ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1812.00552
  4. Cited By
Universal Perturbation Attack Against Image Retrieval
v1v2 (latest)

Universal Perturbation Attack Against Image Retrieval

3 December 2018
Jie Li
Rongrong Ji
Hong Liu
Xiaopeng Hong
Yue Gao
Q. Tian
    AAML
ArXiv (abs)PDFHTML

Papers citing "Universal Perturbation Attack Against Image Retrieval"

39 / 39 papers shown
Title
A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects
A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects
Aos Mulahuwaish
Basheer Qolomany
Kevin Gyorick
Jacques Bou Abdo
Mohammed Aledhari
Junaid Qadir
Kathleen Carley
Ala I. Al-Fuqaha
56
1
0
06 Apr 2025
Cross-Modality Attack Boosted by Gradient-Evolutionary Multiform
  Optimization
Cross-Modality Attack Boosted by Gradient-Evolutionary Multiform Optimization
Yunpeng Gong
Qingyuan Zeng
Dejun Xu
Zhenzhong Wang
Min Jiang
AAML
58
8
0
26 Sep 2024
Learning to Learn Transferable Generative Attack for Person Re-Identification
Learning to Learn Transferable Generative Attack for Person Re-Identification
Yuan Bian
Min Liu
Xueping Wang
Yunfeng Ma
Yaonan Wang
AAMLOOD
166
1
0
06 Sep 2024
Test-Time Backdoor Attacks on Multimodal Large Language Models
Test-Time Backdoor Attacks on Multimodal Large Language Models
Dong Lu
Tianyu Pang
Chao Du
Qian Liu
Xianjun Yang
Min Lin
AAML
165
26
0
13 Feb 2024
Cross-Modality Perturbation Synergy Attack for Person Re-identification
Cross-Modality Perturbation Synergy Attack for Person Re-identification
Yunpeng Gong
Zhun Zhong
Zhiming Luo
Yansong Qu
Rongrong Ji
Min Jiang
AAML
139
26
0
18 Jan 2024
Collapse-Aware Triplet Decoupling for Adversarially Robust Image
  Retrieval
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval
Qiwei Tian
Chenhao Lin
Zhengyu Zhao
Qian Li
Chao Shen
82
2
0
12 Dec 2023
RoCOCO: Robustness Benchmark of MS-COCO to Stress-test Image-Text
  Matching Models
RoCOCO: Robustness Benchmark of MS-COCO to Stress-test Image-Text Matching Models
Seulki Park
Daeho Um
Hajung Yoon
Sanghyuk Chun
Sangdoo Yun
Hawook Jeong
95
3
0
21 Apr 2023
Feature Extraction Matters More: Universal Deepfake Disruption through
  Attacking Ensemble Feature Extractors
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors
Long Tang
Dengpan Ye
Zhenhao Lu
Yunming Zhang
Shengshan Hu
Yue Xu
Chuanxi Chen
AAML
86
9
0
01 Mar 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
112
23
0
19 Feb 2023
Meta Generative Attack on Person Reidentification
Meta Generative Attack on Person Reidentification
M. I. A V Subramanyam
AAML
72
8
0
16 Jan 2023
Look Closer to Your Enemy: Learning to Attack via Teacher-Student
  Mimicking
Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking
Mingejie Wang
Jianxiong Guo
Sirui Li
Dingwen Xiao
Zhiqing Tang
AAML
85
0
0
27 Jul 2022
Towards Effective Multi-Label Recognition Attacks via Knowledge Graph
  Consistency
Towards Effective Multi-Label Recognition Attacks via Knowledge Graph Consistency
Hassan Mahmood
Ehsan Elhamifar
AAML
49
0
0
11 Jul 2022
RetrievalGuard: Provably Robust 1-Nearest Neighbor Image Retrieval
RetrievalGuard: Provably Robust 1-Nearest Neighbor Image Retrieval
Yihan Wu
Hongyang R. Zhang
Heng Huang
3DV
85
17
0
17 Jun 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
91
7
0
05 May 2022
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Cheng Luo
Qinliang Lin
Weicheng Xie
Bizhu Wu
Jinheng Xie
Linlin Shen
AAML
148
105
0
10 Mar 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Enhancing Adversarial Robustness for Deep Metric Learning
Mo Zhou
Vishal M. Patel
AAML
110
18
0
02 Mar 2022
Person Re-identification Method Based on Color Attack and Joint Defence
Person Re-identification Method Based on Color Attack and Joint Defence
Yunpeng Gong
Liqing Huang
Lifei Chen
AAML
83
44
0
18 Nov 2021
MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Swapnil Parekh
Yaman Kumar Singla
Somesh Singh
Changyou Chen
Balaji Krishnamurthy
R. Shah
AAML
56
3
0
25 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
168
242
0
01 Aug 2021
Discriminator-Free Generative Adversarial Attack
Discriminator-Free Generative Adversarial Attack
Shaohao Lu
Yuqiao Xian
Ke Yan
Yi Hu
Xing Sun
Xiaowei Guo
Feiyue Huang
Weishi Zheng
AAMLGAN
76
20
0
20 Jul 2021
Attack to Fool and Explain Deep Networks
Attack to Fool and Explain Deep Networks
Naveed Akhtar
M. Jalwana
Bennamoun
Ajmal Mian
AAML
106
33
0
20 Jun 2021
Adversarial Attack and Defense in Deep Ranking
Adversarial Attack and Defense in Deep Ranking
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
N. Zheng
G. Hua
OOD
83
15
0
07 Jun 2021
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for
  Combating Deepfakes
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes
Hao Huang
Yongtao Wang
Zhaoyu Chen
Yuze Zhang
Yuheng Li
Zhi Tang
Wei Chu
Jingdong Chen
Weisi Lin
K. Ma
AAML
100
93
0
23 May 2021
Prototype-supervised Adversarial Network for Targeted Attack of Deep
  Hashing
Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing
Xunguang Wang
Zheng Zhang
Baoyuan Wu
Fumin Shen
Guangming Lu
AAMLGAN
129
46
0
17 May 2021
Quantitative robustness of instance ranking problems
Quantitative robustness of instance ranking problems
Tino Werner
52
2
0
12 Mar 2021
Practical Relative Order Attack in Deep Ranking
Practical Relative Order Attack in Deep Ranking
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
Yinghui Xu
N. Zheng
G. Hua
146
18
0
09 Mar 2021
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
75
45
0
04 Mar 2021
A Survey On Universal Adversarial Attack
A Survey On Universal Adversarial Attack
Chaoning Zhang
Philipp Benz
Chenguo Lin
Adil Karjauv
Jing Wu
In So Kweon
AAML
96
93
0
02 Mar 2021
Deep Learning for Instance Retrieval: A Survey
Deep Learning for Instance Retrieval: A Survey
Wei Chen
Yu Liu
Weiping Wang
E. Bakker
Theodoros Georgiou
Paul Fieguth
Li Liu
M. Lew
VLM
69
151
0
27 Jan 2021
A Multi-modal Neural Embeddings Approach for Detecting Mobile
  Counterfeit Apps: A Case Study on Google Play Store
A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
Naveen Karunanayake
Jathushan Rajasegaran
Ashanie Gunathillake
Suranga Seneviratne
Guillaume Jourjon
131
15
0
02 Jun 2020
Universal Adversarial Perturbations: A Survey
Universal Adversarial Perturbations: A Survey
Ashutosh Chaubey
Nikhil Agrawal
Kavya Barnwal
K. K. Guliani
Pramod Mehta
OODAAML
113
47
0
16 May 2020
Projection & Probability-Driven Black-Box Attack
Projection & Probability-Driven Black-Box Attack
Jie Li
Rongrong Ji
Hong Liu
Jianzhuang Liu
Bineng Zhong
Cheng Deng
Q. Tian
AAML
72
49
0
08 May 2020
Targeted Attack for Deep Hashing based Retrieval
Targeted Attack for Deep Hashing based Retrieval
Jiawang Bai
Bin Chen
Yiming Li
Dongxian Wu
Weiwei Guo
Shutao Xia
En-Hui Yang
AAML
140
87
0
15 Apr 2020
Adversarial Ranking Attack and Defense
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
156
39
0
26 Feb 2020
Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Hanwei Zhang
Yannis Avrithis
Teddy Furon
Laurent Amsaleg
AAML
65
46
0
04 Dec 2019
Kornia: an Open Source Differentiable Computer Vision Library for
  PyTorch
Kornia: an Open Source Differentiable Computer Vision Library for PyTorch
F. Mokhayeri
Dmytro Mishkin
Daniel Ponsa
Ethan Rublee
Gary R. Bradski
VLMAI4TS
171
358
0
05 Oct 2019
Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve
  the Tower
Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower
Giorgos Tolias
Filip Radenovic
Ondřej Chum
AAML
77
71
0
24 Aug 2019
Who's Afraid of Adversarial Queries? The Impact of Image Modifications
  on Content-based Image Retrieval
Who's Afraid of Adversarial Queries? The Impact of Image Modifications on Content-based Image Retrieval
Zhuoran Liu
Zhengyu Zhao
Martha Larson
AAML
79
43
0
29 Jan 2019
A Survey of Safety and Trustworthiness of Deep Neural Networks:
  Verification, Testing, Adversarial Attack and Defence, and Interpretability
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability
Xiaowei Huang
Daniel Kroening
Wenjie Ruan
Marta Kwiatkowska
Youcheng Sun
Emese Thamo
Min Wu
Xinping Yi
AAML
132
51
0
18 Dec 2018
1