@inproceedings{bb146300, AUTHOR = "Cao, X.Y. and Gong, N.Z.Q.", TITLE = "MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients", BOOKTITLE = FedVision22, YEAR = "2022", PAGES = "3395-3403", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142276"} @inproceedings{bb146301, AUTHOR = "Xu, Q.L. and Tao, G.H. and Zhang, X.Y.", TITLE = "Bounded Adversarial Attack on Deep Content Features", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15182-15191", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142277"} @inproceedings{bb146302, AUTHOR = "Luo, C. and Lin, Q.L. and Xie, W.C. and Wu, B.Z. and Xie, J.H. and Shen, L.L.", TITLE = "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15294-15303", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142278"} @inproceedings{bb146303, AUTHOR = "Suryanto, N. and Kim, Y. and Kang, H. and Larasati, H.T. and Yun, Y.Y. and Le, T.T.H. and Yang, H. and Oh, S.Y. and Kim, H.", TITLE = "DTA: Physical Camouflage Attacks using Differentiable Transformation Network", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15284-15293", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142279"} @inproceedings{bb146304, AUTHOR = "Zhong, Y.Q. and Liu, X.M. and Zhai, D. and Jiang, J.J. and Ji, X.Y.", TITLE = "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15324-15333", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142280"} @inproceedings{bb146305, AUTHOR = "Tong, A.C.H.", TITLE = "Symmetric adversarial poisoning against deep learning", BOOKTITLE = IPTA20, YEAR = "2020", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142281"} @inproceedings{bb146306, AUTHOR = "Li, Y.M. and Wen, C.C. and Juefei Xu, F. and Feng, C.", TITLE = "Fooling LiDAR Perception via Adversarial Trajectory Perturbation", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7878-7887", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142282"} @inproceedings{bb146307, AUTHOR = "Wang, X.S. and He, X.R. and Wang, J.D. and He, K.", TITLE = "Admix: Enhancing the Transferability of Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16138-16147", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142283"} @inproceedings{bb146308, AUTHOR = "Chen, S. and Kahla, M. and Jia, R. and Qi, G.J.", TITLE = "Knowledge-Enriched Distributional Model Inversion Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16158-16167", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142284"} @inproceedings{bb146309, AUTHOR = "Zhou, M. and Wang, L. and Niu, Z.X. and Zhang, Q.L. and Xu, Y.H. and Zheng, N.N. and Hua, G.", TITLE = "Practical Relative Order Attack in Deep Ranking", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16393-16402", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142285"} @inproceedings{bb146310, AUTHOR = "Shafran, A. and Peleg, S. and Hoshen, Y.", TITLE = "Membership Inference Attacks are Easier on Difficult Problems", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "14800-14809", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142286"} @inproceedings{bb146311, AUTHOR = "Naseer, M. and Khan, S. and Hayat, M. and Khan, F.S. and Porikli, F.M.", TITLE = "On Generating Transferable Targeted Perturbations", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7688-7697", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142287"} @inproceedings{bb146312, AUTHOR = "Chen, H. and Fu, C. and Zhao, J. and Koushanfar, F.", TITLE = "ProFlip: Targeted Trojan Attack with Progressive Bit Flips", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7698-7707", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142288"} @inproceedings{bb146313, AUTHOR = "Rony, J. and Granger, E. and Pedersoli, M. and Ayed, I.B.", TITLE = "Augmented Lagrangian Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7718-7727", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142289"} @inproceedings{bb146314, AUTHOR = "Yuan, Z. and Zhang, J. and Jia, Y. and Tan, C. and Xue, T. and Shan, S.G.", TITLE = "Meta Gradient Adversarial Attack", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7728-7737", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142290"} @inproceedings{bb146315, AUTHOR = "Park, G.Y. and Lee, S.W.", TITLE = "Reliably fast adversarial training via latent adversarial perturbation", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7738-7747", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142291"} @inproceedings{bb146316, AUTHOR = "Tu, J. and Wang, T. and Wang, J.K. and Manivasagam, S. and Ren, M. and Urtasun, R.", TITLE = "Adversarial Attacks On Multi-Agent Communication", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7748-7757", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142292"} @inproceedings{bb146317, AUTHOR = "Feng, W.W. and Wu, B.Y. and Zhang, T.Z. and Zhang, Y. and Zhang, Y.D.", TITLE = "Meta-Attack: Class-agnostic and Model-agnostic Physical Adversarial Attack", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7767-7776", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142293"} @inproceedings{bb146318, AUTHOR = "Kim, J.Y. and Hua, B.S. and Nguyen, D.T. and Yeung, S.K.", TITLE = "Minimal Adversarial Examples for Deep Learning on 3D Point Clouds", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7777-7786", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142294"} @inproceedings{bb146319, AUTHOR = "Stutz, D. and Hein, M. and Schiele, B.", TITLE = "Relating Adversarially Robust Generalization to Flat Minima", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7787-7797", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142295"} @inproceedings{bb146320, AUTHOR = "Li, C. and Gao, S.Q. and Deng, C. and Liu, W. and Huang, H.", TITLE = "Adversarial Attack on Deep Cross-Modal Hamming Retrieval", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "2198-2207", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142296"} @inproceedings{bb146321, AUTHOR = "Duan, R.J. and Chen, Y.F. and Niu, D. and Yang, Y. and Qin, A.K. and He, Y.", TITLE = "AdvDrop: Adversarial Attack to DNNs by Dropping Information", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7486-7495", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142297"} @inproceedings{bb146322, AUTHOR = "Hwang, J. and Kim, J.H. and Choi, J.H. and Lee, J.S.", TITLE = "Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame Attack", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7648-7656", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142298"} @inproceedings{bb146323, AUTHOR = "Moayeri, M. and Feizi, S.", TITLE = "Sample Efficient Detection and Classification of Adversarial Attacks via Self-Supervised Embeddings", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7657-7666", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142299"} @inproceedings{bb146324, AUTHOR = "Wang, Z.B. and Guo, H.C. and Zhang, Z.F. and Liu, W.X. and Qin, Z. and Ren, K.", TITLE = "Feature Importance-aware Transferable Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7619-7628", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142300"} @inproceedings{bb146325, AUTHOR = "Wang, X. and Lin, S.Y. and Zhang, H. and Zhu, Y.F. and Zhang, Q.S.", TITLE = "Interpreting Attributions and Interactions of Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "1075-1084", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142301"} @inproceedings{bb146326, AUTHOR = "Kumar, C. and Kumar, D. and Shao, M.", TITLE = "Generative Adversarial Attack on Ensemble Clustering", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "3839-3848", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142302"} @inproceedings{bb146327, AUTHOR = "Du, A. and Chen, B. and Chin, T.J. and Law, Y.W. and Sasdelli, M. and Rajasegaran, R. and Campbell, D.", TITLE = "Physical Adversarial Attacks on an Aerial Imagery Object Detector", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "3798-3808", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142303"} @inproceedings{bb146328, AUTHOR = "Zhao, B.Y. and Lao, Y.J.", TITLE = "Towards Class-Oriented Poisoning Attacks Against Neural Networks", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "2244-2253", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142304"} @inproceedings{bb146329, AUTHOR = "Chen, Z.H. and Wang, C.H. and Crandall, D.", TITLE = "Semantically Stealthy Adversarial Attacks against Segmentation Models", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "2846-2855", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142305"} @inproceedings{bb146330, AUTHOR = "Yin, M.J. and Li, S. and Song, C.Y. and Asif, M.S. and Roy Chowdhury, A.K. and Krishnamurthy, S.V.", TITLE = "ADC: Adversarial attacks against object Detection that evade Context consistency checks", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "2836-2845", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142306"} @inproceedings{bb146331, AUTHOR = "Li, X.R. and Cui, W.Y. and Huang, J.W. and Wang, W.Y. and Chen, J.W.", TITLE = "Regularized Intermediate Layers Attack: Adversarial Examples With High Transferability", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "1904-1908", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142307"} @inproceedings{bb146332, AUTHOR = "Bai, T. and Zhao, J. and Zhu, J.L. and Han, S.D. and Chen, J.F. and Li, B. and Kot, A.", TITLE = "AI-GAN: Attack-Inspired Generation of Adversarial