Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1904.02884
Cited By
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
5 April 2019
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
SILM
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks"
50 / 423 papers shown
Title
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration
Juanjuan Weng
Zhiming Luo
Zhun Zhong
Shaozi Li
N. Sebe
AAML
37
16
0
07 Mar 2023
A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking
Chang-Shu Liu
Yinpeng Dong
Wenzhao Xiang
X. Yang
Hang Su
Junyi Zhu
YueFeng Chen
Yuan He
H. Xue
Shibao Zheng
OOD
VLM
AAML
33
72
0
28 Feb 2023
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
13
18
0
28 Feb 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
32
1
0
21 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
A Novel Noise Injection-based Training Scheme for Better Model Robustness
Zeliang Zhang
Jinyang Jiang
Minjie Chen
Zhiyuan Wang
Yijie Peng
Zhaofei Yu
30
3
0
17 Feb 2023
Threatening Patch Attacks on Object Detection in Optical Remote Sensing Images
Xuxiang Sun
Gong Cheng
Lei Pei
Hongda Li
Junwei Han
AAML
15
38
0
13 Feb 2023
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
31
35
0
10 Feb 2023
Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Zhuoran Liu
Zhengyu Zhao
Martha Larson
32
34
0
31 Jan 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
35
3
0
30 Jan 2023
AdvBiom: Adversarial Attacks on Biometric Matchers
Debayan Deb
Vishesh Mistry
Rahul Parthe
AAML
CVBM
25
3
0
10 Jan 2023
Explainability and Robustness of Deep Visual Classification Models
Jindong Gu
AAML
41
2
0
03 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
29
27
0
01 Jan 2023
Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks
Xingxing Wei
Yingjie Guo
Jie Yu
Bo Zhang
AAML
26
50
0
26 Dec 2022
Unleashing the Power of Visual Prompting At the Pixel Level
Junyang Wu
Xianhang Li
Chen Wei
Huiyu Wang
Alan Yuille
Yuyin Zhou
Cihang Xie
VPVLM
VLM
27
31
0
20 Dec 2022
TextGrad: Advancing Robustness Evaluation in NLP by Gradient-Driven Optimization
Bairu Hou
Jinghan Jia
Yihua Zhang
Guanhua Zhang
Yang Zhang
Sijia Liu
Shiyu Chang
SILM
AAML
24
21
0
19 Dec 2022
Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition
Qian Li
Yuxiao Hu
Ye Liu
Dong-juan Zhang
Xin Jin
Yuntian Chen
AAML
11
9
0
19 Dec 2022
Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks
Anqi Zhao
Tong Chu
Yahao Liu
Wen Li
Jingjing Li
Lixin Duan
AAML
26
16
0
18 Dec 2022
Adversarial Example Defense via Perturbation Grading Strategy
Shaowei Zhu
Wanli Lyu
Bin Li
Z. Yin
Bin Luo
AAML
27
1
0
16 Dec 2022
DISCO: Adversarial Defense with Local Implicit Functions
Chih-Hui Ho
Nuno Vasconcelos
AAML
26
38
0
11 Dec 2022
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Philip Torr
Jiaya Jia
AAML
29
2
0
11 Dec 2022
Artificial Intelligence Security Competition (AISC)
Yinpeng Dong
Peng Chen
Senyou Deng
L. Lianji
Yi Sun
...
