Advances in adversarial attacks and defenses in computer vision: A survey

N Akhtar, A Mian, N Kardan, M Shah - IEEE Access, 2021 - ieeexplore.ieee.org
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …

Threat of adversarial attacks on deep learning in computer vision: A survey

N Akhtar, A Mian - Ieee Access, 2018 - ieeexplore.ieee.org
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …

Piecewise linear neural networks and deep learning

Q Tao, L Li, X Huang, X **, S Wang… - Nature Reviews Methods …, 2022 - nature.com
As a powerful modelling method, piecewise linear neural networks (PWLNNs) have proven
successful in various fields, most recently in deep learning. To apply PWLNN methods, both …

Frequency domain model augmentation for adversarial attack

Y Long, Q Zhang, B Zeng, L Gao, X Liu, J Zhang… - European conference on …, 2022 - Springer
For black-box attacks, the gap between the substitute model and the victim model is usually
large, which manifests as a weak attack performance. Motivated by the observation that the …

Diffusion models for imperceptible and transferable adversarial attack

J Chen, H Chen, K Chen, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Many existing adversarial attacks generate-norm perturbations on image RGB space.
Despite some achievements in transferability and attack success rate, the crafted adversarial …

Sok: Certified robustness for deep neural networks

L Li, T **e, B Li - 2023 IEEE symposium on security and privacy …, 2023 - ieeexplore.ieee.org
Great advances in deep neural networks (DNNs) have led to state-of-the-art performance on
a wide range of tasks. However, recent studies have shown that DNNs are vulnerable to …

Stochastic variance reduced ensemble adversarial attack for boosting the adversarial transferability

Y **ong, J Lin, M Zhang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The black-box adversarial attack has attracted impressive attention for its practical use in the
field of deep learning security. Meanwhile, it is very challenging as there is no access to the …

Backdoor attacks to graph neural networks

Z Zhang, J Jia, B Wang, NZ Gong - … of the 26th ACM Symposium on …, 2021 - dl.acm.org
In this work, we propose the first backdoor attack to graph neural networks (GNN).
Specifically, we propose a subgraph based backdoor attack to GNN for graph classification …

Intrinsic certified robustness of bagging against data poisoning attacks

J Jia, X Cao, NZ Gong - Proceedings of the AAAI conference on artificial …, 2021 - ojs.aaai.org
In a data poisoning attack, an attacker modifies, deletes, and/or inserts some training
examples to corrupt the learnt machine learning model. Bootstrap Aggregating (bagging) is …

An adaptive model ensemble adversarial attack for boosting adversarial transferability

B Chen, J Yin, S Chen, B Chen… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
While the transferability property of adversarial examples allows the adversary to perform
black-box attacks ie, the attacker has no knowledge about the target model), the transfer …