@inproceedings{bb162000,
        AUTHOR = "Phan, H. and Shi, C. and Xie, Y. and Zhang, T.F. and Li, Z.H. and Zhao, T.M. and Liu, J. and Wang, Y. and Chen, Y.Y. and Yuan, B.",
        TITLE = "RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact
DNN",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "IV:708-724",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157854"}

@inproceedings{bb162001,
        AUTHOR = "Feng, Y. and Ma, B. and Zhang, J. and Zhao, S.S. and Xia, Y. and Tao, D.C.",
        TITLE = "FIBA: Frequency-Injection based Backdoor Attack in Medical Image
Analysis",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "20844-20853",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157855"}

@inproceedings{bb162002,
        AUTHOR = "Zhao, Z.D. and Chen, X.J. and Xuan, Y.X. and Dong, Y. and Wang, D. and Liang, K.",
        TITLE = "DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible
Perturbation and Latent Representation Constraints",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15192-15201",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157856"}

@inproceedings{bb162003,
        AUTHOR = "Li, Y.Z. and Li, Y.M. and Wu, B.Y. and Li, L.K. and He, R. and Lyu, S.W.",
        TITLE = "Invisible Backdoor Attack with Sample-Specific Triggers",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16443-16452",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157857"}

@inproceedings{bb162004,
        AUTHOR = "Doan, K. and Lao, Y.J. and Zhao, W.J. and Li, P.",
        TITLE = "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "11946-11956",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157858"}

@inproceedings{bb162005,
        AUTHOR = "Mehra, A. and Kailkhura, B. and Chen, P.Y. and Hamm, J.",
        TITLE = "How Robust are Randomized Smoothing based Defenses to Data Poisoning?",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "13239-13248",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157859"}

@inproceedings{bb162006,
        AUTHOR = "Xiang, Z. and Miller, D.J. and Chen, S. and Li, X. and Kesidis, G.",
        TITLE = "A Backdoor Attack against 3D Point Cloud Classifiers",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7577-7587",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157860"}

@inproceedings{bb162007,
        AUTHOR = "Ren, Y.K. and Li, L.F. and Zhou, J.",
        TITLE = "Simtrojan: Stealthy Backdoor Attack",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "819-823",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157861"}

@inproceedings{bb162008,
        AUTHOR = "Zhu, L. and Ning, R. and Xin, C.S. and Wang, C.G. and Wu, H.Y.",
        TITLE = "CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16433-16442",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157862"}

@inproceedings{bb162009,
        AUTHOR = "Zeng, Y. and Park, W. and Mao, Z.M. and Jia, R.X.",
        TITLE = "Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16453-16461",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157863"}

@inproceedings{bb162010,
        AUTHOR = "Raj, A. and Pal, A. and Arora, C.",
        TITLE = "Identifying Physically Realizable Triggers for Backdoored Face
Recognition Networks",
        BOOKTITLE = ICIP21,
        YEAR = "2021",
        PAGES = "3023-3027",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157864"}

@inproceedings{bb162011,
        AUTHOR = "Wang, R. and Zhang, G.Y. and Liu, S.J. and Chen, P.Y. and Xiong, J.J. and Wang, M.",
        TITLE = "Practical Detection of Trojan Neural Networks:
Data-limited and Data-free Cases",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXIII:222-238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157865"}

@inproceedings{bb162012,
        AUTHOR = "Liu, Y.F. and Ma, X.J. and Bailey, J. and Lu, F.",
        TITLE = "Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "X:182-199",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157866"}

@inproceedings{bb162013,
        AUTHOR = "Zhao, S. and Ma, X. and Zheng, X. and Bailey, J. and Chen, J. and Jiang, Y.",
        TITLE = "Clean-Label Backdoor Attacks on Video Recognition Models",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "14431-14440",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157867"}

@inproceedings{bb162014,
        AUTHOR = "Kolouri, S. and Saha, A. and Pirsiavash, H. and Hoffmann, H.",
        TITLE = "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "298-307",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157868"}

