@article{bb146200, AUTHOR = "Chen, S. and He, Z.B. and Sun, C.J. and Yang, J. and Huang, X.L.", TITLE = "Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "4", MONTH = "April", PAGES = "2188-2197", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142176"} @article{bb146201, AUTHOR = "Kim, J.", TITLE = "On Optimality of Deterministic Rules in Adversarial Bayesian Detection", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "757-761", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142177"} @article{bb146202, AUTHOR = "Sun, X.X. and Cheng, G. and Pei, L. and Han, J.W.", TITLE = "Query-efficient decision-based attack via sampling distribution reshaping", JOURNAL = PR, VOLUME = "129", YEAR = "2022", PAGES = "108728", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142178"} @article{bb146203, AUTHOR = "Chen, S.M. and Zhang, Q.Q. and Lin, D.Y. and Wang, S.Y.", TITLE = "A Class of Nonlinear Kalman Filters Under a Generalized Measurement Model With False Data Injection Attacks", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "1187-1191", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142179"} @article{bb146204, AUTHOR = "Chen, M. and Wang, Y.J. and Zhu, X.T.", TITLE = "Few-shot Website Fingerprinting attack with Meta-Bias Learning", JOURNAL = PR, VOLUME = "130", YEAR = "2022", PAGES = "108739", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142180"} @article{bb146205, AUTHOR = "Zhang, Z. and Wang, X.G. and Lu, G.M. and Shen, F.M. and Zhu, L.", TITLE = "Targeted Attack of Deep Hashing Via Prototype-Supervised Adversarial Networks", JOURNAL = MultMed, VOLUME = "24", YEAR = "2022", PAGES = "3392-3404", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142181"} @article{bb146206, AUTHOR = "Wang, T.S. and Zhu, L. and Zhang, Z. and Zhang, H.X. and Han, J.W.", TITLE = "Targeted Adversarial Attack Against Deep Cross-Modal Hashing Retrieval", JOURNAL = CirSysVideo, VOLUME = "33", YEAR = "2023", NUMBER = "10", MONTH = "October", PAGES = "6159-6172", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142182"} @inproceedings{bb146207, AUTHOR = "Wang, X.G. and Zhang, Z. and Wu, B.Y. and Shen, F.M. and Lu, G.M.", TITLE = "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "16352-16361", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142183"} @article{bb146208, AUTHOR = "He, Z. and Wang, W. and Dong, J. and Tan, T.N.", TITLE = "Revisiting ensemble adversarial attack", JOURNAL = SP:IC, VOLUME = "107", YEAR = "2022", PAGES = "116747", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142184"} @article{bb146209, AUTHOR = "Akhtar, N. and Jalwana, M.A.A.K. and Bennamoun, M. and Mian, A.", TITLE = "Attack to Fool and Explain Deep Networks", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "10", MONTH = "October", PAGES = "5980-5995", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142185"} @article{bb146210, AUTHOR = "Ma, K. and Xu, Q.Q. and Zeng, J.S. and Cao, X.C. and Huang, Q.M.", TITLE = "Poisoning Attack Against Estimating From Pairwise Comparisons", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "10", MONTH = "October", PAGES = "6393-6408", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142186"} @article{bb146211, AUTHOR = "Deng, Y.P. and Karam, L.J.", TITLE = "Frequency-Tuned Universal Adversarial Attacks on Texture Recognition", JOURNAL = IP, VOLUME = "31", YEAR = "2022", PAGES = "5856-5868", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142187"} @article{bb146212, AUTHOR = "Giulivi, L. and Jere, M. and Rossi, L. and Koushanfar, F. and Ciocarlie, G. and Hitaj, B. and Boracchi, G.", TITLE = "Adversarial scratches: Deployable attacks to CNN classifiers", JOURNAL = PR, VOLUME = "133", YEAR = "2023", PAGES = "108985", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142188"} @article{bb146213, AUTHOR = "Lin, X.X. and Zhou, C. and Wu, J. and Yang, H. and Wang, H.B. and Cao, Y. and Wang, B.", TITLE = "Exploratory Adversarial Attacks on Graph Neural Networks for Semi-Supervised Node Classification", JOURNAL = PR, VOLUME = "133", YEAR = "2023", PAGES = "109042", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142189"} @article{bb146214, AUTHOR = "Zhao, C.L. and Ni, B.B. and Mei, S.B.", TITLE = "Explore Adversarial Attack via Black Box Variational Inference", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "2088-2092", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142190"} @article{bb146215, AUTHOR = "Bai, T. and Wang, H. and Wen, B.", TITLE = "Targeted Universal Adversarial Examples for Remote Sensing", JOURNAL = RS, VOLUME = "14", YEAR = "2022", NUMBER = "22", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142191"} @article{bb146216, AUTHOR = "Zhang, Y.C. and Zhang, Y. and Qi, J.H. and Bin, K.C. and Wen, H. and Tong, X.Q. and Zhong, P.", TITLE = "Adversarial Patch Attack on Multi-Scale Object Detection for UAV Remote Sensing Images", JOURNAL = RS, VOLUME = "14", YEAR = "2022", NUMBER = "21", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142192"} @article{bb146217, AUTHOR = "Agarwal, A. and Ratha, N. and Vatsa, M. and Singh, R.", TITLE = "Crafting Adversarial Perturbations via Transformed Image Component Swapping", JOURNAL = IP, VOLUME = "31", YEAR = "2022", PAGES = "7338-7349", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142193"} @article{bb146218, AUTHOR = "Kazemi, E. and Kerdreux, T. and Wang, L.Q.", TITLE = "Minimally Distorted Structured Adversarial Attacks", JOURNAL = IJCV, VOLUME = "131", YEAR = "2023", NUMBER = "1", MONTH = "January", PAGES = "160-176", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142194"} @article{bb146219, AUTHOR = "Yuan, H.J. and Chu, Q. and Zhu, F. and Zhao, R. and Liu, B. and Yu, N.H.", TITLE = "AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial Attacks", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "203-213", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142195"} @article{bb146220, AUTHOR = "Wei, X.X. and Guo, Y. and Yu, J.", TITLE = "Adversarial Sticker: A Stealthy Attack Method in the Physical World", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "3", MONTH = "March", PAGES = "2711-2725", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142196"} @article{bb146221, AUTHOR = "Guo, Y. and Li, Q.Z. and Zuo, W.M. and Chen, H.", TITLE = "An Intermediate-Level Attack Framework on the Basis of Linear Regression", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "3", MONTH = "March", PAGES = "2726-2735", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142197"} @article{bb146222, AUTHOR = "Qin, C. and Gao, S.Y. and Zhang, X.P. and Feng, G.R.", TITLE = "CADW: CGAN-Based Attack on Deep Robust Image Watermarking", JOURNAL = MultMedMag, VOLUME = "30", YEAR = "2023", NUMBER = "1", MONTH = "January", PAGES = "28-35", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142198"} @article{bb146223, AUTHOR = "Lin, G.Y. and Pan, Z.S. and Zhou, X.Y. and Duan, Y. and Bai, W. and Zhan, D. and Zhu, L. and Zhao, G. and Li, T.", TITLE = "Boosting Adversarial Transferability with Shallow-Feature Attack on SAR Images", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "10", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142199"} @article{bb146224, AUTHOR = "Sun, X.X. and Cheng, G. and Li, H. and Pei, L. and Han, J.W.", TITLE = "On Single-Model Transferable Targeted Attacks: A Closer Look at Decision-Level Optimization", JOURNAL = IP, VOLUME = "32", YEAR = "2023", PAGES = "2972-2984", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142200"} @article{bb146225, AUTHOR = "Pan, J.H. and Foo, L.G. and Zheng, Q.C. and Fan, Z.P. and Rahmani, H. and Ke, Q.H. and Liu, J.", TITLE = "GradMDM: Adversarial Attack on Dynamic Networks", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "9", MONTH = "September", PAGES = "11374-11381", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142201"} @inproceedings{bb146226, AUTHOR = "Pan, J.H. and Zheng, Q.C. and Fan, Z.P. and Rahmani, H. and Ke, Q.H. and Liu, J.", TITLE = "GradAuto: Energy-Oriented Attack on Dynamic Neural Networks", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "IV:637-653", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142202"} @article{bb146227, AUTHOR = "Bai, J.W. and