@inproceedings{bb162500,
AUTHOR = "Zhou, T. and Ye, Q. and Luo, W.H. and Zhang, K. and Shi, Z.G. and Chen, J.M.",
TITLE = "F&F Attack: Adversarial Attack against Multiple Object Trackers
by Inducing False Negatives and False Positives",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4550-4560",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158353"}
@inproceedings{bb162501,
AUTHOR = "Qian, Y.G. and He, S. and Zhao, C.Y. and Sha, J.Q. and Wang, W. and Wang, B.",
TITLE = "LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping
Vulnerable Frequency Regions",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4487-4498",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158354"}
@inproceedings{bb162502,
AUTHOR = "Maho, T. and Moosavi Dezfooli, S.M. and Furon, T.",
TITLE = "How to choose your best allies for a transferable attack?",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4519-4528",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158355"}
@inproceedings{bb162503,
AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Li, C. and Chen, X.Q.",
TITLE = "RFLA:
A Stealthy Reflected Light Adversarial Attack in the Physical World",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4432-4442",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158356"}
@inproceedings{bb162504,
AUTHOR = "Zhou, Z.Q. and Hu, S. and Zhao, R.Z. and Wang, Q. and Zhang, L.Y. and Hou, J.H. and Jin, H.",
TITLE = "Downstream-agnostic Adversarial Examples",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4322-4332",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158357"}
@inproceedings{bb162505,
AUTHOR = "Kim, H.S. and Son, M.J. and Kim, M. and Kwon, M.J. and Kim, C.",
TITLE = "Breaking Temporal Consistency: Generating Video Universal Adversarial
Perturbations Using Image Models",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4302-4311",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158358"}
@inproceedings{bb162506,
AUTHOR = "Stolik, T. and Lang, I. and Avidan, S.",
TITLE = "SAGA: Spectral Adversarial Geometric Attack on 3D Meshes",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "4261-4271",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158359"}
@inproceedings{bb162507,
AUTHOR = "Zeng, H. and Zhang, T. and Chen, B.W. and Peng, A.J.",
TITLE = "Enhancing Targeted Transferability Via Suppressing High-Confidence
Labels",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "3309-3313",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158360"}
@inproceedings{bb162508,
AUTHOR = "Kim, Y. and Cho, S.J. and Byun, J. and Kwon, M.J. and Kim, C.",
TITLE = "Improving Adversarial Transferability Via Feature Translation",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "3359-3363",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158361"}
@inproceedings{bb162509,
AUTHOR = "Coscia, P. and Genovese, A. and Scotti, F. and Piuri, V.",
TITLE = "Adversarial Defect Synthesis for Industrial Products in Low Data
Regime",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "1360-1364",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158362"}
@inproceedings{bb162510,
AUTHOR = "Lin, Z. and Peng, A.J. and Zeng, H. and Wu, K.J. and Yu, W.X.",
TITLE = "An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "3439-3443",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158363"}
@inproceedings{bb162511,
AUTHOR = "Ma, M.Z. and Zheng, W.J. and Lv, W.L. and Ren, L. and Su, H. and Yin, Z.X.",
TITLE = "Multi-Label Adversarial Attack Based on Label Correlation",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "2050-2054",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158364"}
@inproceedings{bb162512,
AUTHOR = "Wu, T. and Luo, T. and Wunsch, D.C.",
TITLE = "GNP Attack: Transferable Adversarial Examples Via Gradient Norm
Penalty",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "3110-3114",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158365"}
@inproceedings{bb162513,
AUTHOR = "Sha, Z.Y. and He, X.L. and Yu, N. and Backes, M. and Zhang, Y.",
TITLE = "Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image
Encoders",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "16373-16383",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158366"}