@inproceedings{bb162015,
        AUTHOR = "Truong, L. and Jones, C. and Hutchinson, B. and August, A. and Praggastis, B. and Jasper, R. and Nichols, N. and Tuor, A.",
        TITLE = "Systematic Evaluation of Backdoor Data Poisoning Attacks on Image
Classifiers",
        BOOKTITLE = AML-CV20,
        YEAR = "2020",
        PAGES = "3422-3431",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157869"}

@inproceedings{bb162016,
        AUTHOR = "Barni, M. and Kallas, K. and Tondi, B.",
        TITLE = "A New Backdoor Attack in CNNS by Training Set Corruption Without
Label Poisoning",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "101-105",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bdoor7.html#TT157870"}

@article{bb162017,
        AUTHOR = "Goldblum, M. and Tsipras, D. and Xie, C. and Chen, X.Y. and Schwarzschild, A. and Song, D. and Madry, A. and Li, B. and Goldstein, T.",
        TITLE = "Dataset Security for Machine Learning:
Data Poisoning, Backdoor Attacks, and Defenses",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "1563-1580",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157871"}

@inproceedings{bb162018,
        AUTHOR = "Mu, B.X. and Niu, Z.X. and Wang, L. and Wang, X. and Mia, Q.G. and Jin, R. and Hua, G.",
        TITLE = "Progressive Backdoor Erasing via connecting Backdoor and Adversarial
Attacks",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "20495-20503",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157872"}

@inproceedings{bb162019,
        AUTHOR = "Pang, L. and Sun, T. and Ling, H.B. and Chen, C.",
        TITLE = "Backdoor Cleansing with Unlabeled Data",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12218-12227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157873"}

@inproceedings{bb162020,
        AUTHOR = "Zhang, Z. and Liu, Q. and Wang, Z.C. and Lu, Z. and Hu, Q.Y.",
        TITLE = "Backdoor Defense via Deconfounded Representation Learning",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12228-12238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157874"}

@article{bb162021,
        AUTHOR = "Yu, Y. and Wang, Y.F. and Yang, W.H. and Guo, L.Q. and Lu, S.J. and Duan, L.Y. and Tan, Y.P. and Kot, A.C.",
        TITLE = "Robust and Transferable Backdoor Attacks Against Deep Image
Compression With Selective Frequency Prior",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "1674-1693",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157875"}

@inproceedings{bb162022,
        AUTHOR = "Yu, Y. and Wang, Y.F. and Yang, W.H. and Lu, S.J. and Tan, Y.P. and Kot, A.C.",
        TITLE = "Backdoor Attacks Against Deep Image Compression via Adaptive
Frequency Trigger",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12250-12259",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157876"}

@article{bb162023,
        AUTHOR = "Yang, W.H. and Huang, H.F. and Liu, J.Y. and Kot, A.C.",
        TITLE = "Facial Image Compression via Neural Image Manifold Compression",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "3812-3824",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157877"}

@inproceedings{bb162024,
        AUTHOR = "Feng, S.W. and Tao, G.H. and Cheng, S.Y. and Shen, G.Y. and Xu, X.Z. and Liu, Y.Q. and Zhang, K.Y. and Ma, S.Q. and Zhang, X.Y.",
        TITLE = "Detecting Backdoors in Pre-trained Encoders",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16352-16362",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157878"}

@inproceedings{bb162025,
        AUTHOR = "Liu, X. and Li, M.H. and Wang, H.Y. and Hu, S. and Ye, D. and Jin, H. and Wu, L. and Xiao, C.W.",
        TITLE = "Detecting Backdoors During the Inference Stage Based on Corruption
Robustness Consistency",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16363-16372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157879"}

@inproceedings{bb162026,
        AUTHOR = "Xu, Q. and Tao, G.N. and Honorio, J. and Liu, Y.Q. and An, S.W. and Shen, G.Y. and Cheng, S.Y. and Zhang, X.Y.",
        TITLE = "MEDIC: Remove Model Backdoors via Importance Driven Cloning",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "20485-20494",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157880"}

