Self-recoverable adversarial examples: a new effective protection mechanism in social networks

J Zhang, J Wang, H Wang, X Luo - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Nowadays, users upload numerous photos to social network platforms to share their daily
lives. These photos contain numerous personal information, which can be easily captured …

Cross-shaped adversarial patch attack

Y Ran, W Wang, M Li, LC Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent studies have shown that deep learning-based classifiers are vulnerable to malicious
inputs, ie, adversarial examples. A practical solution is to construct a perceptible but …

A simple and strong baseline for universal targeted attacks on Siamese visual tracking

Z Li, Y Shi, J Gao, S Wang, B Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Siamese trackers are shown to be vulnerable to adversarial attacks recently. However, the
existing attack methods craft the perturbations for each video independently, which comes at …

Imperceptible adversarial attack with multigranular spatiotemporal attention for video action recognition

G Wu, Y Xu, J Li, Z Shi, X Liu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
In recent years, the application of video Internet of Things (IoT) in various cities and public
places has brought unprecedented opportunities to the security field and achieved great …

Meta generative attack on person reidentification

AV Subramanyam - IEEE Transactions on Circuits and Systems …, 2023 - ieeexplore.ieee.org
Adversarial attacks have been recently investigated in person re-identification. These
attacks perform well under cross dataset or cross model setting. However, the challenges …

Fooling the image dehazing models by first order gradient

J Gui, X Cong, C Peng, YY Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The research on the single image dehazing task has been widely explored. However, as far
as we know, no comprehensive study has been conducted on the robustness of the well …

Boosting adversarial attacks by leveraging decision boundary information

B Zeng, LL Gao, QL Zhang, CQ Li, JK Song… - arxiv preprint arxiv …, 2023 - arxiv.org
Due to the gap between a substitute model and a victim model, the gradient-based noise
generated from a substitute model may have low transferability for a victim model since their …

Adversarial analysis for source camera identification

B Wang, M Zhao, W Wang, X Dai, Y Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent studies highlight the vulnerability of convolutional neural networks (CNNs) to
adversarial attacks, which also calls into question the reliability of forensic methods. Existing …

Using Reinforcement Learning to Escape Automatic Filter-based Adversarial Example Defense

Y Li, K Dan, X Lei, H Qin, S Deng, G Zhou - ACM Transactions on Sensor …, 2024 - dl.acm.org
Deep neural networks can be easily fooled by the adversarial example, which is a specially
crafted example with subtle and intentional perturbations. A plethora of papers have …

Remove To Regenerate: Boosting Adversarial Generalization with Attack Invariance

X Fu, L Ma, L Zhang - … Transactions on Circuits and Systems for …, 2024 - ieeexplore.ieee.org
Adversarial attacks pose a huge challenge to the deployment of deep neural networks
(DNNs) in security-sensitive applications. Adversarial defense methods are developed to …