Zhichao Cui
G. Liu
Huafeng Shi
K. Hu
Meng Zhang
30
0
0
07 Dec 2022
Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Jiafeng Wang
Zhaoyu Chen
Kaixun Jiang
Dingkang Yang
Lingyi Hong
Pinxue Guo
Yan Wang
Wenqiang Zhang
AAML
26
27
0
21 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
Improving transferability of 3D adversarial attacks with scale and shear transformations
Jinali Zhang
Yinpeng Dong
Junyi Zhu
Jihong Zhu
Minchi Kuang
Xiaming Yuan
3DPC
32
17
0
02 Nov 2022
Ares: A System-Oriented Wargame Framework for Adversarial ML
Farhan Ahmed
Pratik Vaishnavi
Kevin Eykholt
Amir Rahmati
AAML
23
7
0
24 Oct 2022
Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Huiyun Cao
Wenlong Zou
Yinkun Wang
Ting Song
Mengjun Liu
AAML
54
4
0
19 Oct 2022
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Shuai Jia
Bangjie Yin
Taiping Yao
Shouhong Ding
Chunhua Shen
Xiaokang Yang
Chao Ma
AAML
CVBM
26
48
0
13 Oct 2022
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation
Zeyu Qin
Yanbo Fan
Yi Liu
Li Shen
Yong Zhang
Jue Wang
Baoyuan Wu
AAML
SILM
29
80
0
12 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
33
58
0
09 Oct 2022
A2: Efficient Automated Attacker for Boosting Adversarial Training
Zhuoer Xu
Guanghui Zhu
Changhua Meng
Shiwen Cui
ZhenZhe Ying
Weiqiang Wang
GU Ming
Yihua Huang
AAML
36
13
0
07 Oct 2022
Pre-trained Adversarial Perturbations
Y. Ban
Yinpeng Dong
AAML
62
22
0
07 Oct 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
24
42
0
05 Oct 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAML
MLAU
20
5
0
29 Sep 2022
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution Learning
Zhengwei Fang
Rui Wang
Tao Huang
L. Jing
AAML
32
5
0
24 Sep 2022
Robust Ensemble Morph Detection with Domain Generalization
Hossein Kashiani
S. Sami
Sobhan Soleymani
Nasser M. Nasrabadi
OOD
AAML
29
8
0
16 Sep 2022
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
Siyuan Liang
Longkang Li
Yanbo Fan
Xiaojun Jia
Jingzhi Li
Baoyuan Wu
Xiaochun Cao
AAML
26
34
0
16 Sep 2022
Enhancing the Self-Universality for Transferable Targeted Attacks
Zhipeng Wei
Jingjing Chen
Zuxuan Wu
Yueping Jiang
AAML
21
31
0
08 Sep 2022
SA: Sliding attack for synthetic speech detection with resistance to clipping and self-splicing
JiaCheng Deng
Dong Li
Yan Diqun
Rangding Wang
Zeng Jiaming
AAML
25
0
0
27 Aug 2022
Multi-Scale Architectures Matter: On the Adversarial Robustness of Flow-based Lossless Compression
Yitong Xia
Bin Chen
Yan Feng
Tian-shuo Ge
AI4CE
16
0
0
26 Aug 2022
Transferability Ranking of Adversarial Examples
Mosh Levy
Guy Amit
Yuval Elovici
Yisroel Mirsky
AAML
31
0
0
23 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
24
2
0
18 Aug 2022
Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks
Woo Jae Kim
Seunghoon Hong
Sung-eui Yoon
AAML
29
8
0
11 Aug 2022
Improving Adversarial Robustness via Mutual Information Estimation
Dawei Zhou
Nannan Wang
Xinbo Gao
Bo Han
Xiaoyu Wang
Yibing Zhan
Tongliang Liu
AAML
16
15
0
25 Jul 2022
Jigsaw-ViT: Learning Jigsaw Puzzles in Vision Transformer
Yingyi Chen
Xiaoke Shen
Yahui Liu
Qinghua Tao
Johan A. K. Suykens
AAML
ViT
28
22
0
25 Jul 2022
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
Xinwei Liu
Jian Liu
Yang Bai
Jindong Gu
Tao Chen
Xiaojun Jia
Xiaochun Cao
AAML
WIGM
33
26
0
17 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
26
155
0
12 Jul 2022
Towards Effective Multi-Label Recognition Attacks via Knowledge Graph Consistency
Hassan Mahmood
Ehsan Elhamifar
AAML
16
0
0
11 Jul 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAML
CVBM
33
5
0
25 Jun 2022
Low-Mid Adversarial Perturbation against Unauthorized Face Recognition System
Jiaming Zhang
Qiaomin Yi
Dongyuan Lu
Jitao Sang
PICV
AAML
CVBM
20
4
0
19 Jun 2022
Previous
1
2
3
4
5
6
7
8
9
Next