Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget

C Li, W Yao, H Wang, T Jiang, X Zhang - Applied Soft Computing, 2023 - Elsevier
Due to the importance of security, the adversarial attack has become an increasingly
popular area for deep learning, especially the black-box adversarial attack, which can only …

Natural weather-style black-box adversarial attacks against optical aerial detectors

G Tang, W Yao, T Jiang, W Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing adversarial attack methods against detectors involve adding adversarial
perturbations to benign images to synthesize adversarial examples. However, directly …

Imperceptible and sparse adversarial attacks via a dual-population-based constrained evolutionary algorithm

Y Tian, J Pan, S Yang, X Zhang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
The sparse adversarial attack has attracted increasing attention due to the merit of a low
attack cost via changing a small number of pixels. However, the generated adversarial …

Evolutionary multilabel adversarial examples: An effective black-box attack

L Kong, W Luo, H Zhang, Y Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Studies have shown that deep neural networks (DNNs) are vulnerable to adversarial attack.
Minor malicious modifications of examples will lead to the DNN misclassification. Such …

Hierarchical distribution-aware testing of deep learning

W Huang, X Zhao, A Banks, V Cox… - ACM Transactions on …, 2023 - dl.acm.org
With its growing use in safety/security-critical applications, Deep Learning (DL) has raised
increasing concerns regarding its dependability. In particular, DL has a notorious problem of …

Evoattack: An evolutionary search-based adversarial attack for object detection models

K Chan, BHC Cheng - International Symposium on Search Based …, 2022 - Springer
State-of-the-art deep neural networks in image classification, recognition, and detection
tasks are increasingly being used in a range of real-world applications. Applications include …

A two-stage frequency-domain generation algorithm based on differential evolution for black-box adversarial samples

X Song, D Xu, C Peng, Y Zhang, Y Xue - Expert Systems with Applications, 2024 - Elsevier
Adversarial sample generation problem is a hot issue in the security field of deep learning.
Evolutionary algorithm has been widely used to solve this problem in recent years because …

Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors

G Tang, W Yao, C Li, T Jiang, S Yang - Engineering Applications of …, 2024 - Elsevier
Adversarial patch attacks are commonly used to attack aerial imagery object detectors.
However, most existing methods are designed for white-box settings, which are impractical …

MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection

Z Liu, F Lin, Z Ba, L Lu, K Ren - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Physical adversarial examples (AEs) have become an increasing threat to deploying deep
neural network (DNN) models in the real world. Popular approaches adopt sticking-based or …

On the privacy issue of evolutionary biparty multiobjective optimization

Z She, W Luo, Y Chang, Z Song, Y Shi - International Conference on …, 2023 - Springer
Some evolutionary algorithms have been proposed to address biparty multiobjective
optimization problems (BPMOPs). However, all these algorithms are centralized algorithms …