@inproceedings{bb160000,
        AUTHOR = "Du, A. and Chen, B. and Chin, T.J. and Law, Y.W. and Sasdelli, M. and Rajasegaran, R. and Campbell, D.",
        TITLE = "Physical Adversarial Attacks on an Aerial Imagery Object Detector",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "3798-3808",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155899"}

@inproceedings{bb160001,
        AUTHOR = "Zhao, B.Y. and Lao, Y.J.",
        TITLE = "Towards Class-Oriented Poisoning Attacks Against Neural Networks",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "2244-2253",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155900"}

@inproceedings{bb160002,
        AUTHOR = "Chen, Z.H. and Wang, C.H. and Crandall, D.",
        TITLE = "Semantically Stealthy Adversarial Attacks against Segmentation Models",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "2846-2855",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155901"}

@inproceedings{bb160003,
        AUTHOR = "Yin, M.J. and Li, S. and Song, C.Y. and Asif, M.S. and Roy Chowdhury, A.K. and Krishnamurthy, S.V.",
        TITLE = "ADC: Adversarial attacks against object Detection that evade Context
consistency checks",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "2836-2845",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155902"}

@inproceedings{bb160004,
        AUTHOR = "Li, X.R. and Cui, W.Y. and Huang, J.W. and Wang, W.Y. and Chen, J.W.",
        TITLE = "Regularized Intermediate Layers Attack:
Adversarial Examples With High Transferability",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "1904-1908",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155903"}

@inproceedings{bb160005,
        AUTHOR = "Bai, T. and Zhao, J. and Zhu, J.L. and Han, S.D. and Chen, J.F. and Li, B. and Kot, A.",
        TITLE = "AI-GAN: Attack-Inspired Generation of Adversarial Examples",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "2543-2547",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155904"}

@inproceedings{bb160006,
        AUTHOR = "Abdelfattah, M. and Yuan, K.W. and Wang, Z.J. and Ward, R.",
        TITLE = "Towards Universal Physical Attacks on Cascaded Camera-Lidar 3d Object
Detection Models",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "3592-3596",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155905"}

@inproceedings{bb160007,
        AUTHOR = "Gurulingan, N.K. and Arani, E. and Zonooz, B.",
        TITLE = "UniNet: A Unified Scene Understanding Network and Exploring
Multi-Task Relationships through the Lens of Adversarial Attacks",
        BOOKTITLE = DeepMTL21,
        YEAR = "2021",
        PAGES = "2239-2248",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155906"}

@inproceedings{bb160008,
        AUTHOR = "Ding, Y.Z. and Thakur, N. and Li, B.X.",
        TITLE = "AdvFoolGen: Creating Persistent Troubles for Deep Classifiers",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "142-151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155907"}

@inproceedings{bb160009,
        AUTHOR = "Boloor, A. and Wu, T. and Naughton, P. and Chakrabarti, A. and Zhang, X. and Vorobeychik, Y.",
        TITLE = "Can Optical Trojans Assist Adversarial Perturbations?",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "122-131",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155908"}

@inproceedings{bb160010,
        AUTHOR = "Gnanasambandam, A. and Sherman, A.M. and Chan, S.H.",
        TITLE = "Optical Adversarial Attack",
        BOOKTITLE = AROW21,
        YEAR = "2021",
        PAGES = "92-101",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155909"}

@inproceedings{bb160011,
        AUTHOR = "Yu, Y.R. and Gao, X.T. and Xu, C.Z.",
        TITLE = "LAFEAT: Piercing Through Adversarial Defenses with Latent Features",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "5731-5741",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155910"}

@inproceedings{bb160012,
        AUTHOR = "Wang, X.S. and He, K.",
        TITLE = "Enhancing the Transferability of Adversarial Attacks through Variance
Tuning",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "1924-1933",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155911"}

@inproceedings{bb160013,
        AUTHOR = "Pony, R. and Naeh, I. and Mannor, S.",
        TITLE = "Over-the-Air Adversarial Flickering Attacks against Video Recognition
Networks",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "515-524",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155912"}

@inproceedings{bb160014,
        AUTHOR = "Rampini, A. and Pestarini, F. and Cosmo, L. and Melzi, S. and Rodola, E.",
        TITLE = "Universal Spectral Adversarial Attacks for Deformable Shapes",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "3215-3225",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155913"}