@inproceedings{bb162027,
        AUTHOR = "Chen, S. and Chen, H.L. and Haque, M. and Liu, C. and Yang, W.",
        TITLE = "The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency
Backdoor Injection",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "24585-24594",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157881"}

@inproceedings{bb162028,
        AUTHOR = "Bober Irizar, M. and Shumailov, I. and Zhao, Y.R. and Mullins, R. and Papernot, N.",
        TITLE = "Architectural Backdoors in Neural Networks",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "24595-24604",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157882"}

@inproceedings{bb162029,
        AUTHOR = "Yuan, Z.H. and Zhou, P. and Zou, K. and Cheng, Y.",
        TITLE = "You Are Catching My Attention: Are Vision Transformers Bad Learners
under Backdoor Attacks?",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "24605-24615",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157883"}

@inproceedings{bb162030,
        AUTHOR = "Tejankar, A. and Sanjabi, M. and Wang, Q.F. and Wang, S.N. and Firooz, H. and Pirsiavash, H. and Tan, L.",
        TITLE = "Defending Against Patch-based Backdoor Attacks on Self-Supervised
Learning",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12239-12249",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157884"}

@inproceedings{bb162031,
        AUTHOR = "Saha, A. and Tejankar, A. and Koohpayegani, S.A. and Pirsiavash, H.",
        TITLE = "Backdoor Attacks on Self-Supervised Learning",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "13327-13336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157885"}

@inproceedings{bb162032,
        AUTHOR = "Qi, X.Y. and Xie, T.H. and Pan, R.Z. and Zhu, J.F. and Yang, Y. and Bu, K.",
        TITLE = "Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
Networks",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "13337-13347",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157886"}

@inproceedings{bb162033,
        AUTHOR = "Huang, S.J. and Peng, W.Q. and Jia, Z.W. and Tu, Z.W.",
        TITLE = "One-pixel Signature: Characterizing CNN Models for Backdoor Detection",
        BOOKTITLE = ECCV20,
        YEAR = "2020",
        PAGES = "XXVII:326-341",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bkdoor5.html#TT157887"}

@article{bb162034,
        AUTHOR = "Hang, J. and Han, K. and Chen, H. and Li, Y.",
        TITLE = "Ensemble adversarial black-box attacks against deep learning systems",
        JOURNAL = PR,
        VOLUME = "101",
        YEAR = "2020",
        PAGES = "107184",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157888"}

@article{bb162035,
        AUTHOR = "Correia Silva, J.R. and Berriel, R.F. and Badue, C. and de Souza, A.F. and Oliveira Santos, T.",
        TITLE = "Copycat CNN: Are random non-Labeled data enough to steal knowledge
from black-box models?",
        JOURNAL = PR,
        VOLUME = "113",
        YEAR = "2021",
        PAGES = "107830",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157889"}

@article{bb162036,
        AUTHOR = "Gragnaniello, D. and Marra, F. and Verdoliva, L. and Poggi, G.",
        TITLE = "Perceptual quality-preserving black-box attack against deep learning
image classifiers",
        JOURNAL = PRL,
        VOLUME = "147",
        YEAR = "2021",
        PAGES = "142-149",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157890"}

@article{bb162037,
        AUTHOR = "Li, N.N. and Chen, Z.Z.",
        TITLE = "Toward Visual Distortion in Black-Box Attacks",
        JOURNAL = IP,
        VOLUME = "30",
        YEAR = "2021",
        PAGES = "6156-6167",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157891"}

@article{bb162038,
        AUTHOR = "Lin, D. and Wang, Y.G. and Tang, W.X. and Kang, X.G.",
        TITLE = "Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "2557-2561",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157892"}

@article{bb162039,
        AUTHOR = "Cina, A.E. and Torcinovich, A. and Pelillo, M.",
        TITLE = "A black-box adversarial attack for poisoning clustering",
        JOURNAL = PR,
        VOLUME = "122",
        YEAR = "2022",
        PAGES = "108306",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157893"}

