@inproceedings{bb154300, AUTHOR = "Zhou, T. and Ye, Q. and Luo, W.H. and Zhang, K. and Shi, Z.G. and Chen, J.M.", TITLE = "F&F Attack: Adversarial Attack against Multiple Object Trackers by Inducing False Negatives and False Positives", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4550-4560", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150218"} @inproceedings{bb154301, AUTHOR = "Qian, Y. and He, S. and Zhao, C.Y. and Sha, J.Q. and Wang, W. and Wang, B.", TITLE = "LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4487-4498", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150219"} @inproceedings{bb154302, AUTHOR = "Maho, T. and Moosavi Dezfooli, S.M. and Furon, T.", TITLE = "How to choose your best allies for a transferable attack?", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4519-4528", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150220"} @inproceedings{bb154303, AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Li, C. and Chen, X.Q.", TITLE = "RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4432-4442", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150221"} @inproceedings{bb154304, AUTHOR = "Zhou, Z.Q. and Hu, S. and Zhao, R.Z. and Wang, Q. and Zhang, L.Y. and Hou, J.H. and Jin, H.", TITLE = "Downstream-agnostic Adversarial Examples", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4322-4332", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150222"} @inproceedings{bb154305, AUTHOR = "Kim, H.S. and Son, M.J. and Kim, M. and Kwon, M.J. and Kim, C.", TITLE = "Breaking Temporal Consistency: Generating Video Universal Adversarial Perturbations Using Image Models", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4302-4311", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150223"} @inproceedings{bb154306, AUTHOR = "Stolik, T. and Lang, I. and Avidan, S.", TITLE = "SAGA: Spectral Adversarial Geometric Attack on 3D Meshes", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4261-4271", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150224"} @inproceedings{bb154307, AUTHOR = "Zeng, H. and Zhang, T. and Chen, B.W. and Peng, A.", TITLE = "Enhancing Targeted Transferability Via Suppressing High-Confidence Labels", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3309-3313", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150225"} @inproceedings{bb154308, AUTHOR = "Kim, Y. and Cho, S.J. and Byun, J. and Kwon, M.J. and Kim, C.", TITLE = "Improving Adversarial Transferability Via Feature Translation", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3359-3363", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150226"} @inproceedings{bb154309, AUTHOR = "Coscia, P. and Genovese, A. and Scotti, F. and Piuri, V.", TITLE = "Adversarial Defect Synthesis for Industrial Products in Low Data Regime", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "1360-1364", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150227"} @inproceedings{bb154310, AUTHOR = "Lin, Z. and Peng, A. and Zeng, H. and Wu, K.J. and Yu, W.X.", TITLE = "An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3439-3443", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150228"} @inproceedings{bb154311, AUTHOR = "Ma, M.Z. and Zheng, W.J. and Lv, W.L. and Ren, L. and Su, H. and Yin, Z.X.", TITLE = "Multi-Label Adversarial Attack Based on Label Correlation", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "2050-2054", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150229"} @inproceedings{bb154312, AUTHOR = "Wu, T. and Luo, T. and Wunsch, D.C.", TITLE = "GNP Attack: Transferable Adversarial Examples Via Gradient Norm Penalty", BOOKTITLE = ICIP23, YEAR = "2023", PAGES = "3110-3114", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150230"} @inproceedings{bb154313, AUTHOR = "Sha, Z.Y. and He, X.L. and Yu, N. and Backes, M. and Zhang, Y.", TITLE = "Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "16373-16383", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150231"} @inproceedings{bb154314, AUTHOR = "Feng, W.W. and Xu, N. and Zhang, T.Z. and Zhang, Y.D.", TITLE = "Dynamic Generative Targeted Attacks with Pattern Injection", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "16404-16414", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150232"} @inproceedings{bb154315, AUTHOR = "Takahashi, H. and Liu, J.J. and Liu, Y.", TITLE = "Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12198-12207", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150233"} @inproceedings{bb154316, AUTHOR = "Wei, Z.P. and Chen, J.J. and Wu, Z.X. and Jiang, Y.G.", TITLE = "Enhancing the Self-Universality for Transferable Targeted