Wu, B.Y. and Li, Z.F. and Xia, S.T.", TITLE = "Versatile Weight Attack via Flipping Limited Bits", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "13653-13665", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142203"} @article{bb146228, AUTHOR = "Zhang, S.H. and Zuo, D.X. and Yang, Y.L. and Zhang, X.W.", TITLE = "A Transferable Adversarial Belief Attack With Salient Region Perturbation Restriction", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "4296-4306", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142204"} @article{bb146229, AUTHOR = "Liang, X.Y. and Qian, Y. and Huang, J.C. and Ling, X. and Wang, B. and Wu, C.M. and Swaileh, W.", TITLE = "Towards desirable decision boundary by Moderate-Margin Adversarial Training", JOURNAL = PRL, VOLUME = "173", YEAR = "2023", PAGES = "30-37", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142205"} @article{bb146230, AUTHOR = "Zheng, S.J. and Liu, W.Q. and Shen, S.Q. and Zang, Y. and Wen, C. and Cheng, M. and Wang, C.", TITLE = "Adaptive local adversarial attacks on 3D point clouds", JOURNAL = PR, VOLUME = "144", YEAR = "2023", PAGES = "109825", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142206"} @article{bb146231, AUTHOR = "Li, Y. and Pan, Q. and Feng, Z.W. and Cambria, E.", TITLE = "Few pixels attacks with generative model", JOURNAL = PR, VOLUME = "144", YEAR = "2023", PAGES = "109849", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142207"} @article{bb146232, AUTHOR = "Xiao, Y. and Zhou, J.Z. and Chen, K.Y. and Liu, Z.B.", TITLE = "Revisiting the transferability of adversarial examples via source-agnostic adversarial feature inducing method", JOURNAL = PR, VOLUME = "144", YEAR = "2023", PAGES = "109828", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142208"} @article{bb146233, AUTHOR = "Mao, Z.S. and Lu, Y.Q. and Cheng, Z. and Shen, X.", TITLE = "Enhancing transferability of adversarial examples with pixel-level scale variation", JOURNAL = SP:IC, VOLUME = "118", YEAR = "2023", PAGES = "117020", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142209"} @article{bb146234, AUTHOR = "Sun, J.L. and Yao, W. and Jiang, T. and Chen, X.Q.", TITLE = "Efficient search of comprehensively robust neural architectures via multi-fidelity evaluation", JOURNAL = PR, VOLUME = "146", YEAR = "2024", PAGES = "110038", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142210"} @article{bb146235, AUTHOR = "Mumcu, F. and Yilmaz, Y.", TITLE = "Sequential architecture-agnostic black-box attack design and analysis", JOURNAL = PR, VOLUME = "147", YEAR = "2024", PAGES = "110066", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142211"} @article{bb146236, AUTHOR = "Chen, T. and Ma, Z.", TITLE = "Toward Robust Neural Image Compression: Adversarial Attack and Model Finetuning", JOURNAL = CirSysVideo, VOLUME = "33", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "7842-7856", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142212"} @article{bb146237, AUTHOR = "Wan, C. and Huang, F. and Zhao, X.F.", TITLE = "Average Gradient-Based Adversarial Attack", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "9572-9585", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142213"} @article{bb146238, AUTHOR = "Akers, M. and Barton, A.", TITLE = "Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning", JOURNAL = Computer, VOLUME = "57", YEAR = "2024", NUMBER = "1", MONTH = "January", PAGES = "88-99", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142214"} @article{bb146239, AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Chen, X.Q.", TITLE = "Improving Transferability of Universal Adversarial Perturbation With Feature Disruption", JOURNAL = IP, VOLUME = "33", YEAR = "2024", PAGES = "722-737", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142215"} @article{bb146240, AUTHOR = "Wei, X.X. and Zhao, S.", TITLE = "Boosting Adversarial Transferability With Learnable Patch-Wise Masks", JOURNAL = MultMed, VOLUME = "26", YEAR = "2024", PAGES = "3778-3787", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142216"} @article{bb146241, AUTHOR = "Li, J. and