Singhal, M.",
        TITLE = "Adversarial Label-Poisoning Attacks and Defense for General
Multi-Class Models Based on Synthetic Reduced Nearest Neighbor",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3717-3722",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142264"}

@inproceedings{bb146289,
        AUTHOR = "Lin, Z. and Peng, A. and Wei, R. and Yu, W.X. and Zeng, H.",
        TITLE = "An Enhanced Transferable Adversarial Attack of Scale-Invariant
Methods",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3788-3792",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142265"}

@inproceedings{bb146290,
        AUTHOR = "Ran, Y. and Wang, Y.G.",
        TITLE = "Sign-OPT+: An Improved Sign Optimization Adversarial Attack",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "461-465",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142266"}

@inproceedings{bb146291,
        AUTHOR = "Wang, D. and Lin, J. and Wang, Y.G.",
        TITLE = "Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "546-550",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142267"}

@inproceedings{bb146292,
        AUTHOR = "Aneja, S. and Markhasin, L. and Nießner, M.",
        TITLE = "TAFIM: Targeted Adversarial Attacks Against Facial Image Manipulations",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "XIV:58-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142268"}

@inproceedings{bb146293,
        AUTHOR = "Long, Y.Y. and Zhang, Q.L. and Zeng, B. and Gao, L.L. and Liu, X.L. and Zhang, J. and Song, J.K.",
        TITLE = "Frequency Domain Model Augmentation for Adversarial Attack",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "IV:549-566",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142269"}

@inproceedings{bb146294,
        AUTHOR = "Yuan, Z. and Zhang, J. and Shan, S.G.",
        TITLE = "Adaptive Image Transformations for Transfer-Based Adversarial Attack",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:1-17",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142270"}

@inproceedings{bb146295,
        AUTHOR = "Cao, Y.L. and Xiao, C.W. and Anandkumar, A. and Xu, D. and Pavone, M.",
        TITLE = "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:36-52",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142271"}

@inproceedings{bb146296,
        AUTHOR = "Bai, J.W. and Gao, K.F. and Gong, D.H. and Xia, S.T. and Li, Z.F. and Liu, W.",
        TITLE = "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:104-121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142272"}

@inproceedings{bb146297,
        AUTHOR = "Liu, G. and Huang, X.W. and Yi, X.P.",
        TITLE = "Adversarial Label Poisoning Attack on Graph Neural Networks via Label
Propagation",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:227-243",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142273"}

@inproceedings{bb146298,
        AUTHOR = "Byun, J. and Shim, K. and Go, H. and Kim, C.",
        TITLE = "Hidden Conditional Adversarial Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "1306-1310",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142274"}

@inproceedings{bb146299,
        AUTHOR = "Son, M.J. and Kwon, M.J. and Kim, H.S. and Byun, J. and Cho, S. and Kim, C.",
        TITLE = "Adaptive Warping Network for Transferable Adversarial Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3056-3060",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142275"}

Last update:Jul 18, 2024 at 20:50:34