A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
Robustbench: a standardized adversarial robustness benchmark
As a research community, we are still lacking a systematic understanding of the progress on
adversarial robustness which often makes it hard to identify the most promising ideas in …
adversarial robustness which often makes it hard to identify the most promising ideas in …
A survey of attacks on large vision-language models: Resources, advances, and future trends
With the significant development of large models in recent years, Large Vision-Language
Models (LVLMs) have demonstrated remarkable capabilities across a wide range of …
Models (LVLMs) have demonstrated remarkable capabilities across a wide range of …
Square attack: a query-efficient black-box adversarial attack via random search
Abstract We propose the Square Attack, a score-based black-box l_2 l 2-and l_ ∞ l∞-
adversarial attack that does not rely on local gradient information and thus is not affected by …
adversarial attack that does not rely on local gradient information and thus is not affected by …
A fourier perspective on model robustness in computer vision
Achieving robustness to distributional shift is a longstanding and challenging goal of
computer vision. Data augmentation is a commonly used approach for improving …
computer vision. Data augmentation is a commonly used approach for improving …
A survey on safety-critical driving scenario generation—A methodological perspective
Autonomous driving systems have witnessed significant development during the past years
thanks to the advance in machine learning-enabled sensing and decision-making …
thanks to the advance in machine learning-enabled sensing and decision-making …
Structure invariant transformation for better adversarial transferability
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial
examples, there is an urgent need for an effective adversarial attack to identify the …
examples, there is an urgent need for an effective adversarial attack to identify the …
Explaining in style: Training a gan to explain a classifier in stylespace
Image classification models can depend on multiple different semantic attributes of the
image. An explanation of the decision of the classifier needs to both discover and visualize …
image. An explanation of the decision of the classifier needs to both discover and visualize …
Evading deepfake detectors via adversarial statistical consistency
In recent years, as various realistic face forgery techniques known as DeepFake improves
by leaps and bounds, more and more DeepFake detection techniques have been proposed …
by leaps and bounds, more and more DeepFake detection techniques have been proposed …
Improving the transferability of adversarial samples by path-augmented method
Deep neural networks have achieved unprecedented success on diverse vision tasks.
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …