Towards evaluating transfer-based attacks systematically, practically, and fairly
The adversarial vulnerability of deep neural networks (DNNs) has drawn great attention due
to the security risk of applying these models in real-world applications. Based on …
to the security risk of applying these models in real-world applications. Based on …
Practical no-box adversarial attacks with training-free hybrid image transformation
In recent years, the adversarial vulnerability of deep neural networks (DNNs) has raised
increasing attention. Among all the threat models, no-box attacks are the most practical but …
increasing attention. Among all the threat models, no-box attacks are the most practical but …
Machine learning security and privacy: a review of threats and countermeasures
Machine learning has become prevalent in transforming diverse aspects of our daily lives
through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular …
through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular …
No-box universal adversarial perturbations against image classifiers via artificial textures
N Mou, B Guo, L Zhao, C Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent advancements in adversarial attack research have seen a transition from white-box
to black-box and even no-box threat models, greatly enhancing the practicality of these …
to black-box and even no-box threat models, greatly enhancing the practicality of these …
Sok: Pitfalls in evaluating black-box attacks
Numerous works study black-box attacks on image classifiers, where adversaries generate
adversarial examples against unknown target models without having access to their internal …
adversarial examples against unknown target models without having access to their internal …
Deep keypoints adversarial attack on face recognition systems
Face recognition systems based on deep learning have recently demonstrated an
outstanding success in solving complex issues. Yet they turn out to be very vulnerable to …
outstanding success in solving complex issues. Yet they turn out to be very vulnerable to …
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code
State-of-the-art source code classification models exhibit excellent task transferability, in
which the source code encoders are first pre-trained on a source domain dataset in a self …
which the source code encoders are first pre-trained on a source domain dataset in a self …
Adversarial Examples are Misaligned in Diffusion Model Manifolds
In recent years, diffusion models (DMs) have drawn significant attention for their success in
approximating data distributions, yielding state-of-the-art generative results. Nevertheless …
approximating data distributions, yielding state-of-the-art generative results. Nevertheless …
Diffusion Models as Strong Adversaries
Diffusion models have demonstrated their great ability to generate high-quality images for
various tasks. With such a strong performance, diffusion models can potentially pose a …
various tasks. With such a strong performance, diffusion models can potentially pose a …
Expert-level diagnosis of pediatric posterior fossa tumors via consistency calibration
Accurate diagnosis of pediatric posterior fossa tumors (PFTs) is critical for saving lives;
however, the limited number of specialists makes accurate diagnostics scarce. To make the …
however, the limited number of specialists makes accurate diagnostics scarce. To make the …