Physical 3D adversarial attacks against monocular depth estimation in autonomous driving
Deep learning-based monocular depth estimation (MDE) extensively applied in autonomous
driving is known to be vulnerable to adversarial attacks. Previous physical attacks against …
driving is known to be vulnerable to adversarial attacks. Previous physical attacks against …
Fine-grained Open-set Deepfake Detection via Unsupervised Domain Adaptation
Deepfake represented by face swap** and face reenactment can transfer the appearance
and behavioral expressions of a face in one video image to another face in a different video …
and behavioral expressions of a face in one video image to another face in a different video …
[PDF][PDF] SoK: neural network extraction through physical side channels
SoK Neural Network Extraction-USENIX Presentation Page 1 SoK: Neural Network Extraction
Through Physical Side Channels 15.08.2024 Péter Horváth, Dirk Lauret, Zhuoran Liu, and …
Through Physical Side Channels 15.08.2024 Péter Horváth, Dirk Lauret, Zhuoran Liu, and …
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code
State-of-the-art source code classification models exhibit excellent task transferability, in
which the source code encoders are first pre-trained on a source domain dataset in a self …
which the source code encoders are first pre-trained on a source domain dataset in a self …
Query-efficient black-box ensemble attack via dynamic surrogate weighting
In recent years, deep neural networks (DNNs) have been widely applied across various
fields, but the sensitivity of DNNs to adversarial attacks has attracted widespread attention …
fields, but the sensitivity of DNNs to adversarial attacks has attracted widespread attention …
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
B Yang, H Zhang, J Wang, Y Yang, C Lin… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
Transferable adversarial examples cause practical security risks since they can mislead a
target model without knowing its internal knowledge. A conventional recipe for maximizing …
target model without knowing its internal knowledge. A conventional recipe for maximizing …
Transfer Adversarial Attacks through Approximate Computing
Convolutional Neural Networks (CNNs), have demonstrated remarkable performance
across a range of domains, including computer vision and healthcare. However, they …
across a range of domains, including computer vision and healthcare. However, they …
Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training
Despite remarkable achievements in deep learning across various domains, its inherent
vulnerability to adversarial examples still remains a critical concern for practical deployment …
vulnerability to adversarial examples still remains a critical concern for practical deployment …
Exploring the Robustness and Transferability of Patch-Based Adversarial Attacks in Quantized Neural Networks
Quantized neural networks (QNNs) are increasingly used for efficient deployment of deep
learning models on resource-constrained platforms, such as mobile devices and edge …
learning models on resource-constrained platforms, such as mobile devices and edge …
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs
Convolutional Neural Networks (CNNs) have achieved superhuman performance in
computer vision tasks. However, these networks are becoming both increasingly complex …
computer vision tasks. However, these networks are becoming both increasingly complex …