Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

Membership leakage in label-only exposures

Z Li, Y Zhang - Proceedings of the 2021 ACM SIGSAC Conference on …, 2021 - dl.acm.org
Machine learning (ML) has been widely adopted in various privacy-critical applications, eg,
face recognition and medical image analysis. However, recent research has shown that ML …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Unraveling Attacks to Machine Learning-Based IoT Systems: A Survey and the Open Libraries Behind Them

C Liu, B Chen, W Shao, C Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) has brought forth an era of unprecedented
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …

Structure invariant transformation for better adversarial transferability

X Wang, Z Zhang, J Zhang - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial
examples, there is an urgent need for an effective adversarial attack to identify the …

Query-efficient decision-based black-box patch attack

Z Chen, B Li, S Wu, S Ding… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been showed to be highly vulnerable to imperceptible
adversarial perturbations. As a complementary type of adversary, patch attacks that …

Query efficient black-box adversarial attack on deep neural networks

Y Bai, Y Wang, Y Zeng, Y Jiang, ST Xia - Pattern Recognition, 2023 - Elsevier
Deep neural networks (DNNs) have demonstrated excellent performance on various tasks,
yet they are under the risk of adversarial examples that can be easily generated when the …

Adv-attribute: Inconspicuous and transferable adversarial attack on face recognition

S Jia, B Yin, T Yao, S Ding, C Shen… - Advances in Neural …, 2022 - proceedings.neurips.cc
Deep learning models have shown their vulnerability when dealing with adversarial attacks.
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …

Surfree: a fast surrogate-free black-box attack

T Maho, T Furon, E Le Merrer - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Abstract Machine learning classifiers are critically prone to evasion attacks. Adversarial
examples are slightly modified inputs that are then misclassified, while remaining …

Triangle attack: A query-efficient decision-based adversarial attack

X Wang, Z Zhang, K Tong, D Gong, K He, Z Li… - European conference on …, 2022 - Springer
Decision-based attack poses a severe threat to real-world applications since it regards the
target model as a black box and only accesses the hard prediction label. Great efforts have …