Adversarial attack on attackers: Post-process to mitigate black-box score-based query attacks
The score-based query attacks (SQAs) pose practical threats to deep neural networks by
crafting adversarial perturbations within dozens of queries, only using the model's output …
crafting adversarial perturbations within dozens of queries, only using the model's output …
Boosting transferability of physical attack against detectors by redistributing separable attention
Y Zhang, Z Gong, Y Zhang, K Bin, Y Li, J Qi, H Wen… - Pattern Recognition, 2023 - Elsevier
The research on attack transferability is of great importance as it can guide how to conduct
an adversarial attack without knowing any information about target models. However, it …
an adversarial attack without knowing any information about target models. However, it …
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing adversarial attack methods against detectors involve adding adversarial
perturbations to benign images to synthesize adversarial examples. However, directly …
perturbations to benign images to synthesize adversarial examples. However, directly …
Cyclical adversarial attack pierces black-box deep neural networks
Deep neural networks (DNNs) have shown vulnerability to adversarial attacks. By exploiting
the transferability of adversarial examples, attackers can fool models under black-box …
the transferability of adversarial examples, attackers can fool models under black-box …
Investigating catastrophic overfitting in fast adversarial training: a self-fitting perspective
Although fast adversarial training provides an efficient approach for building robust
networks, it may suffer from a serious problem known as catastrophic overfitting (CO), where …
networks, it may suffer from a serious problem known as catastrophic overfitting (CO), where …
Transferable physical attack against object detection with separable attention
Y Zhang, Z Gong, Y Zhang, YQ Li, K Bin, J Qi… - arXiv preprint arXiv …, 2022 - arxiv.org
Transferable adversarial attack is always in the spotlight since deep learning models have
been demonstrated to be vulnerable to adversarial samples. However, existing physical …
been demonstrated to be vulnerable to adversarial samples. However, existing physical …
Empowering Physical Attacks with Jacobian Matrix Regularization against ViT-based Detectors in UAV Remote Sensing Images
Y Zhang, Z Gong, W Liu, H Wen, P Wan… - … on Geoscience and …, 2024 - ieeexplore.ieee.org
Vision Transformers (ViTs) have achieved great success in UAV target detection tasks.
However, little attention has been paid to the adversarial attack against ViT-based detectors …
However, little attention has been paid to the adversarial attack against ViT-based detectors …
[HTML][HTML] Gradient-guided hierarchical feature attack for object detector
Y Wang, Y Zheng, L Chen, Z Yang, J Wu… - Journal of King Saud …, 2024 - Elsevier
Deep neural networks (DNNs) are vulnerable to adversarial attacks, which can cause
security risks in computer information systems. Feature disruption attacks, as a typical form …
security risks in computer information systems. Feature disruption attacks, as a typical form …
Unifying gradients to improve real-world robustness for deep networks
The wide application of deep neural networks (DNNs) demands an increasing amount of
attention to their real-world robustness, ie, whether a DNN resists black-box adversarial …
attention to their real-world robustness, ie, whether a DNN resists black-box adversarial …
Query Attack by Multi-Identity Surrogates
Deep neural networks (DNNs) are acknowledged as vulnerable to adversarial attacks while
the existing black-box attacks require extensive queries on the victim DNN to achieve high …
the existing black-box attacks require extensive queries on the victim DNN to achieve high …