Rethinking the backward propagation for adversarial transferability

W **aosen, K Tong, K He - Advances in Neural Information …, 2023 - proceedings.neurips.cc
Transfer-based attacks generate adversarial examples on the surrogate model, which can
mislead other black-box models without access, making it promising to attack real-world …

Feature-aware transferable adversarial attacks against image classification

S Cheng, P Li, K Han, H Xu - Applied Soft Computing, 2024 - Elsevier
Compared to white-box adversarial attacks, black-box adversarial attacks are more
applicable in practical scenarios and have received significant attention. However, most …

Exploring robustness connection between artificial and natural adversarial examples

A Agarwal, N Ratha, M Vatsa… - Proceedings of the IEEE …, 2022 - openaccess.thecvf.com
Although recent deep neural network algorithm has shown tremendous success in several
computer vision tasks, their vulnerability against minute adversarial perturbations has raised …

Training meta-surrogate model for transferable adversarial attack

Y Qin, Y **ong, J Yi, CJ Hsieh - Proceedings of the AAAI Conference on …, 2023 - ojs.aaai.org
The problem of adversarial attacks to a black-box model when no queries are allowed has
posed a great challenge to the community and has been extensively investigated. In this …

Improving transferability of adversarial examples with powerful affine-shear transformation attack

X Wang, C Huang, H Cheng - Computer Standards & Interfaces, 2023 - Elsevier
Image classification models based on deep neural networks have made great improvements
on various tasks, but they are still vulnerable to adversarial examples that could increase the …

Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack

R Zhang, H **a, Z Kang, Z Li, Y Du… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Contemporary research on adversarial attacks in Intelligent Internet of Things focuses on
balancing two key aspects: 1) transferability and 2) imperceptibility. However, achieving a …

Improving the transferability of adversarial attacks via self-ensemble

S Cheng, P Li, J Liu, H Xu, Y Yao… - Applied …, 2024 - Springer
Deep neural networks have been used extensively for diverse visual tasks, including object
detection, face recognition, and image classification. However, they face several security …

Enhancing adversarial training via reweighting optimization trajectory

T Huang, S Liu, T Chen, M Fang, L Shen… - … Conference on Machine …, 2023 - Springer
Despite the fact that adversarial training has become the de facto method for improving the
robustness of deep neural networks, it is well-known that vanilla adversarial training suffers …

Improving transferability of adversarial examples by saliency distribution and data augmentation

Y Dong, L Tang, C Tian, B Yu, Z Duan - Computers & Security, 2022 - Elsevier
Although deep neural networks (DNNs) have advanced performance in many application
scenarios, they are vulnerable to the attacks of adversarial examples that are crafted by …

A survey of adversarial captchas on its history, classification and generation

Z Xu, Q Yan, FR Yu, V Leung - arxiv preprint arxiv:2311.13233, 2023 - arxiv.org
Completely Automated Public Turing test to tell Computers and Humans Apart, short for
CAPTCHA, is an essential and relatively easy way to defend against malicious attacks …