@inproceedings{bb162514,
AUTHOR = "Feng, W.W. and Xu, N. and Zhang, T.Z. and Zhang, Y.D.",
TITLE = "Dynamic Generative Targeted Attacks with Pattern Injection",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "16404-16414",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158367"}
@inproceedings{bb162515,
AUTHOR = "Takahashi, H. and Liu, J.J. and Liu, Y.",
TITLE = "Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "12198-12207",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158368"}
@inproceedings{bb162516,
AUTHOR = "Wei, Z.P. and Chen, J.J. and Wu, Z.X. and Jiang, Y.G.",
TITLE = "Enhancing the Self-Universality for Transferable Targeted Attacks",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "12281-12290",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158369"}
@inproceedings{bb162517,
AUTHOR = "Chen, W.X. and Song, D. and Li, B.",
TITLE = "TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets",
BOOKTITLE = CVPR23,
YEAR = "2023",
PAGES = "4035-4044",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158370"}
@inproceedings{bb162518,
AUTHOR = "Zhuang, H.M. and Zhang, Y.H. and Liu, S.",
TITLE = "A Pilot Study of Query-Free Adversarial Attack against Stable
Diffusion",
BOOKTITLE = AML23,
YEAR = "2023",
PAGES = "2385-2392",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158371"}
@inproceedings{bb162519,
AUTHOR = "Brown, D. and Kvinge, H.",
TITLE = "Making Corgis Important for Honeycomb Classification:
Adversarial Attacks on Concept-based Explainability Tools",
BOOKTITLE = TAG-PRA23,
YEAR = "2023",
PAGES = "620-627",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158372"}
@inproceedings{bb162520,
AUTHOR = "Shukla, N. and Banerjee, S.",
TITLE = "Generating Adversarial Attacks in the Latent Space",
BOOKTITLE = GCV23,
YEAR = "2023",
PAGES = "730-739",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158373"}
@inproceedings{bb162521,
AUTHOR = "Zhang, L. and Wang, X.D.",
TITLE = "Advfilter: Adversarial Example Generated by Perturbing Optical Path",
BOOKTITLE = "ACCVWS22",
YEAR = "2022",
PAGES = "33-44",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158374"}
@inproceedings{bb162522,
AUTHOR = "Koren, T. and Talker, L. and Dinerstein, M. and Vitek, R.",
TITLE = "Consistent Semantic Attacks on Optical Flow",
BOOKTITLE = ACCV22,
YEAR = "2022",
PAGES = "VII:501-517",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158375"}
@inproceedings{bb162523,
AUTHOR = "Wu, H. and Wang, J. and Zhang, J.W. and Luo, X.Y. and Ma, B.",
TITLE = "Improving the Transferability of Adversarial Attacks Through Both Front
and Rear Vector Method",
BOOKTITLE = IWDW22,
YEAR = "2022",
PAGES = "83-97",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158376"}
@inproceedings{bb162524,
AUTHOR = "Waseda, F. and Nishikawa, S. and Le, T.N. and Nguyen, H.H. and Echizen, I.",
TITLE = "Closer Look at the Transferability of Adversarial Examples:
How They Fool Different Models Differently",
BOOKTITLE = WACV23,
YEAR = "2023",
PAGES = "1360-1368",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158377"}
@inproceedings{bb162525,
AUTHOR = "Shapira, A. and Zolfi, A. and Demetrio, L. and Biggio, B. and Shabtai, A.",
TITLE = "Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep
Object Detectors",
BOOKTITLE = WACV23,
YEAR = "2023",
PAGES = "4560-4569",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158378"}
@inproceedings{bb162526,
AUTHOR = "Tan, H.X. and Kotthaus, H.",
TITLE = "Explainability-Aware One Point Attack for Point Cloud Neural Networks",
BOOKTITLE = WACV23,
YEAR = "2023",
PAGES = "4570-4579",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158379"}
@inproceedings{bb162527,
AUTHOR = "Chen, C.C. and Zhu, W.J. and Peng, B. and Lu, H.J.",
TITLE = "Towards Robust Community Detection via Extreme Adversarial Attacks",
BOOKTITLE = "ICPR22",
YEAR = "2022",
PAGES = "2231-2237",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158380"}
@inproceedings{bb162528,
AUTHOR = "Tavallali, P. and Behzadan, V. and Alizadeh, A. and Ranganath, A. and Singhal, M.",
TITLE = "Adversarial Label-Poisoning Attacks and Defense for General
Multi-Class Models Based on Synthetic Reduced Nearest Neighbor",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "3717-3722",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158381"}
@inproceedings{bb162529,
AUTHOR = "Lin, Z. and Peng, A.J. and Wei, R. and Yu, W.X. and Zeng, H.",
TITLE = "An Enhanced Transferable Adversarial Attack of Scale-Invariant
Methods",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "3788-3792",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158382"}
@inproceedings{bb162530,
AUTHOR = "Ran, Y. and Wang, Y.G.",
TITLE = "Sign-OPT+: An Improved Sign Optimization Adversarial Attack",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "461-465",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158383"}
@inproceedings{bb162531,
AUTHOR = "Wang, D. and Lin, J.Y. and Wang, Y.G.",
TITLE = "Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "546-550",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158384"}
@inproceedings{bb162532,
AUTHOR = "Aneja, S. and Markhasin, L. and Nießner, M.",
TITLE = "TAFIM: Targeted Adversarial Attacks Against Facial Image Manipulations",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "XIV:58-75",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158385"}
@inproceedings{bb162533,
AUTHOR = "Long, Y.Y. and Zhang, Q.L. and Zeng, B. and Gao, L.L. and Liu, X.L. and Zhang, J. and Song, J.K.",
TITLE = "Frequency Domain Model Augmentation for Adversarial Attack",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "IV:549-566",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158386"}
@inproceedings{bb162534,
AUTHOR = "Yuan, Z. and Zhang, J. and Shan, S.G.",
TITLE = "Adaptive Image Transformations for Transfer-Based Adversarial Attack",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "V:1-17",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158387"}
@inproceedings{bb162535,
AUTHOR = "Cao, Y.L. and Xiao, C.W. and Anandkumar, A. and Xu, D. and Pavone, M.",
TITLE = "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "V:36-52",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158388"}
@inproceedings{bb162536,
AUTHOR = "Bai, J.W. and Gao, K.F. and Gong, D.H. and Xia, S.T. and Li, Z.F. and Liu, W.",
TITLE = "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "V:104-121",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158389"}
@inproceedings{bb162537,
AUTHOR = "Liu, G. and Huang, X.W. and Yi, X.P.",
TITLE = "Adversarial Label Poisoning Attack on Graph Neural Networks via Label
Propagation",
BOOKTITLE = ECCV22,
YEAR = "2022",
PAGES = "V:227-243",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158390"}
@inproceedings{bb162538,
AUTHOR = "Byun, J. and Shim, K. and Go, H. and Kim, C.",
TITLE = "Hidden Conditional Adversarial Attacks",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "1306-1310",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158391"}
@inproceedings{bb162539,
AUTHOR = "Son, M.J. and Kwon, M.J. and Kim, H.S. and Byun, J. and Cho, S. and Kim, C.",
TITLE = "Adaptive Warping Network for Transferable Adversarial Attacks",
BOOKTITLE = ICIP22,
YEAR = "2022",
PAGES = "3056-3060",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158392"}
@inproceedings{bb162540,
AUTHOR = "Cao, X.Y. and Gong, N.Z.Q.",
TITLE = "MPAF: Model Poisoning Attacks to Federated Learning based on Fake
Clients",
BOOKTITLE = FedVision22,
YEAR = "2022",
PAGES = "3395-3403",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158393"}
@inproceedings{bb162541,
AUTHOR = "Xu, Q.L. and Tao, G.H. and Zhang, X.Y.",
TITLE = "Bounded Adversarial Attack on Deep Content Features",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "15182-15191",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158394"}
@inproceedings{bb162542,
AUTHOR = "Luo, C. and Lin, Q.L. and Xie, W.C. and Wu, B.Z. and Xie, J.H. and Shen, L.L.",
TITLE = "Frequency-driven Imperceptible Adversarial Attack on Semantic
Similarity",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "15294-15303",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158395"}
@inproceedings{bb162543,
AUTHOR = "Suryanto, N. and Kim, Y. and Kang, H. and Larasati, H.T. and Yun, Y.Y. and Le, T.T.H. and Yang, H. and Oh, S.Y. and Kim, H.",
TITLE = "DTA: Physical Camouflage Attacks using Differentiable Transformation
Network",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "15284-15293",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158396"}
@inproceedings{bb162544,
AUTHOR = "Zhong, Y.Q. and Liu, X.M. and Zhai, D. and Jiang, J.J. and Ji, X.Y.",
TITLE = "Shadows can be Dangerous: Stealthy and Effective Physical-world
Adversarial Attack by Natural Phenomenon",
BOOKTITLE = CVPR22,
YEAR = "2022",
PAGES = "15324-15333",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158397"}
@inproceedings{bb162545,
AUTHOR = "Tong, A.C.H.",
TITLE = "Symmetric adversarial poisoning against deep learning",
BOOKTITLE = IPTA20,
YEAR = "2020",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158398"}
@inproceedings{bb162546,
AUTHOR = "Li, Y.M. and Wen, C.C. and Juefei Xu, F. and Feng, C.",
TITLE = "Fooling LiDAR Perception via Adversarial Trajectory Perturbation",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7878-7887",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158399"}
@inproceedings{bb162547,
AUTHOR = "Wang, X.S. and He, X.R. and Wang, J.D. and He, K.",
TITLE = "Admix: Enhancing the Transferability of Adversarial Attacks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "16138-16147",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158400"}
@inproceedings{bb162548,
AUTHOR = "Chen, S. and Kahla, M. and Jia, R.X. and Qi, G.J.",
TITLE = "Knowledge-Enriched Distributional Model Inversion Attacks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "16158-16167",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158401"}
@inproceedings{bb162549,
AUTHOR = "Zhou, M. and Wang, L. and Niu, Z.X. and Zhang, Q.L. and Xu, Y.H. and Zheng, N.N. and Hua, G.",
TITLE = "Practical Relative Order Attack in Deep Ranking",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "16393-16402",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158402"}
@inproceedings{bb162550,
AUTHOR = "Shafran, A. and Peleg, S. and Hoshen, Y.",
TITLE = "Membership Inference Attacks are Easier on Difficult Problems",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "14800-14809",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158403"}
@inproceedings{bb162551,
AUTHOR = "Naseer, M. and Khan, S. and Hayat, M. and Khan, F.S. and Porikli, F.M.",
TITLE = "On Generating Transferable Targeted Perturbations",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7688-7697",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158404"}
@inproceedings{bb162552,
AUTHOR = "Chen, H. and Fu, C. and Zhao, J. and Koushanfar, F.",
TITLE = "ProFlip: Targeted Trojan Attack with Progressive Bit Flips",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7698-7707",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158405"}
@inproceedings{bb162553,
AUTHOR = "Rony, J. and Granger, E. and Pedersoli, M. and Ayed, I.B.",
TITLE = "Augmented Lagrangian Adversarial Attacks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7718-7727",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158406"}
@inproceedings{bb162554,
AUTHOR = "Yuan, Z. and Zhang, J. and Jia, Y. and Tan, C. and Xue, T. and Shan, S.G.",
TITLE = "Meta Gradient Adversarial Attack",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7728-7737",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158407"}
@inproceedings{bb162555,
AUTHOR = "Park, G.Y. and Lee, S.W.",
TITLE = "Reliably fast adversarial training via latent adversarial
perturbation",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7738-7747",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158408"}
@inproceedings{bb162556,
AUTHOR = "Tu, J. and Wang, T. and Wang, J.K. and Manivasagam, S. and Ren, M. and Urtasun, R.",
TITLE = "Adversarial Attacks On Multi-Agent Communication",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7748-7757",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158409"}
@inproceedings{bb162557,
AUTHOR = "Feng, W.W. and Wu, B.Y. and Zhang, T.Z. and Zhang, Y. and Zhang, Y.D.",
TITLE = "Meta-Attack: Class-agnostic and Model-agnostic Physical Adversarial
Attack",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7767-7776",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158410"}
@inproceedings{bb162558,
AUTHOR = "Kim, J.Y. and Hua, B.S. and Nguyen, D.T. and Yeung, S.K.",
TITLE = "Minimal Adversarial Examples for Deep Learning on 3D Point Clouds",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7777-7786",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158411"}
@inproceedings{bb162559,
AUTHOR = "Stutz, D. and Hein, M. and Schiele, B.",
TITLE = "Relating Adversarially Robust Generalization to Flat Minima",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7787-7797",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158412"}
@inproceedings{bb162560,
AUTHOR = "Li, C. and Gao, S.Q. and Deng, C. and Liu, W. and Huang, H.",
TITLE = "Adversarial Attack on Deep Cross-Modal Hamming Retrieval",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "2198-2207",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158413"}
@inproceedings{bb162561,
AUTHOR = "Duan, R.J. and Chen, Y.F. and Niu, D. and Yang, Y. and Qin, A.K. and He, Y.",
TITLE = "AdvDrop: Adversarial Attack to DNNs by Dropping Information",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7486-7495",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158414"}
@inproceedings{bb162562,
AUTHOR = "Hwang, J. and Kim, J.H. and Choi, J.H. and Lee, J.S.",
TITLE = "Just One Moment: Structural Vulnerability of Deep Action Recognition
against One Frame Attack",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7648-7656",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158415"}
@inproceedings{bb162563,
AUTHOR = "Moayeri, M. and Feizi, S.",
TITLE = "Sample Efficient Detection and Classification of Adversarial Attacks
via Self-Supervised Embeddings",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7657-7666",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158416"}
@inproceedings{bb162564,
AUTHOR = "Wang, Z.B. and Guo, H.C. and Zhang, Z.F. and Liu, W.X. and Qin, Z. and Ren, K.",
TITLE = "Feature Importance-aware Transferable Adversarial Attacks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "7619-7628",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158417"}
@inproceedings{bb162565,
AUTHOR = "Wang, X. and Lin, S.Y. and Zhang, H. and Zhu, Y.F. and Zhang, Q.S.",
TITLE = "Interpreting Attributions and Interactions of Adversarial Attacks",
BOOKTITLE = ICCV21,
YEAR = "2021",
PAGES = "1075-1084",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158418"}
@inproceedings{bb162566,
AUTHOR = "Kumar, C. and Kumar, D. and Shao, M.",
TITLE = "Generative Adversarial Attack on Ensemble Clustering",
BOOKTITLE = WACV22,
YEAR = "2022",
PAGES = "3839-3848",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158419"}
@inproceedings{bb162567,
AUTHOR = "Du, A. and Chen, B. and Chin, T.J. and Law, Y.W. and Sasdelli, M. and Rajasegaran, R. and Campbell, D.",
TITLE = "Physical Adversarial Attacks on an Aerial Imagery Object Detector",
BOOKTITLE = WACV22,
YEAR = "2022",
PAGES = "3798-3808",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158420"}
@inproceedings{bb162568,
AUTHOR = "Zhao, B.Y. and Lao, Y.J.",
TITLE = "Towards Class-Oriented Poisoning Attacks Against Neural Networks",
BOOKTITLE = WACV22,
YEAR = "2022",
PAGES = "2244-2253",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158421"}
@inproceedings{bb162569,
AUTHOR = "Chen, Z.H. and Wang, C.H. and Crandall, D.",
TITLE = "Semantically Stealthy Adversarial Attacks against Segmentation Models",
BOOKTITLE = WACV22,
YEAR = "2022",
PAGES = "2846-2855",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158422"}
@inproceedings{bb162570,
AUTHOR = "Yin, M.J. and Li, S. and Song, C.Y. and Asif, M.S. and Roy Chowdhury, A.K. and Krishnamurthy, S.V.",
TITLE = "ADC: Adversarial attacks against object Detection that evade Context
consistency checks",
BOOKTITLE = WACV22,
YEAR = "2022",
PAGES = "2836-2845",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158423"}
@inproceedings{bb162571,
AUTHOR = "Li, X.R. and Cui, W.Y. and Huang, J.W. and Wang, W.Y. and Chen, J.W.",
TITLE = "Regularized Intermediate Layers Attack:
Adversarial Examples With High Transferability",
BOOKTITLE = ICIP21,
YEAR = "2021",
PAGES = "1904-1908",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158424"}
@inproceedings{bb162572,
AUTHOR = "Bai, T. and Zhao, J. and Zhu, J.L. and Han, S.D. and Chen, J.F. and Li, B. and Kot, A.",
TITLE = "AI-GAN: Attack-Inspired Generation of Adversarial Examples",
BOOKTITLE = ICIP21,
YEAR = "2021",
PAGES = "2543-2547",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158425"}
@inproceedings{bb162573,
AUTHOR = "Abdelfattah, M. and Yuan, K.W. and Wang, Z.J. and Ward, R.",
TITLE = "Towards Universal Physical Attacks on Cascaded Camera-Lidar 3d Object
Detection Models",
BOOKTITLE = ICIP21,
YEAR = "2021",
PAGES = "3592-3596",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158426"}
@inproceedings{bb162574,
AUTHOR = "Gurulingan, N.K. and Arani, E. and Zonooz, B.",
TITLE = "UniNet: A Unified Scene Understanding Network and Exploring
Multi-Task Relationships through the Lens of Adversarial Attacks",
BOOKTITLE = DeepMTL21,
YEAR = "2021",
PAGES = "2239-2248",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158427"}
@inproceedings{bb162575,
AUTHOR = "Ding, Y.Z. and Thakur, N. and Li, B.X.",
TITLE = "AdvFoolGen: Creating Persistent Troubles for Deep Classifiers",
BOOKTITLE = AROW21,
YEAR = "2021",
PAGES = "142-151",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158428"}
@inproceedings{bb162576,
AUTHOR = "Boloor, A. and Wu, T. and Naughton, P. and Chakrabarti, A. and Zhang, X. and Vorobeychik, Y.",
TITLE = "Can Optical Trojans Assist Adversarial Perturbations?",
BOOKTITLE = AROW21,
YEAR = "2021",
PAGES = "122-131",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158429"}
@inproceedings{bb162577,
AUTHOR = "Gnanasambandam, A. and Sherman, A.M. and Chan, S.H.",
TITLE = "Optical Adversarial Attack",
BOOKTITLE = AROW21,
YEAR = "2021",
PAGES = "92-101",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158430"}
@inproceedings{bb162578,
AUTHOR = "Yu, Y.R. and Gao, X.T. and Xu, C.Z.",
TITLE = "LAFEAT: Piercing Through Adversarial Defenses with Latent Features",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "5731-5741",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158431"}
@inproceedings{bb162579,
AUTHOR = "Wang, X.S. and He, K.",
TITLE = "Enhancing the Transferability of Adversarial Attacks through Variance
Tuning",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "1924-1933",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158432"}
@inproceedings{bb162580,
AUTHOR = "Pony, R. and Naeh, I. and Mannor, S.",
TITLE = "Over-the-Air Adversarial Flickering Attacks against Video Recognition
Networks",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "515-524",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158433"}
@inproceedings{bb162581,
AUTHOR = "Rampini, A. and Pestarini, F. and Cosmo, L. and Melzi, S. and Rodola, E.",
TITLE = "Universal Spectral Adversarial Attacks for Deformable Shapes",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "3215-3225",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158434"}
@inproceedings{bb162582,
AUTHOR = "Rezaei, S. and Liu, X.",
TITLE = "On the Difficulty of Membership Inference Attacks",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "7888-7896",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158435"}
@inproceedings{bb162583,
AUTHOR = "Kariyappa, S. and Prakash, A. and Qureshi, M.K.",
TITLE = "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient
Estimation",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "13809-13818",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158436"}
@inproceedings{bb162584,
AUTHOR = "Duan, R.J. and Mao, X.F. and Qin, A.K. and Chen, Y.F. and Ye, S. and He, Y. and Yang, Y.",
TITLE = "Adversarial Laser Beam:
Effective Physical-World Attack to DNNs in a Blink",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "16057-16066",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158437"}
@inproceedings{bb162585,
AUTHOR = "Chen, Z.K. and Xie, L.X. and Pang, S.M. and He, Y. and Tian, Q.",
TITLE = "Appending Adversarial Frames for Universal Video Attack",
BOOKTITLE = WACV21,
YEAR = "2021",
