Improving the adversarial transferability of vision transformers with virtual dense connection

J Zhang, Y Huang, Z Xu, W Wu, MR Lyu - Proceedings of the AAAI …, 2024 - ojs.aaai.org
With the great achievement of vision transformers (ViTs), transformer-based approaches
have become the new paradigm for solving various computer vision tasks. However, recent …

Improving Transferable Targeted Adversarial Attacks with Model Self-Enhancement

H Wu, G Ou, W Wu, Z Zheng - Proceedings of the IEEE/CVF …, 2024 - openaccess.thecvf.com
Various transfer attack methods have been proposed to evaluate the robustness of deep
neural networks (DNNs). Although manifesting remarkable performance in generating …

Curvature-invariant adversarial attacks for 3d point clouds

J Zhang, W Gu, Y Huang, Z Jiang, W Wu… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
Imperceptibility is one of the crucial requirements for adversarial examples. Previous
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …

Your code secret belongs to me: neural code completion tools can memorize hard-coded credentials

Y Huang, Y Li, W Wu, J Zhang, MR Lyu - Proceedings of the ACM on …, 2024 - dl.acm.org
Neural Code Completion Tools (NCCTs) have reshaped the field of software engineering,
which are built upon the language modeling technique and can accurately suggest …

Attention-SA: Exploiting Model-approximated Data Semantics for Adversarial Attack

Q Li, Q Hu, H Fan, C Lin, C Shen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Adversarial Defense of deep neural networks have gained significant attention and there
have been active research efforts on model vulnerabilities for attacking such as gradient …

Large Language Models are Good Multi-lingual Learners: When LLMs Meet Cross-lingual Prompts

T Wang, Z He, WY Yu, X Fu, X Han - arxiv preprint arxiv:2409.11056, 2024 - arxiv.org
With the advent of Large Language Models (LLMs), generating rule-based data for real-
world applications has become more accessible. Due to the inherent ambiguity of natural …

Probing the robustness of vision-language pretrained models: A multimodal adversarial attack approach

J Guan, T Ding, L Cao, L Pan, C Wang… - arxiv preprint arxiv …, 2024 - arxiv.org
Vision-language pretraining (VLP) with transformers has demonstrated exceptional
performance across numerous multimodal tasks. However, the adversarial robustness of …

[PDF][PDF] IntensPure: attack intensity-aware secondary domain adaptive diffusion for adversarial purification

EG Lee, MS Lee, JH Yoon, SB Yoo - … of the Thirty-Third International Joint …, 2024 - ijcai.org
Adversarial attacks pose a severe threat to the accuracy of person re-identification (re-ID)
systems, a critical security technology. Adversarial purification methods are promising …