A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …
applications are deployed in many safe-critical systems, such as autopilot and identity …
Improving the transferability of adversarial samples by path-augmented method
Deep neural networks have achieved unprecedented success on diverse vision tasks.
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …
Transferable adversarial attacks on vision transformers with token gradient regularization
Vision transformers (ViTs) have been successfully deployed in a variety of computer vision
tasks, but they are still vulnerable to adversarial samples. Transfer-based attacks use a local …
tasks, but they are still vulnerable to adversarial samples. Transfer-based attacks use a local …
Sibling-attack: Rethinking transferable adversarial attacks against face recognition
A hard challenge in developing practical face recognition (FR) attacks is due to the black-
box nature of the target FR model, ie, inaccessible gradient and parameter information to …
box nature of the target FR model, ie, inaccessible gradient and parameter information to …
A survey of attacks on large vision-language models: Resources, advances, and future trends
With the significant development of large models in recent years, Large Vision-Language
Models (LVLMs) have demonstrated remarkable capabilities across a wide range of …
Models (LVLMs) have demonstrated remarkable capabilities across a wide range of …
An adaptive model ensemble adversarial attack for boosting adversarial transferability
While the transferability property of adversarial examples allows the adversary to perform
black-box attacks ie, the attacker has no knowledge about the target model), the transfer …
black-box attacks ie, the attacker has no knowledge about the target model), the transfer …
A survey on transferability of adversarial examples across deep neural networks
The emergence of Deep Neural Networks (DNNs) has revolutionized various domains,
enabling the resolution of complex tasks spanning image recognition, natural language …
enabling the resolution of complex tasks spanning image recognition, natural language …
Harnessing perceptual adversarial patches for crowd counting
Crowd counting, which has been widely adopted for estimating the number of people in
safety-critical scenes, is shown to be vulnerable to adversarial examples in the physical …
safety-critical scenes, is shown to be vulnerable to adversarial examples in the physical …
Revisiting the transferability of adversarial examples via source-agnostic adversarial feature inducing method
Though deep neural networks (DNNs) have revealed their extraordinary performance in the
fields of computer vision, it is evident that the vulnerability of DNNs to adversarial attacks …
fields of computer vision, it is evident that the vulnerability of DNNs to adversarial attacks …
Mttm: Metamorphic testing for textual content moderation software
The exponential growth of social media platforms such as Twitter and Facebook has
revolutionized textual communication and textual content publication in human society …
revolutionized textual communication and textual content publication in human society …