Dynamic generative targeted attacks with pattern injection

W Feng, N Xu, T Zhang… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Adversarial attacks can evaluate model robustness and have been of great concerns in
recent years. Among various attacks, targeted attacks aim at misleading victim models to …

Understanding and improving ensemble adversarial defense

Y Deng, T Mu - Advances in Neural Information Processing …, 2024 - proceedings.neurips.cc
The strategy of ensemble has become popular in adversarial defense, which trains multiple
base classifiers to defend against adversarial attacks in a cooperative manner. Despite the …

CLIP-Guided Generative Networks for Transferable Targeted Adversarial Attacks

H Fang, J Kong, B Chen, T Dai, H Wu… - European Conference on …, 2025 - Springer
Transferable targeted adversarial attacks aim to mislead models into outputting adversary-
specified predictions in black-box scenarios. Recent studies have introduced single-target …

Inspector for Face Forgery Detection: Defending Against Adversarial Attacks From Coarse to Fine

R Xia, D Zhou, D Liu, J Li, L Yuan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The emergence of face forgery has raised global concerns on social security, thereby
facilitating the research on automatic forgery detection. Although current forgery detectors …

Improving the adversarial transferability with relational graphs ensemble adversarial attack

J Pi, C Luo, F Xia, N Jiang, H Wu, Z Wu - Frontiers in Neuroscience, 2023 - frontiersin.org
In transferable black-box attacks, adversarial samples remain adversarial across multiple
models and are more likely to attack unknown models. From this view, acquiring and …

Lp-norm distortion-efficient adversarial attack

C Zhou, YG Wang, ZJ Wang, X Kang - Signal Processing: Image …, 2025 - Elsevier
Adversarial examples have shown a powerful ability to make a well-trained model
misclassified. Current mainstream adversarial attack methods only consider one of the …

[PDF][PDF] Boosting the Transferability of Adversarial Examples with Gradient-Aligned Ensemble Attack for Speaker Recognition

Z Li, J Zhang, W Guo, H Wu - Proc. Interspeech 2024, 2024 - isca-archive.org
In the black-box attack for speaker recognition systems, the adversarial examples can
exhibit better transferability for unseen victim system if they can consistently spoof an …

Differential Geometry Inspired Machine Learning Solutions

Y Deng - 2024 - search.proquest.com
DIFFERENTIAL GEOMETRY INSPIRED MACHINE LEARNING SOLUTIONS Page 1
DIFFERENTIAL GEOMETRY INSPIRED MACHINE LEARNING SOLUTIONS Athesis …