A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …
applications are deployed in many safe-critical systems, such as autopilot and identity …
Query efficient black-box adversarial attack on deep neural networks
Deep neural networks (DNNs) have demonstrated excellent performance on various tasks,
yet they are under the risk of adversarial examples that can be easily generated when the …
yet they are under the risk of adversarial examples that can be easily generated when the …
Cgba: curvature-aware geometric black-box attack
Decision-based black-box attacks often necessitate a large number of queries to craft an
adversarial example. Moreover, decision-based attacks based on querying boundary points …
adversarial example. Moreover, decision-based attacks based on querying boundary points …
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges
Deep learning techniques have achieved superior performance in computer-aided medical
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …
Query-efficient black-box adversarial attack with customized iteration and sampling
It is a challenging task to fool an image classifier based on deep neural networks under the
black-box setting where the target model can only be queried. Among existing black-box …
black-box setting where the target model can only be queried. Among existing black-box …
Bounceattack: A query-efficient decision-based adversarial attack by bouncing into the wild
Deep neural networks are vulnerable to adversarial attacks. We study such threats in the
decision-based black-box setting where the adversary could obtain only the predicted labels …
decision-based black-box setting where the adversary could obtain only the predicted labels …
Fight back against jailbreaking via prompt adversarial tuning
While Large Language Models (LLMs) have achieved tremendous success in various
applications, they are also susceptible to jailbreaking attacks. Several primary defense …
applications, they are also susceptible to jailbreaking attacks. Several primary defense …
Fooling Decision-Based Black-Box Automotive Vision Perception Systems in Physical World
Autonomous vehicles use deep neural networks (DNNs) to build powerful vision perception
systems, which provide a theoretical foundation for automated vehicle control. Due to the …
systems, which provide a theoretical foundation for automated vehicle control. Due to the …
Hept attack: heuristic perpendicular trial for hard-label attacks under limited query budgets
Exploring adversarial attacks on deep neural networks (DNNs) is crucial for assessing and
enhancing their adversarial robustness. Among various attack types, hard-label attacks that …
enhancing their adversarial robustness. Among various attack types, hard-label attacks that …
Towards query-efficient decision-based adversarial attacks through frequency domain
Deep neural networks are vulnerable to adversarial examples, where decision-based
attacks can generate adversarial examples based solely on the predicted labels. However …
attacks can generate adversarial examples based solely on the predicted labels. However …