Robust evaluation of diffusion-based adversarial purification

M Lee, D Kim - Proceedings of the IEEE/CVF International …, 2023 - openaccess.thecvf.com
We question the current evaluation practice on diffusion-based purification methods.
Diffusion-based purification methods aim to remove adversarial effects from an input data …

Flirt: Feedback loop in-context red teaming

N Mehrabi, P Goyal, C Dupuy, Q Hu, S Ghosh… - arxiv preprint arxiv …, 2023 - arxiv.org
Warning: this paper contains content that may be inappropriate or offensive. As generative
models become available for public use in various applications, testing and analyzing …

Sparse-rs: a versatile framework for query-efficient sparse black-box adversarial attacks

F Croce, M Andriushchenko, ND Singh… - Proceedings of the …, 2022 - ojs.aaai.org
We propose a versatile framework based on random search, Sparse-RS, for score-based
sparse targeted and untargeted attacks in the black-box setting. Sparse-RS does not rely on …

TEAR: Exploring temporal evolution of adversarial robustness for membership inference attacks against federated learning

G Liu, Z Tian, J Chen, C Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is a privacy-preserving machine learning paradigm that enables
multiple clients to train a unified model without disclosing their private data. However …

Exploring misclassifications of robust neural networks to enhance adversarial attacks

L Schwinn, R Raab, A Nguyen, D Zanca, B Eskofier - Applied Intelligence, 2023 - Springer
Progress in making neural networks more robust against adversarial attacks is mostly
marginal, despite the great efforts of the research community. Moreover, the robustness …

A Review of Adversarial Attacks in Computer Vision

Y Zhang, Y Li, Y Li, Z Guo - arxiv preprint arxiv:2308.07673, 2023 - arxiv.org
Deep neural networks have been widely used in various downstream tasks, especially those
safety-critical scenario such as autonomous driving, but deep networks are often threatened …

Augmented lagrangian adversarial attacks

J Rony, E Granger, M Pedersoli… - Proceedings of the …, 2021 - openaccess.thecvf.com
Adversarial attack algorithms are dominated by penalty methods, which are slow in practice,
or more efficient distance-customized methods, which are heavily tailored to the properties …

The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models

T Chaalan, S Pang, J Kamruzzaman, I Gondal… - ACM Computing …, 2024 - dl.acm.org
Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the
training data of machine learning models, thereby manipulating their behavior. This process …

Proximal splitting adversarial attack for semantic segmentation

J Rony, JC Pesquet, I Ben Ayed - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Classification has been the focal point of research on adversarial attacks, but only a few
works investigate methods suited to denser prediction tasks, such as semantic …

Minimum topology attacks for graph neural networks

M Zhang, X Wang, C Shi, L Lyu, T Yang… - Proceedings of the ACM …, 2023 - dl.acm.org
With the great popularity of Graph Neural Networks (GNNs), their robustness to adversarial
topology attacks has received significant attention. Although many attack methods have …