Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget
Due to the importance of security, the adversarial attack has become an increasingly
popular area for deep learning, especially the black-box adversarial attack, which can only …
popular area for deep learning, especially the black-box adversarial attack, which can only …
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing adversarial attack methods against detectors involve adding adversarial
perturbations to benign images to synthesize adversarial examples. However, directly …
perturbations to benign images to synthesize adversarial examples. However, directly …
Imperceptible and sparse adversarial attacks via a dual-population-based constrained evolutionary algorithm
The sparse adversarial attack has attracted increasing attention due to the merit of a low
attack cost via changing a small number of pixels. However, the generated adversarial …
attack cost via changing a small number of pixels. However, the generated adversarial …
Evolutionary multilabel adversarial examples: An effective black-box attack
Studies have shown that deep neural networks (DNNs) are vulnerable to adversarial attack.
Minor malicious modifications of examples will lead to the DNN misclassification. Such …
Minor malicious modifications of examples will lead to the DNN misclassification. Such …
Hierarchical distribution-aware testing of deep learning
With its growing use in safety/security-critical applications, Deep Learning (DL) has raised
increasing concerns regarding its dependability. In particular, DL has a notorious problem of …
increasing concerns regarding its dependability. In particular, DL has a notorious problem of …
Evoattack: An evolutionary search-based adversarial attack for object detection models
State-of-the-art deep neural networks in image classification, recognition, and detection
tasks are increasingly being used in a range of real-world applications. Applications include …
tasks are increasingly being used in a range of real-world applications. Applications include …
A two-stage frequency-domain generation algorithm based on differential evolution for black-box adversarial samples
X Song, D Xu, C Peng, Y Zhang, Y Xue - Expert Systems with Applications, 2024 - Elsevier
Adversarial sample generation problem is a hot issue in the security field of deep learning.
Evolutionary algorithm has been widely used to solve this problem in recent years because …
Evolutionary algorithm has been widely used to solve this problem in recent years because …
Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors
Adversarial patch attacks are commonly used to attack aerial imagery object detectors.
However, most existing methods are designed for white-box settings, which are impractical …
However, most existing methods are designed for white-box settings, which are impractical …
MagShadow: Physical Adversarial Example Attacks via Electromagnetic Injection
Physical adversarial examples (AEs) have become an increasing threat to deploying deep
neural network (DNN) models in the real world. Popular approaches adopt sticking-based or …
neural network (DNN) models in the real world. Popular approaches adopt sticking-based or …
On the privacy issue of evolutionary biparty multiobjective optimization
Some evolutionary algorithms have been proposed to address biparty multiobjective
optimization problems (BPMOPs). However, all these algorithms are centralized algorithms …
optimization problems (BPMOPs). However, all these algorithms are centralized algorithms …