@article{bb162040,
        AUTHOR = "Ghosh, A. and Mullick, S.S. and Datta, S. and Das, S. and Das, A.K. and Mallipeddi, R.",
        TITLE = "A black-box adversarial attack strategy with adjustable sparsity and
generalizability for deep image classifiers",
        JOURNAL = PR,
        VOLUME = "122",
        YEAR = "2022",
        PAGES = "108279",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157894"}

@article{bb162041,
        AUTHOR = "Chen, S. and He, F. and Huang, X.L. and Zhang, K.",
        TITLE = "Relevance attack on detectors",
        JOURNAL = PR,
        VOLUME = "124",
        YEAR = "2022",
        PAGES = "108491",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157895"}

@article{bb162042,
        AUTHOR = "Wei, X.X. and Yan, H.Q. and Li, B.",
        TITLE = "Sparse Black-Box Video Attack with Reinforcement Learning",
        JOURNAL = IJCV,
        VOLUME = "130",
        YEAR = "2022",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "1459-1473",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157896"}

@article{bb162043,
        AUTHOR = "Hu, Z.C. and Li, H. and Yuan, L.H. and Cheng, Z. and Yuan, W. and Zhu, M.",
        TITLE = "Model scheduling and sample selection for ensemble adversarial
example attacks",
        JOURNAL = PR,
        VOLUME = "130",
        YEAR = "2022",
        PAGES = "108824",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157897"}

@article{bb162044,
        AUTHOR = "Huang, L.F. and Wei, S.X. and Gao, C.Y. and Liu, N.",
        TITLE = "Cyclical Adversarial Attack Pierces Black-box Deep Neural Networks",
        JOURNAL = PR,
        VOLUME = "131",
        YEAR = "2022",
        PAGES = "108831",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157898"}

@article{bb162045,
        AUTHOR = "Lu, X. and Wan, C. and Huang, L.F.",
        TITLE = "Improving the Adversarial Transferability via Histogram
Transformation",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "3949-3953",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157899"}

@article{bb162046,
        AUTHOR = "Peng, B. and Peng, B. and Yong, S.W. and Liu, L.",
        TITLE = "An Empirical Study of Fully Black-Box and Universal Adversarial
Attack for SAR Target Recognition",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "16",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157900"}

@article{bb162047,
        AUTHOR = "Li, C. and Yao, W. and Wang, H.D. and Jiang, T.S.",
        TITLE = "Adaptive momentum variance for attention-guided sparse adversarial
attacks",
        JOURNAL = PR,
        VOLUME = "133",
        YEAR = "2023",
        PAGES = "108979",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157901"}

@article{bb162048,
        AUTHOR = "Li, T.J. and Li, M.S. and Yang, Y.H. and Deng, C.",
        TITLE = "Frequency domain regularization for iterative adversarial attacks",
        JOURNAL = PR,
        VOLUME = "134",
        YEAR = "2023",
        PAGES = "109075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157902"}

@article{bb162049,
        AUTHOR = "Dong, Y.P. and Cheng, S.Y. and Pang, T.Y. and Su, H. and Zhu, J.",
        TITLE = "Query-Efficient Black-Box Adversarial Attacks Guided by a
Transfer-Based Prior",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "9536-9548",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157903"}

@article{bb162050,
        AUTHOR = "Zhao, C.L. and Ni, B.B. and Mei, S.B.",
        TITLE = "Explore Adversarial Attack via Black Box Variational Inference",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "2088-2092",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157904"}

@article{bb162051,
        AUTHOR = "Hu, C. and Xu, H.Q. and Wu, X.J.",
        TITLE = "Substitute Meta-Learning for Black-Box Adversarial Attack",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "2472-2476",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157905"}