@inproceedings{bb160015,
        AUTHOR = "Rezaei, S. and Liu, X.",
        TITLE = "On the Difficulty of Membership Inference Attacks",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "7888-7896",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155914"}

@inproceedings{bb160016,
        AUTHOR = "Kariyappa, S. and Prakash, A. and Qureshi, M.K.",
        TITLE = "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient
Estimation",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "13809-13818",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155915"}

@inproceedings{bb160017,
        AUTHOR = "Duan, R.J. and Mao, X.F. and Qin, A.K. and Chen, Y.F. and Ye, S. and He, Y. and Yang, Y.",
        TITLE = "Adversarial Laser Beam:
Effective Physical-World Attack to DNNs in a Blink",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "16057-16066",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155916"}

@inproceedings{bb160018,
        AUTHOR = "Chen, Z.K. and Xie, L.X. and Pang, S.M. and He, Y. and Tian, Q.",
        TITLE = "Appending Adversarial Frames for Universal Video Attack",
        BOOKTITLE = WACV21,
        YEAR = "2021",
        PAGES = "3198-3207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155917"}

@inproceedings{bb160019,
        AUTHOR = "Cancela, B. and Bolon Canedo, V. and Alonso Betanzos, A.",
        TITLE = "A delayed Elastic-Net approach for performing adversarial attacks",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "378-384",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155918"}

@inproceedings{bb160020,
        AUTHOR = "Li, X.C. and Zhang, X.Y. and Yin, F. and Liu, C.L.",
        TITLE = "F-mixup: Attack CNNs From Fourier Perspective",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "541-548",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155919"}

@inproceedings{bb160021,
        AUTHOR = "Grosse, K. and Smith, M.T. and Backes, M.",
        TITLE = "Killing Four Birds with one Gaussian Process:
The Relation between different Test-Time Attacks",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "4696-4703",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155920"}

@inproceedings{bb160022,
        AUTHOR = "Barati, R. and Safabakhsh, R. and Rahmati, M.",
        TITLE = "Towards Explaining Adversarial Examples Phenomenon in Artificial
Neural Networks",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "7036-7042",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155921"}

@inproceedings{bb160023,
        AUTHOR = "Li, W.J. and Tondi, B. and Ni, R.R. and Barni, M.",
        TITLE = "Increased-confidence Adversarial Examples for Deep Learning
Counter-forensics",
        BOOKTITLE = MMForWild20,
        YEAR = "2020",
        PAGES = "411-424",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155922"}

@inproceedings{bb160024,
        AUTHOR = "Dong, X.S. and Liu, H. and Ji, R.R. and Cao, L.J. and Ye, Q.X. and Liu, J.Z. and Tian, Q.",
        TITLE = "API-net: Robust Generative Classifier via a Single Discriminator",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XIII:379-394",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155923"}

@inproceedings{bb160025,
        AUTHOR = "Liu, A.S. and Huang, T.R. and Liu, X.L. and Xu, Y.T. and Ma, Y.Q. and Chen, X.Y. and Maybank, S.J. and Tao, D.C.",
        TITLE = "Spatiotemporal Attacks for Embodied Agents",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XVII:122-138",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155924"}

@inproceedings{bb160026,
        AUTHOR = "Fan, Y.B. and Wu, B.Y. and Li, T.H. and Zhang, Y. and Li, M.Y. and Li, Z.F. and Yang, Y.J.",
        TITLE = "Sparse Adversarial Attack via Perturbation Factorization",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXII:35-50",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155925"}

@inproceedings{bb160027,
        AUTHOR = "Guo, J.F. and Liu, C.",
        TITLE = "Practical Poisoning Attacks on Neural Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVII:142-158",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155926"}

@inproceedings{bb160028,
        AUTHOR = "Costales, R. and Mao, C. and Norwitz, R. and Kim, B. and Yang, J.",
        TITLE = "Live Trojan Attacks on Deep Neural Networks",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3460-3469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155927"}

@inproceedings{bb160029,
        AUTHOR = "Haque, M. and Chauhan, A. and Liu, C. and Yang, W.",
        TITLE = "ILFO: Adversarial Attack on Adaptive Neural Networks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "14252-14261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155928"}

@inproceedings{bb160030,
        AUTHOR = "Zhou, M. and Wu, J. and Liu, Y. and Liu, S. and Zhu, C.",
        TITLE = "DaST: Data-Free Substitute Training for Adversarial Attacks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "231-240",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155929"}

@inproceedings{bb160031,
        AUTHOR = "Ganeshan, A. and Vivek, B.S. and Radhakrishnan, V.B.",
        TITLE = "FDA: Feature Disruptive Attack",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "8068-8078",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155930"}

@inproceedings{bb160032,
        AUTHOR = "Han, J. and Dong, X. and Zhang, R. and Chen, D. and Zhang, W. and Yu, N. and Luo, P. and Wang, X.",
        TITLE = "Once a MAN: Towards Multi-Target Attack via Learning Multi-Target
Adversarial Network Once",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "5157-5166",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155931"}

@inproceedings{bb160033,
        AUTHOR = "Deng, Y. and Karam, L.J.",
        TITLE = "Universal Adversarial Attack Via Enhanced Projected Gradient Descent",
        BOOKTITLE = ICIP20,
        YEAR = "2020",
        PAGES = "1241-1245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155932"}

@inproceedings{bb160034,
        AUTHOR = "Sun, C. and Chen, S. and Cai, J. and Huang, X.",
        TITLE = "Type I Attack For Generative Models",
        BOOKTITLE = ICIP20,
        YEAR = "2020",
        PAGES = "593-597",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155933"}

@inproceedings{bb160035,
        AUTHOR = "Braunegg, A. and Chakraborty, A. and Krumdick, M. and Lape, N. and Leary, S. and Manville, K. and Merkhofer, E. and Strickhart, L. and Walmer, M.",
        TITLE = "Apricot: A Dataset of Physical Adversarial Attacks on Object Detection",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXI:35-50",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155934"}

@inproceedings{bb160036,
        AUTHOR = "Zhang, H. and Zhu, L.C. and Zhu, Y. and Yang, Y.",
        TITLE = "Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XX:240-256",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155935"}

@inproceedings{bb160037,
        AUTHOR = "Gao, L.L. and Zhang, Q.L. and Song, J.K. and Liu, X.L. and Shen, H.T.",
        TITLE = "Patch-wise Attack for Fooling Deep Neural Network",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVIII:307-322",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155936"}

@inproceedings{bb160038,
        AUTHOR = "Bai, J.W. and Chen, B. and Li, Y.M. and Wu, D.X. and Guo, W.W. and Xia, S.T. and Yang, E.H.",
        TITLE = "Targeted Attack for Deep Hashing Based Retrieval",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "I:618-634",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155937"}

@inproceedings{bb160039,
        AUTHOR = "Nakka, K.K. and Salzmann, M.",
        TITLE = "Indirect Local Attacks for Context-aware Semantic Segmentation Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "V:611-628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155938"}

@inproceedings{bb160040,
        AUTHOR = "Wu, Z.X. and Lim, S.N. and Davis, L.S. and Goldstein, T.",
        TITLE = "Making an Invisibility Cloak: Real World Adversarial Attacks on Object
Detectors",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "IV:1-17",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155939"}

@inproceedings{bb160041,
        AUTHOR = "Li, Q.Z. and Guo, Y.W. and Chen, H.",
        TITLE = "Yet Another Intermediate-level Attack",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XVI: 241-257",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155940"}

@inproceedings{bb160042,
        AUTHOR = "Li, M. and Deng, C. and Li, T. and Yan, J. and Gao, X. and Huang, H.",
        TITLE = "Towards Transferable Targeted Attack",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "638-646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155941"}

@inproceedings{bb160043,
        AUTHOR = "Gupta, S. and Dube, P. and Verma, A.",
        TITLE = "Improving the affordability of robustness training for DNNs",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3383-3392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155942"}

@inproceedings{bb160044,
        AUTHOR = "Zhang, Z. and Wu, T.",
        TITLE = "Learning Ordered Top-k Adversarial Attacks via Adversarial
Distillation",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3364-3373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155943"}

@inproceedings{bb160045,
        AUTHOR = "Chen, X. and Yan, X. and Zheng, F. and Jiang, Y. and Xia, S. and Zhao, Y. and Ji, R.",
        TITLE = "One-Shot Adversarial Attacks on Visual Tracking With Dual Attention",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "10173-10182",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155944"}

@inproceedings{bb160046,
        AUTHOR = "Zhou, H. and Chen, D. and Liao, J. and Chen, K. and Dong, X. and Liu, K. and Zhang, W. and Hua, G. and Yu, N.",
        TITLE = "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack
of Point Cloud Based Deep Networks",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "10353-10362",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155945"}

@inproceedings{bb160047,
        AUTHOR = "Machiraju, H. and Balasubramanian, V.N.",
        TITLE = "A Little Fog for a Large Turn",
        BOOKTITLE = WACV20,
        YEAR = "2020",
        PAGES = "2891-2900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155946"}

@inproceedings{bb160048,
        AUTHOR = "Yang, C.H. and Liu, Y. and Chen, P. and Ma, X. and Tsai, Y.J.",
        TITLE = "When Causal Intervention Meets Adversarial Examples and Image Masking
for Deep Neural Networks",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "3811-3815",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155947"}

@inproceedings{bb160049,
        AUTHOR = "Yao, H. and Regan, M. and Yang, Y. and Ren, Y.",
        TITLE = "Image Decomposition and Classification Through a Generative Model",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "400-404",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155948"}

@inproceedings{bb160050,
        AUTHOR = "Li, J. and Ji, R. and Liu, H. and Hong, X. and Gao, Y. and Tian, Q.",
        TITLE = "Universal Perturbation Attack Against Image Retrieval",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4898-4907",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155949"}

@inproceedings{bb160051,
        AUTHOR = "Finlay, C. and Pooladian, A. and Oberman, A.",
        TITLE = "The LogBarrier Adversarial Attack:
Making Effective Use of Decision Boundary Information",
        BOOKTITLE = ICCV19,
        YEAR = "2019",
        PAGES = "4861-4869",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155950"}

@inproceedings{bb160052,
        AUTHOR = "Jandial, S. and Mangla, P. and Varshney, S. and Balasubramanian, V.",
        TITLE = "AdvGAN++: Harnessing Latent Layers for Adversary Generation",
        BOOKTITLE = NeruArch19,
        YEAR = "2019",
        PAGES = "2045-2048",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155951"}

@inproceedings{bb160053,
        AUTHOR = "Wang, C.L. and Bunel, R. and Dvijotham, K. and Huang, P.S. and Grefenstette, E. and Kohli, P.",
        TITLE = "Knowing When to Stop: Evaluation and Verification of Conformity to
Output-Size Specifications",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "12252-12261",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155952"}

@inproceedings{bb160054,
        AUTHOR = "Modas, A. and Moosavi Dezfooli, S.M. and Frossard, P.",
        TITLE = "SparseFool: A Few Pixels Make a Big Difference",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "9079-9088",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155953"}

@inproceedings{bb160055,
        AUTHOR = "Yao, Z.W. and Gholami, A. and Xu, P. and Keutzer, K. and Mahoney, M.W.",
        TITLE = "Trust Region Based Adversarial Attack on Neural Networks",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11342-11351",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155954"}

@inproceedings{bb160056,
        AUTHOR = "Zeng, X.H. and Liu, C.X. and Wang, Y.S. and Qiu, W.C. and Xie, L.X. and Tai, Y.W. and Tang, C.K. and Yuille, A.L.",
        TITLE = "Adversarial Attacks Beyond the Image Space",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4297-4306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155955"}

@inproceedings{bb160057,
        AUTHOR = "Corneanu, C.A. and Madadi, M. and Escalera, S. and Martinez, A.M.",
        TITLE = "What Does It Mean to Learn in Deep Networks? And, How Does One Detect
Adversarial Attacks?",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "4752-4761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155956"}

@inproceedings{bb160058,
        AUTHOR = "Liu, X.Q. and Hsieh, C.J.",
        TITLE = "Rob-GAN: Generator, Discriminator, and Adversarial Attacker",
        BOOKTITLE = CVPR19,
        YEAR = "2019",
        PAGES = "11226-11235",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155957"}

@inproceedings{bb160059,
        AUTHOR = "Gupta, P. and Rahtu, E.",
        TITLE = "MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks",
        BOOKTITLE = GCPR19,
        YEAR = "2019",
        PAGES = "401-413",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155958"}

@inproceedings{bb160060,
        AUTHOR = "Zhao, W. and Yang, P.P. and Ni, R.R. and Zhao, Y. and Li, W.J.",
        TITLE = "Cycle GAN-Based Attack on Recaptured Images to Fool both Human and
Machine",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "83-92",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155959"}

@inproceedings{bb160061,
        AUTHOR = "Xu, X.J. and Chen, X.Y. and Liu, C. and Rohrbach, A. and Darrell, T.J. and Song, D.",
        TITLE = "Fooling Vision and Language Models Despite Localization and Attention
Mechanism",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "4951-4961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155960"}

@inproceedings{bb160062,
        AUTHOR = "Dong, Y. and Liao, F. and Pang, T. and Su, H. and Zhu, J. and Hu, X. and Li, J.",
        TITLE = "Boosting Adversarial Attacks with Momentum",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "9185-9193",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155961"}

@inproceedings{bb160063,
        AUTHOR = "Eykholt, K. and Evtimov, I. and Fernandes, E. and Li, B. and Rahmati, A. and Xiao, C. and Prakash, A. and Kohno, T. and Song, D.",
        TITLE = "Robust Physical-World Attacks on Deep Learning Visual Classification",
        BOOKTITLE = CVPR18,
        YEAR = "2018",
        PAGES = "1625-1634",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155962"}

@article{bb160064,
        AUTHOR = "Chen, X. and Ma, Y.N. and Lu, S.W. and Yao, Y.",
        TITLE = "Boundary augment: A data augment method to defend poison attack",
        JOURNAL = IET-IPR,
        VOLUME = "15",
        YEAR = "2021",
        NUMBER = "13",
        PAGES = "3292-3303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155963"}

@article{bb160065,
        AUTHOR = "Ma, K. and Xu, Q.Q. and Zeng, J.S. and Cao, X.C. and Huang, Q.M.",
        TITLE = "Poisoning Attack Against Estimating From Pairwise Comparisons",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "6393-6408",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155964"}

@article{bb160066,
        AUTHOR = "Zhang, J. and Chen, D.D. and Huang, Q.D. and Liao, J. and Zhang, W.M. and Feng, H.M. and Hua, G. and Yu, N.H.",
        TITLE = "Poison Ink: Robust and Invisible Backdoor Attack",
        JOURNAL = IP,
        VOLUME = "31",
        YEAR = "2022",
        PAGES = "5691-5705",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155965"}

@article{bb160067,
        AUTHOR = "Gao, Y.H. and Li, Y.M. and Zhu, L.H. and Wu, D.X. and Jiang, Y. and Xia, S.T.",
        TITLE = "Not All Samples Are Born Equal:
Towards Effective Clean-Label Backdoor Attacks",
        JOURNAL = PR,
        VOLUME = "139",
        YEAR = "2023",
        PAGES = "109512",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155966"}

@article{bb160068,
        AUTHOR = "Ma, Q.L. and Qin, J.P. and Yan, K. and Wang, L. and Sun, H.",
        TITLE = "Stealthy Frequency-Domain Backdoor Attacks:
Fourier Decomposition and Fundamental Frequency Injection",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "1677-1681",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155967"}

@article{bb160069,
        AUTHOR = "Zhang, Z. and Yuan, X. and Zhu, L. and Song, J.K. and Nie, L.Q.",
        TITLE = "BadCM: Invisible Backdoor Attack Against Cross-Modal Learning",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "2558-2571",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155968"}

@article{bb160070,
        AUTHOR = "Wang, K.Y. and Deng, H.X. and Xu, Y.J. and Liu, Z.L. and Fang, Y.",
        TITLE = "Multi-target label backdoor attacks on graph neural networks",
        JOURNAL = PR,
        VOLUME = "152",
        YEAR = "2024",
        PAGES = "110449",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155969"}

@article{bb160071,
        AUTHOR = "Niu, Z.X. and Sun, Y.Y. and Miao, Q.G. and Jin, R. and Hua, G.",
        TITLE = "Towards Unified Robustness Against Both Backdoor and Adversarial
Attacks",
        JOURNAL = PAMI,
        VOLUME = "46",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "7589-7605",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155970"}

@article{bb160072,
        AUTHOR = "Wang, B. and Yu, F. and Wei, F. and Li, Y. and Wang, W.",
        TITLE = "Invisible Intruders: Label-Consistent Backdoor Attack Using
Re-Parameterized Noise Trigger",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "10766-10778",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155971"}

@article{bb160073,
        AUTHOR = "Chen, W.M. and Xu, X.W. and Wang, X.D. and Zhou, H.S. and Li, Z. and Chen, Y.M.",
        TITLE = "Invisible backdoor attack with attention and steganography",
        JOURNAL = CVIU,
        VOLUME = "249",
        YEAR = "2024",
        PAGES = "104208",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155972"}

@article{bb160074,
        AUTHOR = "Hou, L.S. and Hua, Z.Y. and Li, Y.H. and Zheng, Y.F. and Zhang, L.Y.",
        TITLE = "M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to
Deep Learning Models",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "11299-11312",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155973"}

@article{bb160075,
        AUTHOR = "Tang, W.X. and Li, J.H. and Rao, Y. and Zhou, Z. and Peng, F.",
        TITLE = "A trigger-perceivable backdoor attack framework driven by image
steganography",
        JOURNAL = PR,
        VOLUME = "161",
        YEAR = "2025",
        PAGES = "111262",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155974"}

@article{bb160076,
        AUTHOR = "Feng, Y. and Ma, B.T. and Liu, D.N. and Zhang, Y.N. and Cai, W.D. and Xia, Y.",
        TITLE = "Contrastive Neuron Pruning for Backdoor Defense",
        JOURNAL = IP,
        VOLUME = "34",
        YEAR = "2025",
        PAGES = "1234-1245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155975"}

@article{bb160077,
        AUTHOR = "Sundar, A.P. and Li, F. and Zou, X. and Gao, T. and Hosler, R.",
        TITLE = "Vaccination Against Backdoor Attacks on Federated Learning Systems",
        JOURNAL = SMCS,
        VOLUME = "55",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "4434-4443",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155976"}

@article{bb160078,
        AUTHOR = "Hou, L.S. and Hua, Z.Y. and Luo, W. and Zhang, L.Y.",
        TITLE = "FixGuard: Repairing Backdoored Models via Class-Wise Trigger Recovery
and Unlearning",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "2544-2548",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155977"}

@article{bb160079,
        AUTHOR = "Zhang, X.Y. and Jin, Y.L. and Tong, H.Y. and Lou, J. and Wu, K. and Chen, X.F.",
        TITLE = "Purifier+: Plug-and-Play Backdoor Mitigation for Pre-Trained Models
via Activation Alignment",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "3910-3924",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155978"}

@article{bb160080,
        AUTHOR = "Wu, B.Y. and Chen, H.R. and Zhang, M.D. and Zhu, Z.H. and Wei, S.K. and Yuan, D.N. and Zhu, M.L. and Wang, R.T. and Liu, L. and Shen, C.",
        TITLE = "BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor
Learning",
        JOURNAL = IJCV,
        VOLUME = "133",
        YEAR = "2025",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5700-5787",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155979"}

@article{bb160081,
        AUTHOR = "Wu, S.X. and He, Q. and Yu, J. and Sang, J.",
        TITLE = "Backdoor for Debias: Mitigating Model Bias With Backdoor Attack-Based
Artificial Bias",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "8421-8432",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155980"}

@article{bb160082,
        AUTHOR = "Wu, Z.X. and Wen, J. and Peng, W.L. and Zhou, Y. and Zhang, Z.W.",
        TITLE = "IBSD: Iterable Black-Box Self-Defense Against Backdoor Attacks",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "3979-3983",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155981"}

@article{bb160083,
        AUTHOR = "Zhang, Y.L. and Pu, Y.J. and Li, J.Z. and Zhao, S.X. and Lang, B.",
        TITLE = "TSBA: A two-stage poison-only backdoor attack on visual object
tracking",
        JOURNAL = PR,
        VOLUME = "171",
        YEAR = "2026",
        PAGES = "112222",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155982"}

@article{bb160084,
        AUTHOR = "Li, S. and Zhang, J. and Qi, Y. and Chen, K.J. and Zhang, T.W. and Zhang, W.M. and Yu, N.H.",
        TITLE = "Clean Image May Be Dangerous:
Data Poisoning Attacks Against Deep Hashing",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "8541-8554",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155983"}