Examples", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "2543-2547", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142308"} @inproceedings{bb146333, AUTHOR = "Abdelfattah, M. and Yuan, K.W. and Wang, Z.J. and Ward, R.", TITLE = "Towards Universal Physical Attacks on Cascaded Camera-Lidar 3d Object Detection Models", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "3592-3596", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142309"} @inproceedings{bb146334, AUTHOR = "Gurulingan, N.K. and Arani, E. and Zonooz, B.", TITLE = "UniNet: A Unified Scene Understanding Network and Exploring Multi-Task Relationships through the Lens of Adversarial Attacks", BOOKTITLE = DeepMTL21, YEAR = "2021", PAGES = "2239-2248", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142310"} @inproceedings{bb146335, AUTHOR = "Ding, Y.Z. and Thakur, N. and Li, B.X.", TITLE = "AdvFoolGen: Creating Persistent Troubles for Deep Classifiers", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "142-151", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142311"} @inproceedings{bb146336, AUTHOR = "Boloor, A. and Wu, T. and Naughton, P. and Chakrabarti, A. and Zhang, X. and Vorobeychik, Y.", TITLE = "Can Optical Trojans Assist Adversarial Perturbations?", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "122-131", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142312"} @inproceedings{bb146337, AUTHOR = "Gnanasambandam, A. and Sherman, A.M. and Chan, S.H.", TITLE = "Optical Adversarial Attack", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "92-101", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142313"} @inproceedings{bb146338, AUTHOR = "Lennon, M. and Drenkow, N. and Burlina, P.", TITLE = "Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "112-121", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142314"} @inproceedings{bb146339, AUTHOR = "Yu, Y.R. and Gao, X.T. and Xu, C.Z.", TITLE = "LAFEAT: Piercing Through Adversarial Defenses with Latent Features", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "5731-5741", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142315"} @inproceedings{bb146340, AUTHOR = "Wang, X.S. and He, K.", TITLE = "Enhancing the Transferability of Adversarial Attacks through Variance Tuning", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "1924-1933", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142316"} @inproceedings{bb146341, AUTHOR = "Pony, R. and Naeh, I. and Mannor, S.", TITLE = "Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "515-524", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142317"} @inproceedings{bb146342, AUTHOR = "Rampini, A. and Pestarini, F. and Cosmo, L. and Melzi, S. and Rodola, E.", TITLE = "Universal Spectral Adversarial Attacks for Deformable Shapes", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "3215-3225", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142318"} @inproceedings{bb146343, AUTHOR = "Rezaei, S. and Liu, X.", TITLE = "On the Difficulty of Membership Inference Attacks", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "7888-7896", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142319"} @inproceedings{bb146344, AUTHOR = "Kariyappa, S. and Prakash, A. and Qureshi, M.K.", TITLE = "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "13809-13818", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142320"} @inproceedings{bb146345, AUTHOR = "Duan, R.J. and Mao, X.F. and Qin, A.K. and Chen, Y.F. and Ye, S. and He, Y. and Yang, Y.", TITLE = "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "16057-16066", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142321"} @inproceedings{bb146346, AUTHOR = "Chen, Z.K. and Xie, L.X. and Pang, S.M. and He, Y. and Tian, Q.", TITLE = "Appending Adversarial Frames for Universal Video Attack", BOOKTITLE = WACV21, YEAR = "2021", PAGES = "3198-3207", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142322"} @inproceedings{bb146347, AUTHOR = "Cancela, B. and Bolon Canedo, V. and Alonso Betanzos, A.", TITLE = "A delayed Elastic-Net approach for performing adversarial attacks", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "378-384", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142323"} @inproceedings{bb146348, AUTHOR = "Li, X.C. and Zhang, X.Y. and Yin, F. and Liu, C.L.", TITLE = "F-mixup: Attack CNNs From Fourier Perspective", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "541-548", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142324"} @inproceedings{bb146349, AUTHOR = "Grosse, K. and Smith, M.T. and Backes, M.", TITLE = "Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "4696-4703", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142325"} @inproceedings{bb146350, AUTHOR = "Barati, R. and Safabakhsh, R. and Rahmati, M.", TITLE = "Towards Explaining Adversarial Examples Phenomenon in Artificial Neural Networks", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "7036-7042", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142326"} @inproceedings{bb146351, AUTHOR = "Li, W.J. and Tondi, B. and Ni, R.R. and Barni, M.", TITLE = "Increased-confidence Adversarial Examples for Deep Learning Counter-forensics", BOOKTITLE = MMForWild20, YEAR = "2020", PAGES = "411-424", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142327"} @inproceedings{bb146352, AUTHOR = "Dong, X.S. and Liu, H. and Ji, R.R. and Cao, L.J. and Ye, Q.X. and Liu, J.Z. and Tian, Q.", TITLE = "API-net: Robust Generative Classifier via a Single Discriminator", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XIII:379-394", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142328"} @inproceedings{bb146353, AUTHOR = "Liu, A.S. and Huang, T.R. and Liu, X.L. and Xu, Y.T. and Ma, Y.Q. and Chen, X.Y. and Maybank, S.J. and Tao, D.C.", TITLE = "Spatiotemporal Attacks for Embodied Agents", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XVII:122-138", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142329"} @inproceedings{bb146354, AUTHOR = "Fan, Y.B. and Wu, B.Y. and Li, T.H. and Zhang, Y. and Li, M.Y. and Li, Z.F. and Yang, Y.J.", TITLE = "Sparse Adversarial Attack via Perturbation Factorization", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXII:35-50", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142330"} @inproceedings{bb146355, AUTHOR = "Guo, J.F. and Liu, C.", TITLE = "Practical Poisoning Attacks on Neural Networks", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXVII:142-158", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142331"} @inproceedings{bb146356, AUTHOR = "Costales, R. and Mao, C. and Norwitz, R. and Kim, B. and Yang, J.", TITLE = "Live Trojan Attacks on Deep Neural Networks", BOOKTITLE = AML-CV20, YEAR = "2020", PAGES = "3460-3469", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142332"} @inproceedings{bb146357, AUTHOR = "Haque, M. and Chauhan, A. and Liu, C. and Yang, W.", TITLE = "ILFO: Adversarial Attack on Adaptive Neural Networks", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "14252-14261", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142333"} @inproceedings{bb146358, AUTHOR = "Zhou, M. and Wu, J. and Liu, Y. and Liu, S. and Zhu, C.", TITLE = "DaST: Data-Free Substitute Training for Adversarial Attacks", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "231-240", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142334"} @inproceedings{bb146359, AUTHOR = "Ganeshan, A. and Vivek, B.S. and Radhakrishnan, V.B.", TITLE = "FDA: Feature Disruptive Attack", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "8068-8078", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142335"} @inproceedings{bb146360, AUTHOR = "Han, J. and Dong, X. and Zhang, R. and Chen, D. and Zhang, W. and Yu, N. and Luo, P. and Wang, X.", TITLE = "Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "5157-5166", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142336"} @inproceedings{bb146361, AUTHOR = "Deng, Y. and Karam, L.J.", TITLE = "Universal Adversarial Attack Via Enhanced Projected Gradient Descent", BOOKTITLE = ICIP20, YEAR = "2020", PAGES = "1241-1245", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142337"} @inproceedings{bb146362, AUTHOR = "Sun, C. and Chen, S. and Cai, J. and Huang, X.", TITLE = "Type I Attack For Generative Models", BOOKTITLE = ICIP20, YEAR = "2020", PAGES = "593-597", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142338"} @inproceedings{bb146363, AUTHOR = "Braunegg, A. and Chakraborty, A. and Krumdick, M. and Lape, N. and Leary, S. and Manville, K. and Merkhofer, E. and Strickhart, L. and Walmer, M.", TITLE = "Apricot: A Dataset of Physical Adversarial Attacks on Object Detection", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXI:35-50", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142339"} @inproceedings{bb146364, AUTHOR = "Zhang, H. and Zhu, L.C. and Zhu, Y. and Yang, Y.", TITLE = "Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XX:240-256", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142340"} @inproceedings{bb146365, AUTHOR = "Gao, L.L. and Zhang, Q.L. and Song, J.K. and Liu, X.L. and Shen, H.T.", TITLE = "Patch-wise Attack for Fooling Deep Neural Network", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXVIII:307-322", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142341"} @inproceedings{bb146366, AUTHOR = "Bai, J.W. and Chen, B. and Li, Y.M. and Wu, D.X. and Guo, W.W. and Xia, S.T. and Yang, E.H.", TITLE = "Targeted