Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
Deep learning has been widely applied in various fields such as computer vision, natural
language processing, and data mining. Although deep learning has achieved significant …
language processing, and data mining. Although deep learning has achieved significant …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
Improving adversarial transferability via neuron attribution-based attacks
Deep neural networks (DNNs) are known to be vulnerable to adversarial examples. It is thus
imperative to devise effective attack algorithms to identify the deficiencies of DNNs …
imperative to devise effective attack algorithms to identify the deficiencies of DNNs …
Shadows can be dangerous: Stealthy and effective physical-world adversarial attack by natural phenomenon
Y Zhong, X Liu, D Zhai, J Jiang… - Proceedings of the IEEE …, 2022 - openaccess.thecvf.com
Estimating the risk level of adversarial examples is essential for safely deploying machine
learning models in the real world. One popular approach for physical-world attacks is to …
learning models in the real world. One popular approach for physical-world attacks is to …
Structure invariant transformation for better adversarial transferability
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial
examples, there is an urgent need for an effective adversarial attack to identify the …
examples, there is an urgent need for an effective adversarial attack to identify the …
Improving the transferability of adversarial samples by path-augmented method
Deep neural networks have achieved unprecedented success on diverse vision tasks.
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …
However, they are vulnerable to adversarial noise that is imperceptible to humans. This …
Transferable adversarial attacks on vision transformers with token gradient regularization
Vision transformers (ViTs) have been successfully deployed in a variety of computer vision
tasks, but they are still vulnerable to adversarial samples. Transfer-based attacks use a local …
tasks, but they are still vulnerable to adversarial samples. Transfer-based attacks use a local …
Towards transferable adversarial attacks on vision transformers
Vision transformers (ViTs) have demonstrated impressive performance on a series of
computer vision tasks, yet they still suffer from adversarial examples. In this paper, we posit …
computer vision tasks, yet they still suffer from adversarial examples. In this paper, we posit …
Improving the transferability of adversarial samples with adversarial transformations
Although deep neural networks (DNNs) have achieved tremendous performance in diverse
vision challenges, they are surprisingly susceptible to adversarial examples, which are born …
vision challenges, they are surprisingly susceptible to adversarial examples, which are born …