PAGES = "3198-3207",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158438"}
@inproceedings{bb162586,
AUTHOR = "Cancela, B. and Bolon Canedo, V. and Alonso Betanzos, A.",
TITLE = "A delayed Elastic-Net approach for performing adversarial attacks",
BOOKTITLE = ICPR21,
YEAR = "2021",
PAGES = "378-384",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158439"}
@inproceedings{bb162587,
AUTHOR = "Li, X.C. and Zhang, X.Y. and Yin, F. and Liu, C.L.",
TITLE = "F-mixup: Attack CNNs From Fourier Perspective",
BOOKTITLE = ICPR21,
YEAR = "2021",
PAGES = "541-548",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158440"}
@inproceedings{bb162588,
AUTHOR = "Grosse, K. and Smith, M.T. and Backes, M.",
TITLE = "Killing Four Birds with one Gaussian Process:
The Relation between different Test-Time Attacks",
BOOKTITLE = ICPR21,
YEAR = "2021",
PAGES = "4696-4703",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158441"}
@inproceedings{bb162589,
AUTHOR = "Barati, R. and Safabakhsh, R. and Rahmati, M.",
TITLE = "Towards Explaining Adversarial Examples Phenomenon in Artificial
Neural Networks",
BOOKTITLE = ICPR21,
YEAR = "2021",
PAGES = "7036-7042",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158442"}
@inproceedings{bb162590,
AUTHOR = "Li, W.J. and Tondi, B. and Ni, R.R. and Barni, M.",
TITLE = "Increased-confidence Adversarial Examples for Deep Learning
Counter-forensics",
BOOKTITLE = MMForWild20,
YEAR = "2020",
PAGES = "411-424",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158443"}
@inproceedings{bb162591,
AUTHOR = "Dong, X.S. and Liu, H. and Ji, R.R. and Cao, L.J. and Ye, Q.X. and Liu, J.Z. and Tian, Q.",
TITLE = "API-net: Robust Generative Classifier via a Single Discriminator",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "XIII:379-394",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158444"}
@inproceedings{bb162592,
AUTHOR = "Liu, A.S. and Huang, T.R. and Liu, X.L. and Xu, Y.T. and Ma, Y.Q. and Chen, X.Y. and Maybank, S.J. and Tao, D.C.",
TITLE = "Spatiotemporal Attacks for Embodied Agents",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "XVII:122-138",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158445"}
@inproceedings{bb162593,
AUTHOR = "Fan, Y.B. and Wu, B.Y. and Li, T.H. and Zhang, Y. and Li, M.Y. and Li, Z.F. and Yang, Y.J.",
TITLE = "Sparse Adversarial Attack via Perturbation Factorization",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "XXII:35-50",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158446"}
@inproceedings{bb162594,
AUTHOR = "Guo, J.F. and Liu, C.",
TITLE = "Practical Poisoning Attacks on Neural Networks",
BOOKTITLE = ECCV20,
YEAR = "2020",
PAGES = "XXVII:142-158",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158447"}
@inproceedings{bb162595,
AUTHOR = "Costales, R. and Mao, C. and Norwitz, R. and Kim, B. and Yang, J.",
TITLE = "Live Trojan Attacks on Deep Neural Networks",
BOOKTITLE = AML-CV20,
YEAR = "2020",
PAGES = "3460-3469",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158448"}
@inproceedings{bb162596,
AUTHOR = "Haque, M. and Chauhan, A. and Liu, C. and Yang, W.",
TITLE = "ILFO: Adversarial Attack on Adaptive Neural Networks",
BOOKTITLE = CVPR20,
YEAR = "2020",
PAGES = "14252-14261",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158449"}
@inproceedings{bb162597,
AUTHOR = "Zhou, M. and Wu, J. and Liu, Y. and Liu, S. and Zhu, C.",
TITLE = "DaST: Data-Free Substitute Training for Adversarial Attacks",
BOOKTITLE = CVPR20,
YEAR = "2020",
PAGES = "231-240",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158450"}
@inproceedings{bb162598,
AUTHOR = "Ganeshan, A. and Vivek, B.S. and Radhakrishnan, V.B.",
TITLE = "FDA: Feature Disruptive Attack",
BOOKTITLE = ICCV19,
YEAR = "2019",
PAGES = "8068-8078",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158451"}
@inproceedings{bb162599,
AUTHOR = "Han, J. and Dong, X. and Zhang, R. and Chen, D. and Zhang, W. and Yu, N. and Luo, P. and Wang, X.",
TITLE = "Once a MAN: Towards Multi-Target Attack via Learning Multi-Target
Adversarial Network Once",
BOOKTITLE = ICCV19,
YEAR = "2019",
PAGES = "5157-5166",
BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT158452"}
Last update:Feb 26, 2026 at 10:58:24