A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks

Y Li, B Xie, S Guo, Y Yang, B Xiao - ACM Computing Surveys, 2024 - dl.acm.org
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …

Query efficient black-box adversarial attack on deep neural networks

Y Bai, Y Wang, Y Zeng, Y Jiang, ST Xia - Pattern Recognition, 2023 - Elsevier
Deep neural networks (DNNs) have demonstrated excellent performance on various tasks,
yet they are under the risk of adversarial examples that can be easily generated when the …

Cgba: curvature-aware geometric black-box attack

MF Reza, A Rahmati, T Wu… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Decision-based black-box attacks often necessitate a large number of queries to craft an
adversarial example. Moreover, decision-based attacks based on querying boundary points …

Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges

J Dong, J Chen, X Xie, J Lai, H Chen - ACM Computing Surveys, 2024 - dl.acm.org
Deep learning techniques have achieved superior performance in computer-aided medical
image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in …

Query-efficient black-box adversarial attack with customized iteration and sampling

Y Shi, Y Han, Q Hu, Y Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
It is a challenging task to fool an image classifier based on deep neural networks under the
black-box setting where the target model can only be queried. Among existing black-box …

Bounceattack: A query-efficient decision-based adversarial attack by bouncing into the wild

J Wan, J Fu, L Wang, Z Yang - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Deep neural networks are vulnerable to adversarial attacks. We study such threats in the
decision-based black-box setting where the adversary could obtain only the predicted labels …

Fight back against jailbreaking via prompt adversarial tuning

Y Mo, Y Wang, Z Wei, Y Wang - The Thirty-eighth Annual …, 2024 - openreview.net
While Large Language Models (LLMs) have achieved tremendous success in various
applications, they are also susceptible to jailbreaking attacks. Several primary defense …

Fooling Decision-Based Black-Box Automotive Vision Perception Systems in Physical World

W Jia, Z Lu, R Yu, L Li, H Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Autonomous vehicles use deep neural networks (DNNs) to build powerful vision perception
systems, which provide a theoretical foundation for automated vehicle control. Due to the …

Hept attack: heuristic perpendicular trial for hard-label attacks under limited query budgets

Q Li, X Li, X Cui, K Tang, P Zhu - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Exploring adversarial attacks on deep neural networks (DNNs) is crucial for assessing and
enhancing their adversarial robustness. Among various attack types, hard-label attacks that …

Towards query-efficient decision-based adversarial attacks through frequency domain

J Fu, X Ling, Y Qian, C Li, T Luo… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Deep neural networks are vulnerable to adversarial examples, where decision-based
attacks can generate adversarial examples based solely on the predicted labels. However …