Wei, X.M.", TITLE = "Research on efficient detection network method for remote sensing images based on self attention mechanism", JOURNAL = IVC, VOLUME = "142", YEAR = "2024", PAGES = "104884", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142217"} @article{bb146242, AUTHOR = "Wei, X.X. and Huang, Y. and Sun, Y.T. and Yu, J.", TITLE = "Unified Adversarial Patch for Visible-Infrared Cross-Modal Attacks in the Physical World", JOURNAL = PAMI, VOLUME = "46", YEAR = "2024", NUMBER = "4", MONTH = "April", PAGES = "2348-2363", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142218"} @inproceedings{bb146243, AUTHOR = "Wei, X.X. and Huang, Y. and Sun, Y.T. and Yu, J.", TITLE = "Unified Adversarial Patch for Cross-modal Attacks in the Physical World", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4422-4431", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142219"} @article{bb146244, AUTHOR = "Ran, Y. and Wang, W.J. and Li, M.J. and Li, L.C. and Wang, Y.G. and Li, J.", TITLE = "Cross-Shaped Adversarial Patch Attack", JOURNAL = CirSysVideo, VOLUME = "34", YEAR = "2024", NUMBER = "4", MONTH = "April", PAGES = "2289-2303", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142220"} @article{bb146245, AUTHOR = "Liu, T.F. and Yang, C. and Liu, X. and Han, R.D. and Ma, J.F.", TITLE = "RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "3", MONTH = "March", PAGES = "2586-2598", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142221"} @article{bb146246, AUTHOR = "Yuan, Z. and Zhang, J. and Jiang, Z.Y. and Li, L.L. and Shan, S.G.", TITLE = "Adaptive Perturbation for Adversarial Attack", JOURNAL = PAMI, VOLUME = "46", YEAR = "2024", NUMBER = "8", MONTH = "August", PAGES = "5663-5676", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142222"} @article{bb146247, AUTHOR = "Tao, A. and Duan, Y. and Wang, Y.Q. and Lu, J.W. and Zhou, J.", TITLE = "Dynamics-Aware Adversarial Attack of Adaptive Neural Networks", JOURNAL = CirSysVideo, VOLUME = "34", YEAR = "2024", NUMBER = "7", MONTH = "July", PAGES = "5505-5518", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142223"} @article{bb146248, AUTHOR = "Li, X. and Zhu, G.P. and Wang, S. and Zhou, Y.C. and Zhang, X.P.", TITLE = "Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model", JOURNAL = CirSysVideo, VOLUME = "34", YEAR = "2024", NUMBER = "7", MONTH = "July", PAGES = "6391-6402", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142224"} @inproceedings{bb146249, AUTHOR = "Zhang, M. and Yu, N. and Wen, R. and Backes, M. and Zhang, Y.", TITLE = "Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models", BOOKTITLE = WACV24, YEAR = "2024", PAGES = "4827-4837", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142225"} @inproceedings{bb146250, AUTHOR = "Dubinski, J. and Kowalczuk, A. and Pawlak, S. and Rokita, P. and Trzcinski, T. and Morawiecki, P.", TITLE = "Towards More Realistic Membership Inference Attacks on Large Diffusion Models", BOOKTITLE = WACV24, YEAR = "2024", PAGES = "4848-4857", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142226"} @inproceedings{bb146251, AUTHOR = "Cohen, G. and Giryes, R.", TITLE = "Membership Inference Attack Using Self Influence Functions", BOOKTITLE = WACV24, YEAR = "2024", PAGES = "4880-4889", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142227"} @inproceedings{bb146252, AUTHOR = "Ledda, E. and Angioni, D. and Piras, G. and Fumera, G. and Biggio, B. and Roli, F.", TITLE = "Adversarial Attacks Against Uncertainty Quantification", BOOKTITLE = Uncertainty23, YEAR = "2023", PAGES = "4601-4610", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142228"} @inproceedings{bb146253, AUTHOR = "Tal, O.B. and Haviv, A. and Bermano, A.H.", TITLE = "OMG-Attack: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks", BOOKTITLE = AROW23, YEAR = "2023", PAGES = "3698-3708", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142229"} @inproceedings{bb146254, AUTHOR = "Ambati, R. and Akhtar, N. and Mian, A. and Rawat, Y.S.", TITLE = "PRAT: PRofiling Adversarial aTtacks", BOOKTITLE = AROW23, YEAR = "2023", PAGES = "3669-3678", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142230"} @inproceedings{bb146255, AUTHOR = "Ko, M. and Jin, M. and Wang, C.G. and Jia, R.", TITLE = "Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4848-4858", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142231"} @inproceedings{bb146256, AUTHOR = "Dong, J.S. and Qiu, H. and Li, Y.M. and Zhang, T.W. and Li, Y.J. and Lai, Z. and Zhang, C. and Xia, S.T.", TITLE = "One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4665-4675", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142232"} @inproceedings{bb146257, AUTHOR = "Ma, W.S. and Li, Y.D. and Jia, X.F. and Xu, W.", TITLE = "Transferable Adversarial Attack for Both Vision Transformers and Convolutional Networks via Momentum Integrated Gradients", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4607-4616", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142233"} @inproceedings{bb146258, AUTHOR = "Chen, X.Q. and Gao, X.T. and Zhao, J.J. and Ye, K.J. and Xu, C.Z.", TITLE = "AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4539-4549", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142234"} @inproceedings{bb146259, AUTHOR = "Zhou, T. and Ye, Q. and Luo, W.H. and Zhang, K. and Shi, Z.G. and Chen, J.M.", TITLE = "F&F Attack: Adversarial Attack against Multiple Object Trackers by Inducing False Negatives and False Positives", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4550-4560", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142235"} @inproceedings{bb146260, AUTHOR = "Qian, Y. and He, S. and Zhao, C.Y. and Sha, J.Q. and Wang, W. and Wang, B.", TITLE = "LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4487-4498", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142236"} @inproceedings{bb146261, AUTHOR = "Maho, T. and Moosavi Dezfooli, S.M. and Furon, T.", TITLE = "How to choose your best allies for a transferable attack?", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4519-4528", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142237"} @inproceedings{bb146262, AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Li, C. and Chen, X.Q.", TITLE = "RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4432-4442", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142238"} @inproceedings{bb146263, AUTHOR = "Zhou, Z.Q. and Hu, S. and Zhao, R.Z. and Wang, Q. and Zhang, L.Y. and Hou, J.H. and Jin, H.", TITLE = "Downstream-agnostic Adversarial Examples", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4322-4332", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142239"} @inproceedings{bb146264, AUTHOR = "Kim, H.S. and Son, M.J. and Kim, M. and Kwon, M.J. and Kim, C.", TITLE = "Breaking Temporal Consistency: Generating Video Universal Adversarial Perturbations Using Image Models", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4302-4311", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142240"} @inproceedings{bb146265, AUTHOR = "Stolik, T. and Lang, I. and Avidan, S.", TITLE = "SAGA: Spectral Adversarial Geometric Attack on 3D Meshes", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4261-4271", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142241"} @inproceedings{bb146266, AUTHOR = "Zeng, H. and Zhang, T. and Chen, B.W. and Peng, A.", TITLE = "Enhancing Targeted Transferability Via Suppressing High-Confidence Labels", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3309-3313", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142242"} @inproceedings{bb146267, AUTHOR = "Kim, Y. and Cho, S.J. and Byun, J. and Kwon, M.J. and Kim, C.", TITLE = "Improving Adversarial Transferability Via Feature Translation", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3359-3363", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142243"} @inproceedings{bb146268, AUTHOR = "Coscia, P. and Genovese, A. and Scotti, F. and Piuri, V.", TITLE = "Adversarial Defect Synthesis for Industrial Products in Low Data Regime", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "1360-1364", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142244"} @inproceedings{bb146269, AUTHOR = "Lin, Z. and