Towards evaluating transfer-based attacks systematically, practically, and fairly

Q Li, Y Guo, W Zuo, H Chen - Advances in Neural …, 2024 - proceedings.neurips.cc
The adversarial vulnerability of deep neural networks (DNNs) has drawn great attention due
to the security risk of applying these models in real-world applications. Based on …

Practical no-box adversarial attacks with training-free hybrid image transformation

Q Zhang, C Zhang, C Li, J Song, L Gao - arXiv preprint arXiv:2203.04607, 2022 - arxiv.org
In recent years, the adversarial vulnerability of deep neural networks (DNNs) has raised
increasing attention. Among all the threat models, no-box attacks are the most practical but …

Machine learning security and privacy: a review of threats and countermeasures

A Paracha, J Arshad, MB Farah, K Ismail - EURASIP Journal on …, 2024 - Springer
Machine learning has become prevalent in transforming diverse aspects of our daily lives
through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular …

No-box universal adversarial perturbations against image classifiers via artificial textures

N Mou, B Guo, L Zhao, C Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent advancements in adversarial attack research have seen a transition from white-box
to black-box and even no-box threat models, greatly enhancing the practicality of these …

Sok: Pitfalls in evaluating black-box attacks

F Suya, A Suri, T Zhang, J Hong… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Numerous works study black-box attacks on image classifiers, where adversaries generate
adversarial examples against unknown target models without having access to their internal …

Deep keypoints adversarial attack on face recognition systems

E BenSaid, M Neji, M Jabberi, AM Alimi - Neurocomputing, 2025 - Elsevier
Face recognition systems based on deep learning have recently demonstrated an
outstanding success in solving complex issues. Yet they turn out to be very vulnerable to …

Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code

Y Yang, H Fan, C Lin, Q Li, Z Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
State-of-the-art source code classification models exhibit excellent task transferability, in
which the source code encoders are first pre-trained on a source domain dataset in a self …

Adversarial Examples are Misaligned in Diffusion Model Manifolds

P Lorenz, R Durall, J Keuper - 2024 International Joint …, 2024 - ieeexplore.ieee.org
In recent years, diffusion models (DMs) have drawn significant attention for their success in
approximating data distributions, yielding state-of-the-art generative results. Nevertheless …

Diffusion Models as Strong Adversaries

X Dai, Y Li, M Duan, B Xiao - IEEE Transactions on Image …, 2024 - ieeexplore.ieee.org
Diffusion models have demonstrated their great ability to generate high-quality images for
various tasks. With such a strong performance, diffusion models can potentially pose a …

Expert-level diagnosis of pediatric posterior fossa tumors via consistency calibration

C Sun, Z Yan, Y Zhang, X Tian, J Gong - Knowledge-Based Systems, 2024 - Elsevier
Accurate diagnosis of pediatric posterior fossa tumors (PFTs) is critical for saving lives;
however, the limited number of specialists makes accurate diagnostics scarce. To make the …