@inproceedings{bb160085,
        AUTHOR = "Yuan, Z.H. and Shi, J. and Zhou, P. and Gong, N.Z.Q. and Sun, L.C.",
        TITLE = "BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "29927-29936",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155984"}

@inproceedings{bb160086,
        AUTHOR = "Zhang, H. and Wang, Z. and Li, B. and Lin, F. and Han, T.X. and Jin, M.Y. and Zhan, C. and Du, M. and Wang, H.W. and Ma, S.Q.",
        TITLE = "Invisible Backdoor Attack against Self-supervised Learning",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "25790-25801",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155985"}

@inproceedings{bb160087,
        AUTHOR = "Li, Y. and Zhao, Y.C. and Zhu, C.C. and Zhang, J.",
        TITLE = "Infighting in the Dark: Multi-Label Backdoor Attack in Federated
Learning",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "25770-25779",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155986"}

@inproceedings{bb160088,
        AUTHOR = "Liu, Z. and Zhang, H.",
        TITLE = "Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders
for Large Vision Language Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "25060-25070",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155987"}

@inproceedings{bb160089,
        AUTHOR = "Zhang, H. and Wang, Y.C. and Yan, S.H. and Zhu, C.Y. and Zhou, Z.Q. and Hou, L.S. and Hu, S. and Li, M.H. and Zhang, Y.J. and Zhang, L.Y.",
        TITLE = "Test-Time Backdoor Detection for Object Detection Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "24377-24386",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155988"}

@inproceedings{bb160090,
        AUTHOR = "Hou, S.Z. and Li, S.Z. and Yao, D.",
        TITLE = "DeDe: Detecting Backdoor Samples for SSL Encoders via Decoders",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "20675-20684",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155989"}

@inproceedings{bb160091,
        AUTHOR = "Xu, J.H. and Zhang, Z.K. and Hu, R.",
        TITLE = "Detecting Backdoor Attacks in Federated Learning via Direction
Alignment Inspection",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "20654-20664",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155990"}

@inproceedings{bb160092,
        AUTHOR = "Han, Y.N. and Zhao, B.Y. and Chu, R. and Luo, F. and Sikdar, B. and Lao, Y.J.",
        TITLE = "UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion
Models",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "19186-19196",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155991"}

@inproceedings{bb160093,
        AUTHOR = "Li, W. and Chen, P.Y. and Liu, S. and Wang, R.",
        TITLE = "PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "10255-10264",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155992"}

@inproceedings{bb160094,
        AUTHOR = "Liang, S.Y. and Liang, J.W. and Pang, T.Y. and Du, C. and Liu, A. and Zhu, M.L. and Cao, X.C. and Tao, D.C.",
        TITLE = "Revisiting Backdoor Attacks against Large Vision-Language Models from
Domain Shift",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "9477-9486",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155993"}

@inproceedings{bb160095,
        AUTHOR = "Lee, C.Y. and Kao, C.C. and Yeh, C.H. and Lu, C.S. and Yu, C.M. and Chen, C.S.",
        TITLE = "Defending Against Repetitive Backdoor Attacks on Semi-Supervised
Learning Through Lens of Rate-Distortion-Perception Trade-Off",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "6465-6474",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155994"}

@inproceedings{bb160096,
        AUTHOR = "Nagaonkar, S. and Tripathi, A.M. and Mishra, A.",
        TITLE = "When Visual State Space Model Meets Backdoor Attacks",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "7419-7428",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155995"}

@inproceedings{bb160097,
        AUTHOR = "Styborski, J. and Lyu, M.Z. and Huang, Y. and Kong, A.",
        TITLE = "Exploiting Supervised Poison Vulnerability to Strengthen
Self-supervised Defense",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXXII: 265-283",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155996"}

@inproceedings{bb160098,
        AUTHOR = "Fares, S. and Nandakumar, K.",
        TITLE = "Attack To Defend: Exploiting Adversarial Attacks for Detecting
Poisoned Models",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24726-24735",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155997"}

@inproceedings{bb160099,
        AUTHOR = "Karim, N. and Arafat, A.A. and Khalid, U. and Guo, Z. and Rahnavard, N.",
        TITLE = "Augmented Neural Fine-tuning for Efficient Backdoor Purification",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXX: 401-418",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT155998"}

Last update:Nov 26, 2025 at 20:24:09