Physical 3D adversarial attacks against monocular depth estimation in autonomous driving

J Zheng, C Lin, J Sun, Z Zhao, Q Li… - Proceedings of the …, 2024 - openaccess.thecvf.com
Deep learning-based monocular depth estimation (MDE) extensively applied in autonomous
driving is known to be vulnerable to adversarial attacks. Previous physical attacks against …

Fine-grained Open-set Deepfake Detection via Unsupervised Domain Adaptation

X Zhou, H Han, S Shan, X Chen - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deepfake represented by face swap** and face reenactment can transfer the appearance
and behavioral expressions of a face in one video image to another face in a different video …

[PDF][PDF] SoK: neural network extraction through physical side channels

P Horváth, D Lauret, Z Liu, L Batina - … of the 33rd USENIX Conference on …, 2024 - usenix.org
SoK Neural Network Extraction-USENIX Presentation Page 1 SoK: Neural Network Extraction
Through Physical Side Channels 15.08.2024 Péter Horváth, Dirk Lauret, Zhuoran Liu, and …

Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code

Y Yang, H Fan, C Lin, Q Li, Z Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
State-of-the-art source code classification models exhibit excellent task transferability, in
which the source code encoders are first pre-trained on a source domain dataset in a self …

Query-efficient black-box ensemble attack via dynamic surrogate weighting

C Hu, Z He, X Wu - Pattern Recognition, 2025 - Elsevier
In recent years, deep neural networks (DNNs) have been widely applied across various
fields, but the sensitivity of DNNs to adversarial attacks has attracted widespread attention …

Adversarial Example Soups: Improving Transferability and Stealthiness for Free

B Yang, H Zhang, J Wang, Y Yang, C Lin… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
Transferable adversarial examples cause practical security risks since they can mislead a
target model without knowing its internal knowledge. A conventional recipe for maximizing …

Transfer Adversarial Attacks through Approximate Computing

V Casola, S Della Torca - … of the 19th International Conference on …, 2024 - dl.acm.org
Convolutional Neural Networks (CNNs), have demonstrated remarkable performance
across a range of domains, including computer vision and healthcare. However, they …

Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training

J Dong, X Qu, ZJ Wang, YS Ong - arxiv preprint arxiv:2411.02871, 2024 - arxiv.org
Despite remarkable achievements in deep learning across various domains, its inherent
vulnerability to adversarial examples still remains a critical concern for practical deployment …

Exploring the Robustness and Transferability of Patch-Based Adversarial Attacks in Quantized Neural Networks

A Guesmi, B Ouni, M Shafique - arxiv preprint arxiv:2411.15246, 2024 - arxiv.org
Quantized neural networks (QNNs) are increasingly used for efficient deployment of deep
learning models on resource-constrained platforms, such as mobile devices and edge …

Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs

S Barone, V Casola… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Convolutional Neural Networks (CNNs) have achieved superhuman performance in
computer vision tasks. However, these networks are becoming both increasingly complex …