Attack for Deep Hashing Based Retrieval", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "I:618-634", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142342"} @inproceedings{bb146367, AUTHOR = "Nakka, K.K. and Salzmann, M.", TITLE = "Indirect Local Attacks for Context-aware Semantic Segmentation Networks", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "V:611-628", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142343"} @inproceedings{bb146368, AUTHOR = "Wu, Z.X. and Lim, S.N. and Davis, L.S. and Goldstein, T.", TITLE = "Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "IV:1-17", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142344"} @inproceedings{bb146369, AUTHOR = "Li, Q.Z. and Guo, Y.W. and Chen, H.", TITLE = "Yet Another Intermediate-level Attack", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XVI: 241-257", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142345"} @inproceedings{bb146370, AUTHOR = "Li, M. and Deng, C. and Li, T. and Yan, J. and Gao, X. and Huang, H.", TITLE = "Towards Transferable Targeted Attack", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "638-646", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142346"} @inproceedings{bb146371, AUTHOR = "Gupta, S. and Dube, P. and Verma, A.", TITLE = "Improving the affordability of robustness training for DNNs", BOOKTITLE = AML-CV20, YEAR = "2020", PAGES = "3383-3392", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142347"} @inproceedings{bb146372, AUTHOR = "Zhang, Z. and Wu, T.", TITLE = "Learning Ordered Top-k Adversarial Attacks via Adversarial Distillation", BOOKTITLE = AML-CV20, YEAR = "2020", PAGES = "3364-3373", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142348"} @inproceedings{bb146373, AUTHOR = "Chen, X. and Yan, X. and Zheng, F. and Jiang, Y. and Xia, S. and Zhao, Y. and Ji, R.", TITLE = "One-Shot Adversarial Attacks on Visual Tracking With Dual Attention", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "10173-10182", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142349"} @inproceedings{bb146374, AUTHOR = "Zhou, H. and Chen, D. and Liao, J. and Chen, K. and Dong, X. and Liu, K. and Zhang, W. and Hua, G. and Yu, N.", TITLE = "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "10353-10362", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142350"} @inproceedings{bb146375, AUTHOR = "Machiraju, H. and Balasubramanian, V.N.", TITLE = "A Little Fog for a Large Turn", BOOKTITLE = WACV20, YEAR = "2020", PAGES = "2891-2900", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142351"} @inproceedings{bb146376, AUTHOR = "Yang, C.H. and Liu, Y. and Chen, P. and Ma, X. and Tsai, Y.J.", TITLE = "When Causal Intervention Meets Adversarial Examples and Image Masking for Deep Neural Networks", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "3811-3815", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142352"} @inproceedings{bb146377, AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.", TITLE = "Image Decomposition and Classification Through a Generative Model", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "400-404", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142353"} @inproceedings{bb146378, AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.", TITLE = "Universal Perturbation Attack Against Image Retrieval", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "4898-4907", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142354"} @inproceedings{bb146379, AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.", TITLE = "The LogBarrier Adversarial Attack: Making Effective Use of Decision Boundary Information", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "4861-4869", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142355"} @inproceedings{bb146380, AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.", TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation", BOOKTITLE = NeruArch19, YEAR = "2019", PAGES = "2045-2048", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142356"} @inproceedings{bb146381, AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.", TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to Output-Size Specifications", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "12252-12261", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142357"} @inproceedings{bb146382, AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.", TITLE = "SparseFool: A Few Pixels Make a Big Difference", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "9079-9088", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142358"} @inproceedings{bb146383, AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.", TITLE = "Trust Region Based