Adversarial attack on attackers: Post-process to mitigate black-box score-based query attacks

S Chen, Z Huang, Q Tao, Y Wu… - Advances in Neural …, 2022 - proceedings.neurips.cc
The score-based query attacks (SQAs) pose practical threats to deep neural networks by
crafting adversarial perturbations within dozens of queries, only using the model's output …

Boosting transferability of physical attack against detectors by redistributing separable attention

Y Zhang, Z Gong, Y Zhang, K Bin, Y Li, J Qi, H Wen… - Pattern Recognition, 2023 - Elsevier
The research on attack transferability is of great importance as it can guide how to conduct
an adversarial attack without knowing any information about target models. However, it …

Natural weather-style black-box adversarial attacks against optical aerial detectors

G Tang, W Yao, T Jiang, W Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing adversarial attack methods against detectors involve adding adversarial
perturbations to benign images to synthesize adversarial examples. However, directly …

Cyclical adversarial attack pierces black-box deep neural networks

L Huang, S Wei, C Gao, N Liu - Pattern Recognition, 2022 - Elsevier
Deep neural networks (DNNs) have shown vulnerability to adversarial attacks. By exploiting
the transferability of adversarial examples, attackers can fool models under black-box …

Investigating catastrophic overfitting in fast adversarial training: a self-fitting perspective

Z He, T Li, S Chen, X Huang - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
Although fast adversarial training provides an efficient approach for building robust
networks, it may suffer from a serious problem known as catastrophic overfitting (CO), where …

Transferable physical attack against object detection with separable attention

Y Zhang, Z Gong, Y Zhang, YQ Li, K Bin, J Qi… - arXiv preprint arXiv …, 2022 - arxiv.org
Transferable adversarial attack is always in the spotlight since deep learning models have
been demonstrated to be vulnerable to adversarial samples. However, existing physical …

Empowering Physical Attacks with Jacobian Matrix Regularization against ViT-based Detectors in UAV Remote Sensing Images

Y Zhang, Z Gong, W Liu, H Wen, P Wan… - … on Geoscience and …, 2024 - ieeexplore.ieee.org
Vision Transformers (ViTs) have achieved great success in UAV target detection tasks.
However, little attention has been paid to the adversarial attack against ViT-based detectors …

[HTML][HTML] Gradient-guided hierarchical feature attack for object detector

Y Wang, Y Zheng, L Chen, Z Yang, J Wu… - Journal of King Saud …, 2024 - Elsevier
Deep neural networks (DNNs) are vulnerable to adversarial attacks, which can cause
security risks in computer information systems. Feature disruption attacks, as a typical form …

Unifying gradients to improve real-world robustness for deep networks

Y Wu, S Chen, K Fang, X Huang - ACM Transactions on Intelligent …, 2023 - dl.acm.org
The wide application of deep neural networks (DNNs) demands an increasing amount of
attention to their real-world robustness, ie, whether a DNN resists black-box adversarial …

Query Attack by Multi-Identity Surrogates

S Chen, Z Huang, Q Tao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) are acknowledged as vulnerable to adversarial attacks while
the existing black-box attacks require extensive queries on the victim DNN to achieve high …