ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.02466
  4. Cited By
Towards Large yet Imperceptible Adversarial Image Perturbations with
  Perceptual Color Distance

Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance

6 November 2019
Zhengyu Zhao
Zhuoran Liu
Martha Larson
    AAML
ArXivPDFHTML

Papers citing "Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance"

35 / 35 papers shown
Title
RoVo: Robust Voice Protection Against Unauthorized Speech Synthesis with Embedding-Level Perturbations
RoVo: Robust Voice Protection Against Unauthorized Speech Synthesis with Embedding-Level Perturbations
Seungmin Kim
Sohee Park
Donghyun Kim
Jisu Lee
Daeseon Choi
AAML
7
0
0
19 May 2025
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
Aniruddha Bala
Rohit Chowdhury
Rohan Jaiswal
Siddharth Roheda
DiffM
AAML
79
0
0
24 Apr 2025
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
Jin Li
Ziqiang He
Anwei Luo
Jian-Fang Hu
Zhong Wang
Xiangui Kang
DiffM
69
0
0
12 Mar 2025
Nearly Zero-Cost Protection Against Mimicry by Personalized Diffusion Models
Nearly Zero-Cost Protection Against Mimicry by Personalized Diffusion Models
Namhyuk Ahn
Kiyoon Yoo
Wonhyuk Ahn
Daesik Kim
Seung-Hun Nam
AAML
WIGM
DiffM
94
0
0
16 Dec 2024
PGD-Imp: Rethinking and Unleashing Potential of Classic PGD with Dual Strategies for Imperceptible Adversarial Attacks
PGD-Imp: Rethinking and Unleashing Potential of Classic PGD with Dual Strategies for Imperceptible Adversarial Attacks
Jin Li
Zitong Yu
Ziqiang He
Zhong Wang
Xiangui Kang
AAML
84
0
0
15 Dec 2024
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Bo Yang
Hengwei Zhang
Jin-dong Wang
Yulong Yang
Chenhao Lin
Chao Shen
Zhengyu Zhao
SILM
AAML
71
2
0
27 Feb 2024
Exploring Vulnerabilities of No-Reference Image Quality Assessment
  Models: A Query-Based Black-Box Method
Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Chenxi Yang
Yujia Liu
Dingquan Li
Tingting Jiang
40
6
0
10 Jan 2024
Adversarial Image Generation by Spatial Transformation in Perceptual
  Colorspaces
Adversarial Image Generation by Spatial Transformation in Perceptual Colorspaces
A. Aydin
A. Temi̇zel
43
4
0
21 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
24
42
0
05 Oct 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
38
3
0
19 Sep 2022
Enhance the Visual Representation via Discrete Adversarial Training
Enhance the Visual Representation via Discrete Adversarial Training
Xiaofeng Mao
YueFeng Chen
Ranjie Duan
Yao Zhu
Gege Qi
Shaokai Ye
Xiaodan Li
Rong Zhang
Hui Xue
44
31
0
16 Sep 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
29
155
0
12 Jul 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
32
11
0
04 Jun 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
43
8
0
02 Apr 2022
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Ye Liu
Yaya Cheng
Lianli Gao
Xianglong Liu
Qilong Zhang
Jingkuan Song
AAML
37
57
0
10 Mar 2022
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Cheng Luo
Qinliang Lin
Weicheng Xie
Bizhu Wu
Jinheng Xie
Linlin Shen
AAML
36
101
0
10 Mar 2022
Why adversarial training can hurt robust accuracy
Why adversarial training can hurt robust accuracy
Jacob Clarysse
Julia Hörrmann
Fanny Yang
AAML
13
18
0
03 Mar 2022
Human Imperceptible Attacks and Applications to Improve Fairness
Human Imperceptible Attacks and Applications to Improve Fairness
Xinru Hua
Huanzhong Xu
Jose H. Blanchet
V. Nguyen
AAML
27
3
0
30 Nov 2021
Sparse Adversarial Video Attacks with Spatial Transformations
Sparse Adversarial Video Attacks with Spatial Transformations
Ronghui Mu
Wenjie Ruan
Leandro Soriano Marcolino
Q. Ni
AAML
30
18
0
10 Nov 2021
Hard to Forget: Poisoning Attacks on Certified Machine Unlearning
Hard to Forget: Poisoning Attacks on Certified Machine Unlearning
Neil G. Marchant
Benjamin I. P. Rubinstein
Scott Alfeld
MU
AAML
28
69
0
17 Sep 2021
AdvDrop: Adversarial Attack to DNNs by Dropping Information
AdvDrop: Adversarial Attack to DNNs by Dropping Information
Ranjie Duan
YueFeng Chen
Dantong Niu
Yun Yang
•. A. K. Qin
Yuan He
AAML
24
89
0
20 Aug 2021
Imperceptible Adversarial Examples by Spatial Chroma-Shift
Imperceptible Adversarial Examples by Spatial Chroma-Shift
A. Aydin
Deniz Sen
Berat Tuna Karli
Oguz Hanoglu
A. Temi̇zel
AAML
26
16
0
05 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Exposing Previously Undetectable Faults in Deep Neural Networks
Exposing Previously Undetectable Faults in Deep Neural Networks
Isaac Dunn
Hadrien Pouget
Daniel Kroening
T. Melham
AAML
26
28
0
01 Jun 2021
Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a
  Blink
Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
Ranjie Duan
Xiaofeng Mao
•. A. K. Qin
Yun Yang
YueFeng Chen
Shaokai Ye
Yuan He
AAML
24
138
0
11 Mar 2021
Achieving Adversarial Robustness Requires An Active Teacher
Achieving Adversarial Robustness Requires An Active Teacher
Chao Ma
Lexing Ying
27
1
0
14 Dec 2020
SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image
  Classifiers
SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers
Bingyao Huang
Haibin Ling
AAML
25
19
0
10 Dec 2020
Transferable Universal Adversarial Perturbations Using Generative Models
Transferable Universal Adversarial Perturbations Using Generative Models
Atiyeh Hashemi
Andreas Bär
S. Mozaffari
Tim Fingscheidt
AAML
30
17
0
28 Oct 2020
GreedyFool: Multi-Factor Imperceptibility and Its Application to
  Designing a Black-box Adversarial Attack
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial Attack
Hui Liu
Bo Zhao
Minzhi Ji
Peng Liu
AAML
29
6
0
14 Oct 2020
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
25
12
0
21 Jul 2020
Adversarial Item Promotion: Vulnerabilities at the Core of Top-N
  Recommenders that Use Images to Address Cold Start
Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start
Zhuoran Liu
Martha Larson
DiffM
20
27
0
02 Jun 2020
Shield: Fast, Practical Defense and Vaccination for Deep Learning using
  JPEG Compression
Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Nilaksh Das
Madhuri Shanbhogue
Shang-Tse Chen
Fred Hohman
Siwei Li
Li-Wei Chen
Michael E. Kounavis
Duen Horng Chau
FedML
AAML
43
224
0
19 Feb 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,842
0
08 Jul 2016
1