Attacks", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "12281-12290", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150234"} @inproceedings{bb154317, AUTHOR = "Chen, W.X. and Song, D. and Li, B.", TITLE = "TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets", BOOKTITLE = CVPR23, YEAR = "2023", PAGES = "4035-4044", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150235"} @inproceedings{bb154318, AUTHOR = "Zhuang, H.M. and Zhang, Y.H. and Liu, S.", TITLE = "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion", BOOKTITLE = AML23, YEAR = "2023", PAGES = "2385-2392", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150236"} @inproceedings{bb154319, AUTHOR = "Brown, D. and Kvinge, H.", TITLE = "Making Corgis Important for Honeycomb Classification: Adversarial Attacks on Concept-based Explainability Tools", BOOKTITLE = TAG-PRA23, YEAR = "2023", PAGES = "620-627", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150237"} @inproceedings{bb154320, AUTHOR = "Shukla, N. and Banerjee, S.", TITLE = "Generating Adversarial Attacks in the Latent Space", BOOKTITLE = GCV23, YEAR = "2023", PAGES = "730-739", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150238"} @inproceedings{bb154321, AUTHOR = "Zhang, L. and Wang, X.D.", TITLE = "Advfilter: Adversarial Example Generated by Perturbing Optical Path", BOOKTITLE = "ACCVWS22", YEAR = "2022", PAGES = "33-44", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150239"} @inproceedings{bb154322, AUTHOR = "Koren, T. and Talker, L. and Dinerstein, M. and Vitek, R.", TITLE = "Consistent Semantic Attacks on Optical Flow", BOOKTITLE = ACCV22, YEAR = "2022", PAGES = "VII:501-517", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150240"} @inproceedings{bb154323, AUTHOR = "Wu, H. and Wang, J. and Zhang, J.W. and Luo, X.Y. and Ma, B.", TITLE = "Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method", BOOKTITLE = IWDW22, YEAR = "2022", PAGES = "83-97", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150241"} @inproceedings{bb154324, AUTHOR = "Waseda, F. and Nishikawa, S. and Le, T.N. and Nguyen, H.H. and Echizen, I.", TITLE = "Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "1360-1368", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150242"} @inproceedings{bb154325, AUTHOR = "Aich, A. and Li, S. and Song, C.Y. and Asif, M.S. and Krishnamurthy, S.V. and Roy Chowdhury, A.K.", TITLE = "Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "1308-1318", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150243"} @inproceedings{bb154326, AUTHOR = "Shapira, A. and Zolfi, A. and Demetrio, L. and Biggio, B. and Shabtai, A.", TITLE = "Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "4560-4569", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150244"} @inproceedings{bb154327, AUTHOR = "Tan, H.X. and Kotthaus, H.", TITLE = "Explainability-Aware One Point Attack for Point Cloud Neural Networks", BOOKTITLE = WACV23, YEAR = "2023", PAGES = "4570-4579", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150245"} @inproceedings{bb154328, AUTHOR = "Chen, C.C. and Zhu, W.J. and Peng, B. and Lu, H.J.", TITLE = "Towards Robust Community Detection via Extreme Adversarial Attacks", BOOKTITLE = "ICPR22", YEAR = "2022", PAGES = "2231-2237", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150246"} @inproceedings{bb154329, AUTHOR = "Tavallali, P. and Behzadan, V. and Alizadeh, A. and Ranganath, A. and Singhal, M.", TITLE = "Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3717-3722", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150247"} @inproceedings{bb154330, AUTHOR = "Lin, Z. and Peng, A. and Wei, R. and Yu, W.X. and Zeng, H.", TITLE = "An Enhanced Transferable Adversarial Attack of Scale-Invariant Methods", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3788-3792", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150248"} @inproceedings{bb154331, AUTHOR = "Ran, Y. and Wang, Y.G.", TITLE = "Sign-OPT+: An Improved Sign Optimization Adversarial Attack", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "461-465", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150249"} @inproceedings{bb154332, AUTHOR = "Wang, D. and Lin, J. and Wang, Y.G.", TITLE = "Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "546-550", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150250"} @inproceedings{bb154333, AUTHOR = "Aneja, S. and Markhasin, L. and Nießner, M.", TITLE = "TAFIM: Targeted Adversarial Attacks Against Facial Image Manipulations", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "XIV:58-75", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150251"} @inproceedings{bb154334, AUTHOR = "Long, Y.Y. and Zhang, Q.L. and Zeng, B. and