Adversarial Attack on Neural Networks", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "11342-11351", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142359"} @inproceedings{bb146384, AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.", TITLE = "Adversarial Attacks Beyond the Image Space", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "4297-4306", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142360"} @inproceedings{bb146385, AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.", TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect Adversarial Attacks?", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "4752-4761", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142361"} @inproceedings{bb146386, AUTHOR = "Liu, X.Q. and Hsieh, C.J.", TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "11226-11235", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142362"} @inproceedings{bb146387, AUTHOR = "Gupta, P. and Rahtu, E.", TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks", BOOKTITLE = GCPR19, YEAR = "2019", PAGES = "401-413", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142363"} @inproceedings{bb146388, AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.", TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine", BOOKTITLE = IWDW18, YEAR = "2018", PAGES = "83-92", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142364"} @inproceedings{bb146389, AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.", TITLE = "Fooling Vision and Language Models Despite Localization and Attention Mechanism", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "4951-4961", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142365"} @inproceedings{bb146390, AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.", TITLE = "Boosting Adversarial Attacks with Momentum", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "9185-9193", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142366"} @inproceedings{bb146391, AUTHOR = "Eykholt, K. and Evtimov, I. and Fernandes, E. and Li, B. and Rahmati, A. and Xiao, C. and Prakash, A. and Kohno, T. and Song, D.", TITLE = "Robust Physical-World Attacks on Deep Learning Visual Classification", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "1625-1634", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT142367"} @article{bb146392, AUTHOR = "Zhang, J. and Chen, D.D. and Huang, Q.D. and Liao, J. and Zhang, W.M. and Feng, H.M. and Hua, G. and Yu, N.H.", TITLE = "Poison Ink: Robust and Invisible Backdoor Attack", JOURNAL = IP, VOLUME = "31", YEAR = "2022", PAGES = "5691-5705", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142368"} @article{bb146393, AUTHOR = "Gao, Y.H. and Li, Y.M. and Zhu, L. and Wu, D.X. and Jiang, Y. and Xia, S.T.", TITLE = "Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks", JOURNAL = PR, VOLUME = "139", YEAR = "2023", PAGES = "109512", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142369"} @article{bb146394, AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y.H. and Guo, J.X.", TITLE = "Robust Feature-Guided Generative Adversarial Network for Aerial Image Semantic Segmentation against Backdoor Attacks", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "10", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142370"} @article{bb146395, AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y.H.", TITLE = "Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "6", PAGES = "1690", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142371"} @article{bb146396, AUTHOR = "Wang, Z. and Wang, B.H. and Zhang, C.L. and Liu, Y.H. and Guo, J.X.", TITLE = "Defending against Poisoning Attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "12", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142372"} @article{bb146397, AUTHOR = "Ma, Q.L. and Qin, J.P. and Yan, K. and Wang, L. and Sun, H.", TITLE = "Stealthy Frequency-Domain Backdoor Attacks: Fourier Decomposition and Fundamental Frequency Injection", JOURNAL = SPLetters, VOLUME = "30", YEAR = "2023", PAGES = "1677-1681", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142373"} @article{bb146398, AUTHOR = "Zhang, Z. and Yuan, X. and Zhu, L. and Song, J.K. and Nie, L.Q.", TITLE = "BadCM: Invisible Backdoor Attack Against Cross-Modal Learning", JOURNAL = IP, VOLUME = "33", YEAR = "2024", PAGES = "2558-2571", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142374"} @article{bb146399, AUTHOR = "Wang, K.Y. and Deng, H.X. and Xu, Y.J. and Liu, Z. and Fang, Y.", TITLE = "Multi-target label backdoor attacks on graph neural networks", JOURNAL = PR, VOLUME = "152", YEAR = "2024", PAGES = "110449", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT142375"}