Peng, A. and Zeng, H. and Wu, K.J. and Yu, W.X.", TITLE = "An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3439-3443", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142245"} @inproceedings{bb146270, AUTHOR = "Ma, M.Z. and Zheng, W.J. and Lv, W.L. and Ren, L. and Su, H. and Yin, Z.X.", TITLE = "Multi-Label Adversarial Attack Based on Label Correlation", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "2050-2054", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142246"} @inproceedings{bb146271, AUTHOR = "Wu, T. and Luo, T. and Wunsch, D.C.", TITLE = "GNP Attack: Transferable Adversarial Examples Via Gradient Norm Penalty", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3110-3114", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142247"} @inproceedings{bb146272, AUTHOR = "Sha, Z. and He, X.L. and Yu, N. and Backes, M. and Zhang, Y.", TITLE = "Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "16373-16383", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142248"} @inproceedings{bb146273, AUTHOR = "Feng, W.W. and Xu, N. and Zhang, T.Z. and Zhang, Y.D.", TITLE = "Dynamic Generative Targeted Attacks with Pattern Injection", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "16404-16414", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142249"} @inproceedings{bb146274, AUTHOR = "Takahashi, H. and Liu, J.J. and Liu, Y.", TITLE = "Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12198-12207", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142250"} @inproceedings{bb146275, AUTHOR = "Wei, Z.P. and Chen, J.J. and Wu, Z. and Jiang, Y.G.", TITLE = "Enhancing the Self-Universality for Transferable Targeted Attacks", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12281-12290", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142251"} @inproceedings{bb146276, AUTHOR = "Chen, W.X. and Song, D. and Li, B.", TITLE = "TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "4035-4044", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142252"} @inproceedings{bb146277, AUTHOR = "Zhuang, H.M. and Zhang, Y.H. and Liu, S.", TITLE = "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion", BOOKTITLE = AML23, YEAR = "2023", PAGES = "2385-2392", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142253"} @inproceedings{bb146278, AUTHOR = "Brown, D. and Kvinge, H.", TITLE = "Making Corgis Important for Honeycomb Classification: Adversarial Attacks on Concept-based Explainability Tools", BOOKTITLE = TAG-PRA23, YEAR = "2023", PAGES = "620-627", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142254"} @inproceedings{bb146279, AUTHOR = "Shukla, N. and Banerjee, S.", TITLE = "Generating Adversarial Attacks in the Latent Space", BOOKTITLE = GCV23, YEAR = "2023", PAGES = "730-739", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142255"} @inproceedings{bb146280, AUTHOR = "Zhang, L. and Wang, X.D.", TITLE = "Advfilter: Adversarial Example Generated by Perturbing Optical Path", BOOKTITLE = "ACCVWS22", YEAR = "2022", PAGES = "33-44", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142256"} @inproceedings{bb146281, AUTHOR = "Koren, T. and Talker, L. and Dinerstein, M. and Vitek, R.", TITLE = "Consistent Semantic Attacks on Optical Flow", BOOKTITLE = ACCV22, YEAR = "2022", PAGES = "VII:501-517", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142257"} @inproceedings{bb146282, AUTHOR = "Wu, H. and Wang, J. and Zhang, J.W. and Luo, X.Y. and Ma, B.", TITLE = "Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method", BOOKTITLE = IWDW22, YEAR = "2022", PAGES = "83-97", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142258"} @inproceedings{bb146283, AUTHOR = "Waseda, F. and Nishikawa, S. and Le, T.N. and Nguyen, H.H. and Echizen, I.", TITLE = "Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "1360-1368", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142259"} @inproceedings{bb146284, AUTHOR = "Aich, A. and Li, S. and Song, C. and Asif, M.S. and Krishnamurthy, S.V. and Roy Chowdhury, A.K.", TITLE = "Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "1308-1318", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142260"} @inproceedings{bb146285, AUTHOR = "Shapira, A. and Zolfi, A. and Demetrio, L. and Biggio, B. and Shabtai, A.", TITLE = "Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "4560-4569", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142261"} @inproceedings{bb146286, AUTHOR = "Tan, H.X. and Kotthaus, H.", TITLE = "Explainability-Aware One Point Attack for Point Cloud Neural Networks", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "4570-4579", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142262"} @inproceedings{bb146287, AUTHOR = "Chen, C.C. and Zhu, W.J. and Peng, B. and Lu, H.J.", TITLE = "Towards Robust Community Detection via Extreme Adversarial Attacks", BOOKTITLE = "ICPR22", YEAR = "2022", PAGES = "2231-2237", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142263"} @inproceedings{bb146288, AUTHOR = "Tavallali, P. and Behzadan, V. and Alizadeh, A. and Ranganath, A. and Singhal, M.", TITLE = "Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3717-3722", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142264"} @inproceedings{bb146289, AUTHOR = "Lin, Z. and Peng, A. and Wei, R. and Yu, W.X. and Zeng, H.", TITLE = "An Enhanced Transferable Adversarial Attack of Scale-Invariant Methods", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3788-3792", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142265"} @inproceedings{bb146290, AUTHOR = "Ran, Y. and Wang, Y.G.", TITLE = "Sign-OPT+: An Improved Sign Optimization Adversarial Attack", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "461-465", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142266"} @inproceedings{bb146291, AUTHOR = "Wang, D. and Lin, J. and Wang, Y.G.", TITLE = "Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "546-550", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142267"} @inproceedings{bb146292, AUTHOR = "Aneja, S. and Markhasin, L. and Nießner, M.", TITLE = "TAFIM: Targeted Adversarial Attacks Against Facial Image Manipulations", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "XIV:58-75", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142268"} @inproceedings{bb146293, AUTHOR = "Long, Y.Y. and Zhang, Q.L. and Zeng, B. and Gao, L.L. and Liu, X.L. and Zhang, J. and Song, J.K.", TITLE = "Frequency Domain Model Augmentation for Adversarial Attack", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "IV:549-566", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142269"} @inproceedings{bb146294, AUTHOR = "Yuan, Z. and Zhang, J. and Shan, S.G.", TITLE = "Adaptive Image Transformations for Transfer-Based Adversarial Attack", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:1-17", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142270"} @inproceedings{bb146295, AUTHOR = "Cao, Y.L. and Xiao, C.W. and Anandkumar, A. and Xu, D. and Pavone, M.", TITLE = "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:36-52", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142271"} @inproceedings{bb146296, AUTHOR = "Bai, J.W. and Gao, K.F. and Gong, D.H. and Xia, S.T. and Li, Z.F. and Liu, W.", TITLE = "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:104-121", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142272"} @inproceedings{bb146297, AUTHOR = "Liu, G. and Huang, X.W. and Yi, X.P.", TITLE = "Adversarial Label Poisoning Attack on Graph Neural Networks via Label Propagation", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:227-243", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142273"} @inproceedings{bb146298, AUTHOR = "Byun, J. and Shim, K. and Go, H. and Kim, C.", TITLE = "Hidden Conditional Adversarial Attacks", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "1306-1310", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142274"} @inproceedings{bb146299, AUTHOR = "Son, M.J. and Kwon, M.J. and Kim, H.S. and Byun, J. and Cho, S. and Kim, C.", TITLE = "Adaptive Warping Network for Transferable Adversarial Attacks", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3056-3060", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142275"}