@article{bb162052,
        AUTHOR = "Theagarajan, R. and Bhanu, B.",
        TITLE = "Privacy Preserving Defense For Black Box Classifiers Against On-Line
Adversarial Attacks",
        JOURNAL = PAMI,
        VOLUME = "44",
        YEAR = "2022",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "9503-9520",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157906"}

@article{bb162053,
        AUTHOR = "Sun, X.X. and Cheng, G. and Li, H. and Pei, L. and Han, J.W.",
        TITLE = "On Single-Model Transferable Targeted Attacks:
A Closer Look at Decision-Level Optimization",
        JOURNAL = IP,
        VOLUME = "32",
        YEAR = "2023",
        PAGES = "2972-2984",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157907"}

@article{bb162054,
        AUTHOR = "Mao, Z.S. and Lu, Y.Q. and Cheng, Z. and Shen, X.",
        TITLE = "Enhancing transferability of adversarial examples with pixel-level
scale variation",
        JOURNAL = SP:IC,
        VOLUME = "118",
        YEAR = "2023",
        PAGES = "117020",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157908"}

@article{bb162055,
        AUTHOR = "Mumcu, F. and Yilmaz, Y.",
        TITLE = "Sequential architecture-agnostic black-box attack design and analysis",
        JOURNAL = PR,
        VOLUME = "147",
        YEAR = "2024",
        PAGES = "110066",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157909"}

@article{bb162056,
        AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Chen, X.Q.",
        TITLE = "Improving Transferability of Universal Adversarial Perturbation With
Feature Disruption",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "722-737",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157910"}

@article{bb162057,
        AUTHOR = "Yuan, Z. and Zhang, J. and Jiang, Z.Y. and Li, L.L. and Shan, S.G.",
        TITLE = "Adaptive Perturbation for Adversarial Attack",
        JOURNAL = PAMI,
        VOLUME = "46",
        YEAR = "2024",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5663-5676",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157911"}

@article{bb162058,
        AUTHOR = "Ran, R. and Wei, J. and Zhang, C.N. and Wang, G.Q. and Yang, Y. and Shen, H.T.",
        TITLE = "Adaptive Multi-scale Degradation-Based Attack for Boosting the
Adversarial Transferability",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "10979-10990",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157912"}

@article{bb162059,
        AUTHOR = "Dai, X.L. and Li, Y.J. and Duan, M.X. and Xiao, B.",
        TITLE = "Diffusion Models as Strong Adversaries",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "6734-6747",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157913"}

@article{bb162060,
        AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L. and Li, W.",
        TITLE = "Adversarial catoptric light: An effective, stealthy and robust
physical-world attack to DNNs",
        JOURNAL = IET-CV,
        VOLUME = "18",
        YEAR = "2024",
        NUMBER = "5",
        PAGES = "557-573",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157914"}

@article{bb162061,
        AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L. and Li, W.",
        TITLE = "Adversarial Neon Beam: A light-based physical attack to DNNs",
        JOURNAL = CVIU,
        VOLUME = "238",
        YEAR = "2024",
        PAGES = "103877",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157915"}

@article{bb162062,
        AUTHOR = "Hu, C.Y. and Shi, W.W. and Tian, L.",
        TITLE = "Adversarial color projection: A projector-based physical-world attack
to DNNs",
        JOURNAL = IVC,
        VOLUME = "140",
        YEAR = "2023",
        PAGES = "104861",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157916"}

@article{bb162063,
        AUTHOR = "Shi, Y.C. and Han, Y.H. and Hu, Q.H. and Yang, Y. and Tian, Q.",
        TITLE = "Query-Efficient Black-Box Adversarial Attack With Customized
Iteration and Sampling",
        JOURNAL = PAMI,
        VOLUME = "45",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "2226-2245",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157917"}

@article{bb162064,
        AUTHOR = "Zhang, Y. and Gong, Z.Q. and Zhang, Y.C. and Bin, K.C. and Li, Y.Q. and Qi, J.H. and Wen, H. and Zhong, P.",
        TITLE = "Boosting transferability of physical attack against detectors by
redistributing separable attention",
        JOURNAL = PR,
        VOLUME = "138",
        YEAR = "2023",
        PAGES = "109435",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157918"}