Gao, L.L. and Liu, X.L. and Zhang, J. and Song, J.K.", TITLE = "Frequency Domain Model Augmentation for Adversarial Attack", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "IV:549-566", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150252"} @inproceedings{bb154335, AUTHOR = "Yuan, Z. and Zhang, J. and Shan, S.G.", TITLE = "Adaptive Image Transformations for Transfer-Based Adversarial Attack", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:1-17", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150253"} @inproceedings{bb154336, AUTHOR = "Cao, Y.L. and Xiao, C.W. and Anandkumar, A. and Xu, D. and Pavone, M.", TITLE = "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:36-52", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150254"} @inproceedings{bb154337, AUTHOR = "Bai, J.W. and Gao, K.F. and Gong, D.H. and Xia, S.T. and Li, Z.F. and Liu, W.", TITLE = "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:104-121", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150255"} @inproceedings{bb154338, AUTHOR = "Liu, G. and Huang, X.W. and Yi, X.P.", TITLE = "Adversarial Label Poisoning Attack on Graph Neural Networks via Label Propagation", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "V:227-243", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150256"} @inproceedings{bb154339, AUTHOR = "Byun, J. and Shim, K. and Go, H. and Kim, C.", TITLE = "Hidden Conditional Adversarial Attacks", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "1306-1310", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150257"} @inproceedings{bb154340, AUTHOR = "Son, M.J. and Kwon, M.J. and Kim, H.S. and Byun, J. and Cho, S. and Kim, C.", TITLE = "Adaptive Warping Network for Transferable Adversarial Attacks", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3056-3060", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150258"} @inproceedings{bb154341, AUTHOR = "Cao, X.Y. and Gong, N.Z.Q.", TITLE = "MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients", BOOKTITLE = FedVision22, YEAR = "2022", PAGES = "3395-3403", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150259"} @inproceedings{bb154342, AUTHOR = "Xu, Q.L. and Tao, G.H. and Zhang, X.Y.", TITLE = "Bounded Adversarial Attack on Deep Content Features", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15182-15191", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150260"} @inproceedings{bb154343, AUTHOR = "Luo, C. and Lin, Q.L. and Xie, W.C. and Wu, B.Z. and Xie, J.H. and Shen, L.L.", TITLE = "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15294-15303", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150261"} @inproceedings{bb154344, AUTHOR = "Suryanto, N. and Kim, Y. and Kang, H. and Larasati, H.T. and Yun, Y.Y. and Le, T.T.H. and Yang, H. and Oh, S.Y. and Kim, H.", TITLE = "DTA: Physical Camouflage Attacks using Differentiable Transformation Network", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15284-15293", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150262"} @inproceedings{bb154345, AUTHOR = "Zhong, Y.Q. and Liu, X.M. and Zhai, D. and Jiang, J.J. and Ji, X.Y.", TITLE = "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon", BOOKTITLE = CVPR22, YEAR = "2022", PAGES = "15324-15333", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150263"} @inproceedings{bb154346, AUTHOR = "Tong, A.C.H.", TITLE = "Symmetric adversarial poisoning against deep learning", BOOKTITLE = IPTA20, YEAR = "2020", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150264"} @inproceedings{bb154347, AUTHOR = "Li, Y.M. and Wen, C.C. and Juefei Xu, F. and Feng, C.", TITLE = "Fooling LiDAR Perception via Adversarial Trajectory Perturbation", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7878-7887", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150265"} @inproceedings{bb154348, AUTHOR = "Wang, X.S. and He, X.R. and Wang, J.D. and He, K.", TITLE = "Admix: Enhancing the Transferability of Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16138-16147", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150266"} @inproceedings{bb154349, AUTHOR = "Chen, S. and Kahla, M. and Jia, R.X. and Qi, G.J.", TITLE = "Knowledge-Enriched Distributional Model Inversion Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16158-16167", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150267"} @inproceedings{bb154350, AUTHOR = "Zhou, M. and Wang, L. and Niu, Z.X. and Zhang, Q.L. and Xu, Y.H. and Zheng, N.N. and Hua, G.", TITLE = "Practical Relative Order Attack in Deep Ranking", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "16393-16402", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150268"} @inproceedings{bb154351, AUTHOR = "Shafran, A. and Peleg, S. and Hoshen, Y.", TITLE = "Membership Inference Attacks are Easier on Difficult Problems", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "14800-14809", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150269"} @inproceedings{bb154352, AUTHOR = "Naseer, M. and Khan, S. and Hayat, M. and Khan, F.S. and Porikli, F.M.", TITLE = "On Generating Transferable Targeted Perturbations", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7688-7697", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150270"} @inproceedings{bb154353, AUTHOR = "Chen, H. and Fu, C. and Zhao, J. and Koushanfar, F.", TITLE = "ProFlip: Targeted Trojan Attack with Progressive Bit Flips", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7698-7707", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150271"} @inproceedings{bb154354, AUTHOR = "Rony, J. and Granger, E. and Pedersoli, M. and Ayed, I.B.", TITLE = "Augmented Lagrangian Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7718-7727", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150272"} @inproceedings{bb154355, AUTHOR = "Yuan, Z. and Zhang, J. and Jia, Y. and Tan, C. and Xue, T. and Shan, S.G.", TITLE = "Meta Gradient Adversarial Attack", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7728-7737", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150273"} @inproceedings{bb154356, AUTHOR = "Park, G.Y. and Lee, S.W.", TITLE = "Reliably fast adversarial training via latent adversarial perturbation", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7738-7747", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150274"} @inproceedings{bb154357, AUTHOR = "Tu, J. and Wang, T. and Wang, J.K. and Manivasagam, S. and Ren, M. and Urtasun, R.", TITLE = "Adversarial Attacks On Multi-Agent Communication", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7748-7757", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150275"} @inproceedings{bb154358, AUTHOR = "Feng, W.W. and Wu, B.Y. and Zhang, T.Z. and Zhang, Y. and Zhang, Y.D.", TITLE = "Meta-Attack: Class-agnostic and Model-agnostic Physical Adversarial Attack", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7767-7776", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150276"} @inproceedings{bb154359, AUTHOR = "Kim, J.Y. and Hua, B.S. and Nguyen, D.T. and Yeung, S.K.", TITLE = "Minimal Adversarial Examples for Deep Learning on 3D Point Clouds", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7777-7786", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150277"} @inproceedings{bb154360, AUTHOR = "Stutz, D. and Hein, M. and Schiele, B.", TITLE = "Relating Adversarially Robust Generalization to Flat Minima", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7787-7797", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150278"} @inproceedings{bb154361, AUTHOR = "Li, C. and Gao, S.Q. and Deng, C. and Liu, W. and Huang, H.", TITLE = "Adversarial Attack on Deep Cross-Modal Hamming Retrieval", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "2198-2207", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150279"} @inproceedings{bb154362, AUTHOR = "Duan, R.J. and Chen, Y.F. and Niu, D. and Yang, Y. and Qin, A.K. and He, Y.", TITLE = "AdvDrop: Adversarial Attack to DNNs by Dropping Information", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7486-7495", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150280"} @inproceedings{bb154363, AUTHOR = "Hwang, J. and Kim, J.H. and Choi, J.H. and Lee, J.S.", TITLE = "Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame Attack", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7648-7656", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150281"} @inproceedings{bb154364, AUTHOR = "Moayeri, M. and Feizi, S.", TITLE = "Sample Efficient Detection and Classification of Adversarial Attacks via Self-Supervised Embeddings", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7657-7666", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150282"} @inproceedings{bb154365, AUTHOR = "Wang, Z.B. and Guo, H.C. and Zhang, Z.F. and Liu, W.X. and Qin, Z. and Ren, K.", TITLE = "Feature Importance-aware Transferable Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "7619-7628", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150283"} @inproceedings{bb154366, AUTHOR = "Wang, X. and Lin, S.Y. and Zhang, H. and Zhu, Y.F. and Zhang, Q.S.", TITLE = "Interpreting Attributions and Interactions of Adversarial Attacks", BOOKTITLE = ICCV21, YEAR = "2021", PAGES = "1075-1084", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150284"} @inproceedings{bb154367, AUTHOR = "Kumar, C. and Kumar, D. and Shao, M.", TITLE = "Generative Adversarial Attack on Ensemble Clustering", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "3839-3848", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150285"} @inproceedings{bb154368, AUTHOR = "Du, A. and Chen, B. and Chin, T.J. and Law, Y.W. and Sasdelli, M. and Rajasegaran, R. and Campbell, D.", TITLE = "Physical Adversarial Attacks on an Aerial Imagery Object Detector", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "3798-3808", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150286"} @inproceedings{bb154369, AUTHOR = "Zhao, B.Y. and Lao, Y.J.", TITLE = "Towards Class-Oriented Poisoning Attacks Against Neural Networks", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "2244-2253", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150287"} @inproceedings{bb154370, AUTHOR = "Chen, Z.H. and Wang, C.H. and Crandall, D.", TITLE = "Semantically Stealthy Adversarial Attacks against Segmentation Models", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "2846-2855", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150288"} @inproceedings{bb154371, AUTHOR = "Yin, M.J. and Li, S. and Song, C.Y. and Asif, M.S. and Roy Chowdhury, A.K. and Krishnamurthy, S.V.", TITLE = "ADC: Adversarial attacks against object Detection that evade Context consistency checks", BOOKTITLE = WACV22, YEAR = "2022", PAGES = "2836-2845", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150289"} @inproceedings{bb154372, AUTHOR = "Li, X.R. and Cui, W.Y. and Huang, J.W. and Wang, W.Y. and Chen, J.W.", TITLE = "Regularized Intermediate Layers Attack: Adversarial Examples With High Transferability", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "1904-1908", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150290"} @inproceedings{bb154373, AUTHOR = "Bai, T. and Zhao, J. and Zhu, J.L. and Han, S.D. and Chen, J.F. and Li, B. and Kot, A.", TITLE = "AI-GAN: Attack-Inspired Generation of Adversarial Examples", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "2543-2547", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150291"} @inproceedings{bb154374, AUTHOR = "Abdelfattah, M. and Yuan, K.W. and Wang, Z.J. and Ward, R.", TITLE = "Towards Universal Physical Attacks on Cascaded Camera-Lidar 3d Object Detection Models", BOOKTITLE = ICIP21, YEAR = "2021", PAGES = "3592-3596", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150292"} @inproceedings{bb154375, AUTHOR = "Gurulingan, N.K. and Arani, E. and Zonooz, B.", TITLE = "UniNet: A Unified Scene Understanding Network and Exploring Multi-Task Relationships through the Lens of Adversarial Attacks", BOOKTITLE = DeepMTL21, YEAR = "2021", PAGES = "2239-2248", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150293"} @inproceedings{bb154376, AUTHOR = "Ding, Y.Z. and Thakur, N. and Li, B.X.", TITLE = "AdvFoolGen: Creating Persistent Troubles for Deep Classifiers", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "142-151", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150294"} @inproceedings{bb154377, AUTHOR = "Boloor, A. and Wu, T. and Naughton, P. and Chakrabarti, A. and Zhang, X. and Vorobeychik, Y.", TITLE = "Can Optical Trojans Assist Adversarial Perturbations?", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "122-131", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150295"} @inproceedings{bb154378, AUTHOR = "Gnanasambandam, A. and Sherman, A.M. and Chan, S.H.", TITLE = "Optical Adversarial Attack", BOOKTITLE = AROW21, YEAR = "2021", PAGES = "92-101", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150296"} @inproceedings{bb154379, AUTHOR = "Yu, Y.R. and Gao, X.T. and Xu, C.Z.", TITLE = "LAFEAT: Piercing Through Adversarial Defenses with Latent Features", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "5731-5741", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150297"} @inproceedings{bb154380, AUTHOR = "Wang, X.S. and He, K.", TITLE = "Enhancing the Transferability of Adversarial Attacks through Variance Tuning", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "1924-1933", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150298"} @inproceedings{bb154381, AUTHOR = "Pony, R. and Naeh, I. and Mannor, S.", TITLE = "Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "515-524", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150299"} @inproceedings{bb154382, AUTHOR = "Rampini, A. and Pestarini, F. and Cosmo, L. and Melzi, S. and Rodola, E.", TITLE = "Universal Spectral Adversarial Attacks for Deformable Shapes", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "3215-3225", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150300"} @inproceedings{bb154383, AUTHOR = "Rezaei, S. and Liu, X.", TITLE = "On the Difficulty of Membership Inference Attacks", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "7888-7896", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150301"} @inproceedings{bb154384, AUTHOR = "Kariyappa, S. and Prakash, A. and Qureshi, M.K.", TITLE = "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "13809-13818", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150302"} @inproceedings{bb154385, AUTHOR = "Duan, R.J. and Mao, X.F. and Qin, A.K. and Chen, Y.F. and Ye, S. and He, Y. and Yang, Y.", TITLE = "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "16057-16066", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150303"} @inproceedings{bb154386, AUTHOR = "Chen, Z.K. and Xie, L.X. and Pang, S.M. and He, Y. and Tian, Q.", TITLE = "Appending Adversarial Frames for Universal Video Attack", BOOKTITLE = WACV21, YEAR = "2021", PAGES = "3198-3207", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150304"} @inproceedings{bb154387, AUTHOR = "Cancela, B. and Bolon Canedo, V. and Alonso Betanzos, A.", TITLE = "A delayed Elastic-Net approach for performing adversarial attacks", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "378-384", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150305"} @inproceedings{bb154388, AUTHOR = "Li, X.C. and Zhang, X.Y. and Yin, F. and Liu, C.L.", TITLE = "F-mixup: Attack CNNs From Fourier Perspective", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "541-548", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150306"} @inproceedings{bb154389, AUTHOR = "Grosse, K. and Smith, M.T. and Backes, M.", TITLE = "Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "4696-4703", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150307"} @inproceedings{bb154390, AUTHOR = "Barati, R. and Safabakhsh, R. and Rahmati, M.", TITLE = "Towards Explaining Adversarial Examples Phenomenon in Artificial Neural Networks", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "7036-7042", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150308"} @inproceedings{bb154391, AUTHOR = "Li, W.J. and Tondi, B. and Ni, R.R. and Barni, M.", TITLE = "Increased-confidence Adversarial Examples for Deep Learning Counter-forensics", BOOKTITLE = MMForWild20, YEAR = "2020", PAGES = "411-424", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150309"} @inproceedings{bb154392, AUTHOR = "Dong, X.S. and Liu, H. and Ji, R.R. and Cao, L.J. and Ye, Q.X. and Liu, J.Z. and Tian, Q.", TITLE = "API-net: Robust Generative Classifier via a Single Discriminator", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XIII:379-394", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150310"} @inproceedings{bb154393, AUTHOR = "Liu, A.S. and Huang, T.R. and Liu, X.L. and Xu, Y.T. and Ma, Y.Q. and Chen, X.Y. and Maybank, S.J. and Tao, D.C.", TITLE = "Spatiotemporal Attacks for Embodied Agents", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XVII:122-138", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150311"} @inproceedings{bb154394, AUTHOR = "Fan, Y.B. and Wu, B.Y. and Li, T.H. and Zhang, Y. and Li, M.Y. and Li, Z.F. and Yang, Y.J.", TITLE = "Sparse Adversarial Attack via Perturbation Factorization", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXII:35-50", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150312"} @inproceedings{bb154395, AUTHOR = "Guo, J.F. and Liu, C.", TITLE = "Practical Poisoning Attacks on Neural Networks", BOOKTITLE = ECCV20, YEAR = "2020", PAGES = "XXVII:142-158", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150313"} @inproceedings{bb154396, AUTHOR = "Costales, R. and Mao, C. and Norwitz, R. and Kim, B. and Yang, J.", TITLE = "Live Trojan Attacks on Deep Neural Networks", BOOKTITLE = AML-CV20, YEAR = "2020", PAGES = "3460-3469", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150314"} @inproceedings{bb154397, AUTHOR = "Haque, M. and Chauhan, A. and Liu, C. and Yang, W.", TITLE = "ILFO: Adversarial Attack on Adaptive Neural Networks", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "14252-14261", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150315"} @inproceedings{bb154398, AUTHOR = "Zhou, M. and Wu, J. and Liu, Y. and Liu, S. and Zhu, C.", TITLE = "DaST: Data-Free Substitute Training for Adversarial Attacks", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "231-240", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150316"} @inproceedings{bb154399, AUTHOR = "Ganeshan, A. and Vivek, B.S. and Radhakrishnan, V.B.", TITLE = "FDA: Feature Disruptive Attack", BOOKTITLE = ICCV19, YEAR = "2019", PAGES = "8068-8078", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT150317"}