Towards a physical-world adversarial patch for blinding object detection models Y Wang, H Lv, X Kuang, G Zhao, Y Tan, Q Zhang, J Hu Information Sciences 556, 459-471, 2021 | 75 | 2021 |
An adversarial attack on DNN-based black-box object detectors Y Wang, Y Tan, W Zhang, Y Zhao, X Kuang Journal of Network and Computer Applications 161, 102634, 2020 | 65 | 2020 |
Demiguise attack: Crafting invisible semantic adversarial perturbations with perceptual similarity Y Wang, S Wu, W Jiang, S Hao, Y Tan, Q Zhang arXiv preprint arXiv:2107.01396, 2021 | 34 | 2021 |
Backdoor attacks on image classification models in deep neural networks Q Zhang, W Ma, Y Wang, Y Zhang, Z Shi, Y Li Chinese Journal of Electronics 31 (2), 199-212, 2022 | 25 | 2022 |
Stealthy and flexible trojan in deep learning framework Y Wang, K Chen, Y Tan, S Huang, W Ma, Y Li IEEE Transactions on Dependable and Secure Computing 20 (3), 1789-1798, 2022 | 23 | 2022 |
Towards cross-task universal perturbation against black-box object detectors in autonomous driving Q Zhang, Y Zhao, Y Wang, T Baker, J Zhang, J Hu Computer Networks 180, 107388, 2020 | 21 | 2020 |
A multitarget backdooring attack on deep neural networks with random location trigger Y Xiao, L Cong, Z Mingwen, W Yajie, L Xinrui, S Shuxiao, M Yuexuan, ... International Journal of Intelligent Systems 37 (3), 2567-2583, 2022 | 19 | 2022 |
Deep fusion: Crafting transferable adversarial examples and improving robustness of industrial artificial intelligence of things Y Wang, Y Tan, T Baker, N Kumar, Q Zhang IEEE Transactions on Industrial Informatics 19 (6), 7480-7488, 2022 | 13 | 2022 |
Enhancing clean label backdoor attack with two-phase specific triggers N Luo, Y Li, Y Wang, S Wu, Y Tan, Q Zhang arXiv preprint arXiv:2206.04881, 2022 | 10 | 2022 |
A CMA‐ES‐Based Adversarial Attack Against Black‐Box Object Detectors LYU Haoran, TAN Yu'an, XUE Yuan, W Yajie, XUE Jingfeng Chinese Journal of Electronics 30 (3), 406-412, 2021 | 10 | 2021 |
Unrestricted adversarial attacks on imagenet competition Y Chen, X Mao, Y He, H Xue, C Li, Y Dong, QA Fu, X Yang, W Xiang, ... arXiv preprint arXiv:2110.09903, 2021 | 9 | 2021 |
l-leaks: Membership inference attacks with logits S Li, Y Wang, Y Li, Y Tan arXiv preprint arXiv:2205.06469, 2022 | 4 | 2022 |
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches H Zhou, Y Tan, Y Wang, H Lyu, S Wu, Y Li arXiv preprint arXiv:2204.12680, 2022 | 2 | 2022 |
Boosting Adversarial Transferability of MLP-Mixer H Lyu, Y Wang, Y Tan, H Zhou, Y Zhao, Q Zhang arXiv preprint arXiv:2204.12204, 2022 | 1 | 2022 |