@article{bb162065,
        AUTHOR = "Yin, F. and Zhang, Y. and Wu, B.Y. and Feng, Y. and Zhang, J.Y. and Fan, Y.B. and Yang, Y.J.",
        TITLE = "Generalizable Black-Box Adversarial Attack With Meta Learning",
        JOURNAL = PAMI,
        VOLUME = "46",
        YEAR = "2024",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "1804-1818",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157919"}

@inproceedings{bb162066,
        AUTHOR = "Feng, Y. and Wu, B.Y. and Fan, Y.B. and Liu, L. and Li, Z.F. and Xia, S.T.",
        TITLE = "Boosting Black-Box Attack with Partially Transferred Conditional
Adversarial Distribution",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15074-15083",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157920"}

@article{bb162067,
        AUTHOR = "Lu, Y.T. and Ren, H.N. and Chai, W.H. and Velipasalar, S. and Li, Y.",
        TITLE = "Time-aware and task-transferable adversarial attack for perception of
autonomous vehicles",
        JOURNAL = PRL,
        VOLUME = "178",
        YEAR = "2024",
        PAGES = "145-152",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157921"}

@article{bb162068,
        AUTHOR = "Lu, Y.T. and Liu, N. and Li, Y. and Chen, J.C. and Velipasalar, S.",
        TITLE = "Cross-task and time-aware adversarial attack framework for perception
of autonomous driving",
        JOURNAL = PR,
        VOLUME = "165",
        YEAR = "2025",
        PAGES = "111652",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157922"}

@article{bb162069,
        AUTHOR = "Khedr, Y.M. and Liu, X. and He, K.",
        TITLE = "TransMix: Crafting highly transferable adversarial examples to evade
face recognition models",
        JOURNAL = IVC,
        VOLUME = "146",
        YEAR = "2024",
        PAGES = "105022",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157923"}

@article{bb162070,
        AUTHOR = "Huang, J.L. and Huang, G.H. and Zhang, X.H. and Yuan, X.C. and Xie, F.F. and Pun, C.M. and Zhong, G.",
        TITLE = "Black-box reversible adversarial examples with invertible neural
network",
        JOURNAL = IVC,
        VOLUME = "147",
        YEAR = "2024",
        PAGES = "105094",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157924"}

@article{bb162071,
        AUTHOR = "Huang, X.S. and Miao, D. and Wang, H.P. and Wang, Y.W. and Li, X.",
        TITLE = "Context-Guided Black-Box Attack for Visual Tracking",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "8824-8835",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157925"}

@article{bb162072,
        AUTHOR = "Qian, X.L. and Wang, W.X. and Jiang, Y.G. and Xue, X.Y. and Fu, Y.W.",
        TITLE = "Dynamic Routing and Knowledge Re-Learning for Data-Free Black-Box
Attack",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "486-501",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157926"}

@article{bb162073,
        AUTHOR = "Hu, C. and He, Z.C. and Wu, X.J.",
        TITLE = "Query-efficient black-box ensemble attack via dynamic surrogate
weighting",
        JOURNAL = PR,
        VOLUME = "161",
        YEAR = "2025",
        PAGES = "111263",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157927"}

@article{bb162074,
        AUTHOR = "Chen, J.Q. and Chen, H. and Chen, K. and Zhang, Y. and Zou, Z.X. and Shi, Z.W.",
        TITLE = "Diffusion Models for Imperceptible and Transferable Adversarial
Attack",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "961-977",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157928"}

@article{bb162075,
        AUTHOR = "Sun, X.X. and Cheng, G. and Li, H. and Lang, C. and Han, J.W.",
        TITLE = "STDatav2: Accessing Efficient Black-Box Stealing for Adversarial
Attacks",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "2429-2445",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157929"}

