Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Physical adversarial attack meets computer vision: A decade survey

H Wei, H Tang, X Jia, Z Wang, H Yu, Z Li… - … on Pattern Analysis …, 2024 - ieeexplore.ieee.org
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision,
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …

LAS-AT: adversarial training with learnable attack strategy

X Jia, Y Zhang, B Wu, K Ma… - Proceedings of the …, 2022 - openaccess.thecvf.com
Adversarial training (AT) is always formulated as a minimax problem, of which the
performance depends on the inner optimization that involves the generation of adversarial …

Deep learning for face anti-spoofing: A survey

Z Yu, Y Qin, X Li, C Zhao, Z Lei… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …

Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer

S Hu, X Liu, Y Zhang, M Li… - Proceedings of the …, 2022 - openaccess.thecvf.com
While deep face recognition (FR) systems have shown amazing performance in
identification and verification, they also arouse privacy concerns for their excessive …

Query-efficient decision-based black-box patch attack

Z Chen, B Li, S Wu, S Ding… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been showed to be highly vulnerable to imperceptible
adversarial perturbations. As a complementary type of adversary, patch attacks that …

Exploring frequency adversarial attacks for face forgery detection

S Jia, C Ma, T Yao, B Yin, S Ding… - Proceedings of the …, 2022 - openaccess.thecvf.com
Various facial manipulation techniques have drawn serious public concerns in morality,
security, and privacy. Although existing face forgery classifiers achieve promising …

Sibling-attack: Rethinking transferable adversarial attacks against face recognition

Z Li, B Yin, T Yao, J Guo, S Ding… - Proceedings of the …, 2023 - openaccess.thecvf.com
A hard challenge in develo** practical face recognition (FR) attacks is due to the black-
box nature of the target FR model, ie, inaccessible gradient and parameter information to …

Adv-attribute: Inconspicuous and transferable adversarial attack on face recognition

S Jia, B Yin, T Yao, S Ding, C Shen… - Advances in Neural …, 2022 - proceedings.neurips.cc
Deep learning models have shown their vulnerability when dealing with adversarial attacks.
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …

Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search

F Shamshad, M Naseer… - Proceedings of the …, 2023 - openaccess.thecvf.com
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …