Robust evaluation of diffusion-based adversarial purification
We question the current evaluation practice on diffusion-based purification methods.
Diffusion-based purification methods aim to remove adversarial effects from an input data …
Diffusion-based purification methods aim to remove adversarial effects from an input data …
Flirt: Feedback loop in-context red teaming
Warning: this paper contains content that may be inappropriate or offensive. As generative
models become available for public use in various applications, testing and analyzing …
models become available for public use in various applications, testing and analyzing …
Sparse-rs: a versatile framework for query-efficient sparse black-box adversarial attacks
We propose a versatile framework based on random search, Sparse-RS, for score-based
sparse targeted and untargeted attacks in the black-box setting. Sparse-RS does not rely on …
sparse targeted and untargeted attacks in the black-box setting. Sparse-RS does not rely on …
TEAR: Exploring temporal evolution of adversarial robustness for membership inference attacks against federated learning
Federated learning (FL) is a privacy-preserving machine learning paradigm that enables
multiple clients to train a unified model without disclosing their private data. However …
multiple clients to train a unified model without disclosing their private data. However …
Exploring misclassifications of robust neural networks to enhance adversarial attacks
Progress in making neural networks more robust against adversarial attacks is mostly
marginal, despite the great efforts of the research community. Moreover, the robustness …
marginal, despite the great efforts of the research community. Moreover, the robustness …
A Review of Adversarial Attacks in Computer Vision
Y Zhang, Y Li, Y Li, Z Guo - arxiv preprint arxiv:2308.07673, 2023 - arxiv.org
Deep neural networks have been widely used in various downstream tasks, especially those
safety-critical scenario such as autonomous driving, but deep networks are often threatened …
safety-critical scenario such as autonomous driving, but deep networks are often threatened …
Augmented lagrangian adversarial attacks
Adversarial attack algorithms are dominated by penalty methods, which are slow in practice,
or more efficient distance-customized methods, which are heavily tailored to the properties …
or more efficient distance-customized methods, which are heavily tailored to the properties …
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the
training data of machine learning models, thereby manipulating their behavior. This process …
training data of machine learning models, thereby manipulating their behavior. This process …
Proximal splitting adversarial attack for semantic segmentation
Classification has been the focal point of research on adversarial attacks, but only a few
works investigate methods suited to denser prediction tasks, such as semantic …
works investigate methods suited to denser prediction tasks, such as semantic …
Minimum topology attacks for graph neural networks
With the great popularity of Graph Neural Networks (GNNs), their robustness to adversarial
topology attacks has received significant attention. Although many attack methods have …
topology attacks has received significant attention. Although many attack methods have …