@inproceedings{bb162076,
        AUTHOR = "Sun, X.X. and Cheng, G. and Li, H. and Pei, L. and Han, J.W.",
        TITLE = "Exploring Effective Data for Surrogate Training Towards Black-box
Attack",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15334-15343",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157930"}

@article{bb162077,
        AUTHOR = "Li, C. and Jiang, T. and Wang, H. and Yao, W. and Wang, D.H.",
        TITLE = "Optimizing Latent Variables in Integrating Transfer and Query Based
Attack Framework",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "161-171",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157931"}

@article{bb162078,
        AUTHOR = "Cheng, R. and Wang, X.P. and Sohel, F. and Lei, H.",
        TITLE = "Black-Box Explainability-Guided Adversarial Attack for 3D Object
Tracking",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6881-6894",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157932"}

@article{bb162079,
        AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Li, C. and Chen, X.Q.",
        TITLE = "Universal Multi-View Black-Box Attack Against Object Detectors via
Layout Optimization",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7129-7142",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157933"}

@article{bb162080,
        AUTHOR = "Zheng, M.X. and Yan, X.C. and Zhu, Z. and Chen, H.R. and Wu, B.Y.",
        TITLE = "BlackboxBench: A Comprehensive Benchmark of Black-Box Adversarial
Attacks",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "7867-7885",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157934"}

@article{bb162081,
        AUTHOR = "He, S. and Zheng, S.T. and Ming, A. and Wang, Y. and Ma, H.D.",
        TITLE = "DA3Attacker: A Diffusion-Based Attacker Against Aesthetics-Oriented
Black-Box Models",
        JOURNAL = IP,
        VOLUME = "34",
        YEAR = "2025",
        PAGES = "5300-5311",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157935"}

@article{bb162082,
        AUTHOR = "Zhan, Y. and Zheng, B.L. and Liu, D.X. and Deng, B. and Yang, X.",
        TITLE = "Exploring black-box adversarial attacks on Interpretable Deep
Learning Systems",
        JOURNAL = CVIU,
        VOLUME = "259",
        YEAR = "2025",
        PAGES = "104423",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157936"}

@article{bb162083,
        AUTHOR = "Zeng, P.P. and Yuan, S.M. and Zhang, Q.L. and Deng, H.M. and Xu, H. and Gao, L.",
        TITLE = "Staircase Sign Method: Boosting adversarial attacks by mitigating
gradient distortion",
        JOURNAL = PR,
        VOLUME = "170",
        YEAR = "2026",
        PAGES = "111983",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157937"}

@article{bb162084,
        AUTHOR = "de Paz, E.G.G. and Vaquera Huerta, H. and Albores Velasco, F.J. and Bauer Mengelberg, J.R. and Romero Padilla, J.M.",
        TITLE = "Convex Partition: A Bayesian Regression Tree for Black-box
Optimisation",
        JOURNAL = PRL,
        VOLUME = "196",
        YEAR = "2025",
        PAGES = "344-350",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157938"}

@article{bb162085,
        AUTHOR = "Yu, J. and Chen, H. and Li, J.J. and Chen, L.H. and Gao, Y.D. and Liu, W.F. and Zhang, L.",
        TITLE = "Black-Box Adversarial Defense Based on Image Decomposition and
Reconstruction",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "5909-5921",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157939"}

@article{bb162086,
        AUTHOR = "Zhang, Z.X. and Wang, P. and Zheng, X.J. and Qing, L. and Liu, Q.",
        TITLE = "Beyond deceptive flatness: Dual-order solution for strengthening
adversarial transferability",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112710",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157940"}

@inproceedings{bb162087,
        AUTHOR = "Park, J. and McLaughlin, N. and Alouani, I.",
        TITLE = "Mind the Gap: Detecting Black-box Adversarial Attacks in the Making
through Query Update Analysis",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "10235-10243",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157941"}

@inproceedings{bb162088,
        AUTHOR = "Qiao, Y.Q. and Liu, D.Z. and Wang, R. and Liang, K.",
        TITLE = "Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "7582-7592",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157942"}

@inproceedings{bb162089,
        AUTHOR = "Shukla, S. and Dalui, S. and Alam, M. and Datta, S. and Mondal, A. and Mukhopadhyay, D. and Chakrabarti, P.P.",
        TITLE = "Guardian of the Ensembles: Introducing Pairwise Adversarially Robust
Loss for Resisting Adversarial Attacks in DNN Ensembles",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "7205-7214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157943"}

@inproceedings{bb162090,
        AUTHOR = "Choi, J.I. and Lan, Q.Z. and Tian, Q.",
        TITLE = "Improving Deep Detector Robustness via Detection-Related Discriminant
Maximization and Reorganization",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "1518-1527",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157944"}

@inproceedings{bb162091,
        AUTHOR = "Perla, N.K. and Hossain, M.I. and Sajeeda, A. and Shao, M.",
        TITLE = "Are Exemplar-Based Class Incremental Learning Models Victim of
Black-Box Poison Attacks?",
        BOOKTITLE = WACV25,
        YEAR = "2025",
        PAGES = "6785-6794",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157945"}

@inproceedings{bb162092,
        AUTHOR = "Zhang, X.W. and Zhang, T.Y. and Zhang, Y.T. and Liu, S.C.",
        TITLE = "Enhancing the Transferability of Adversarial Attacks with Stealth
Preservation",
        BOOKTITLE = AML24,
        YEAR = "2024",
        PAGES = "2915-2925",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157946"}

@inproceedings{bb162093,
        AUTHOR = "Ye, M. and Xu, X. and Zhang, Q. and Wu, J.",
        TITLE = "Sharpness-Aware Optimization for Real-World Adversarial Attacks for
Diverse Compute Platforms with Enhanced Transferability",
        BOOKTITLE = AML24,
        YEAR = "2024",
        PAGES = "2937-2946",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157947"}

@inproceedings{bb162094,
        AUTHOR = "Wu, H. and Ou, G. and Wu, W.B. and Zheng, Z.",
        TITLE = "Improving Transferable Targeted Adversarial Attacks with Model
Self-Enhancement",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24615-24624",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157948"}

@inproceedings{bb162095,
        AUTHOR = "Tang, B. and Wang, Z. and Bin, Y. and Dou, Q. and Yang, Y. and Shen, H.T.",
        TITLE = "Ensemble Diversity Facilitates Adversarial Transferability",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24377-24386",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157949"}

@inproceedings{bb162096,
        AUTHOR = "Dubinski, J. and Kowalczuk, A. and Pawlak, S. and Rokita, P. and Trzcinski, T. and Morawiecki, P.",
        TITLE = "Towards More Realistic Membership Inference Attacks on Large
Diffusion Models",
        BOOKTITLE = WACV24,
        YEAR = "2024",
        PAGES = "4848-4857",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157950"}

@inproceedings{bb162097,
        AUTHOR = "Wang, Z.Y. and Shen, L. and Guo, J.F. and Duan, T.H. and Luan, S. and Liu, T.L. and Gao, M.C.",
        TITLE = "Training A Secure Model Against Data-free Model Extraction",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXXIX: 323-340",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157951"}

@inproceedings{bb162098,
        AUTHOR = "Meng, L.Z. and Shao, M. and Qiao, Y.J. and Liu, W.J.",
        TITLE = "Inter-class Topology Alignment for Efficient Black-box Substitute
Attacks",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "XXXIV: 261-277",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157952"}

@inproceedings{bb162099,
        AUTHOR = "Yang, N. and Li, Z. and Long, Z. and Huang, X.L. and Zhu, C. and Liu, Y.P.",
        TITLE = "Efficient Black-Box Adversarial Attack on Deep Clustering Models",
        BOOKTITLE = ICIP24,
        YEAR = "2024",
        PAGES = "1044-1049",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654bbox6.html#TT157953"}

Last update:Jan 16, 2026 at 20:03:35