Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2302.09457
Cited By
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
19 February 2023
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective"
50 / 62 papers shown
Title
Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors
O. Mutlu
60
577
0
28 Jun 2023
TrojLLM: A Black-box Trojan Prompt Attack on Large Language Models
Jiaqi Xue
Mengxin Zheng
Ting Hua
Yilin Shen
Ye Liu
Ladislau Bölöni
Qian Lou
53
31
0
12 Jun 2023
Versatile Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Ke Xu
Hongrui Chen
Zihao Zhu
Li Liu
Baoyuan Wu
DiffM
75
11
0
01 Jun 2023
How to Backdoor Diffusion Models?
Sheng-Yen Chou
Pin-Yu Chen
Tsung-Yi Ho
DiffM
SILM
75
100
0
11 Dec 2022
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
40
59
0
09 Oct 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
29
16
0
19 Aug 2022
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
51
159
0
12 Jul 2022
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Zhenting Wang
Juan Zhai
Shiqing Ma
AAML
151
99
0
26 May 2022
Imperceptible Backdoor Attack: From Input Space to Feature Representation
Nan Zhong
Zhenxing Qian
Xinpeng Zhang
AAML
44
52
0
06 May 2022
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Yinpeng Dong
Shuyu Cheng
Tianyu Pang
Hang Su
Jun Zhu
AAML
28
57
0
13 Mar 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
46
72
0
22 Jan 2022
Tools and Practices for Responsible AI Engineering
Ryan Soklaski
Justin A. Goodwin
Olivia M. Brown
Michael Yee
J. Matterer
44
18
0
14 Jan 2022
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
B. Ghavami
Seyd Movi
Zhenman Fang
Lesley Shannon
AAML
55
9
0
25 Dec 2021
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
Yu Feng
Benteng Ma
Jing Zhang
Shanshan Zhao
Yong-quan Xia
Dacheng Tao
AAML
70
86
0
02 Dec 2021
Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability
Yifeng Xiong
Jiadong Lin
Min Zhang
John E. Hopcroft
Kun He
AAML
71
113
0
21 Nov 2021
Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks
Maksym Yatsura
J. H. Metzen
Matthias Hein
OOD
71
14
0
02 Nov 2021
How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data
Zhiyuan Zhang
Lingjuan Lyu
Weiqiang Wang
Lichao Sun
Xu Sun
50
35
0
03 Sep 2021
Backdoor Attacks on Pre-trained Models by Layerwise Weight Poisoning
Linyang Li
Demin Song
Xiaonan Li
Jiehang Zeng
Ruotian Ma
Xipeng Qiu
92
138
0
31 Aug 2021
Feature Importance-aware Transferable Adversarial Attacks
Peng Kuang
Hengchang Guo
Zhifei Zhang
Wenxin Liu
Zhan Qin
K. Ren
AAML
37
210
0
29 Jul 2021
A Little Robustness Goes a Long Way: Leveraging Robust Features for Targeted Transfer Attacks
Jacob Mitchell Springer
Melanie Mitchell
Garrett Kenyon
AAML
58
43
0
03 Jun 2021
PointBA: Towards Backdoor Attacks in 3D Point Cloud
Xinke Li
Zhirui Chen
Yue Zhao
Zekun Tong
Yabang Zhao
A. Lim
Qiufeng Wang
3DPC
AAML
94
52
0
30 Mar 2021
Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Xiaosen Wang
Kun He
AAML
66
389
0
29 Mar 2021
Boosting Adversarial Transferability through Enhanced Momentum
Xiaosen Wang
Jiadong Lin
Han Hu
Jingdong Wang
Kun He
AAML
72
76
0
19 Mar 2021
Admix: Enhancing the Transferability of Adversarial Attacks
Xiaosen Wang
Xu He
Jingdong Wang
Kun He
AAML
95
199
0
31 Jan 2021
Backpropagating Linearly Improves Transferability of Adversarial Examples
Yiwen Guo
Qizhang Li
Hao Chen
FedML
AAML
43
115
0
07 Dec 2020
RobustBench: a standardized adversarial robustness benchmark
Francesco Croce
Maksym Andriushchenko
Vikash Sehwag
Edoardo Debenedetti
Nicolas Flammarion
M. Chiang
Prateek Mittal
Matthias Hein
VLM
280
689
0
19 Oct 2020
Input-Aware Dynamic Backdoor Attack
A. Nguyen
Anh Tran
AAML
54
427
0
16 Oct 2020
Open-sourced Dataset Protection via Backdoor Watermarking
Yiming Li
Zi-Mou Zhang
Jiawang Bai
Baoyuan Wu
Yong Jiang
Shutao Xia
26
41
0
12 Oct 2020
A Unified Approach to Interpreting and Boosting Adversarial Transferability
Xin Eric Wang
Jie Ren
Shuyu Lin
Xiangming Zhu
Yisen Wang
Quanshi Zhang
AAML
46
95
0
08 Oct 2020
Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder
Alvin Chan
Yi Tay
Yew-Soon Ong
Aston Zhang
SILM
49
57
0
06 Oct 2020
Can Adversarial Weight Perturbations Inject Neural Backdoors?
Siddhant Garg
Adarsh Kumar
Vibhor Goel
Yingyu Liang
AAML
62
86
0
04 Aug 2020
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
49
66
0
15 Jul 2020
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Giulio Lovisotto
H.C.M. Turner
Ivo Sluganovic
Martin Strohmeier
Ivan Martinovic
AAML
41
101
0
08 Jul 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Xingjun Ma
James Bailey
Feng Lu
AAML
82
510
0
05 Jul 2020
QEBA: Query-Efficient Boundary-Based Blackbox Attack
Huichen Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Yue Liu
AAML
94
181
0
28 May 2020
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses
Yaxin Li
Wei Jin
Han Xu
Jiliang Tang
AAML
53
131
0
13 May 2020
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Nathan Inkawhich
Kevin J. Liang
Binghui Wang
Matthew J. Inkawhich
Lawrence Carin
Yiran Chen
AAML
26
88
0
29 Apr 2020
Towards Probabilistic Verification of Machine Unlearning
David M. Sommer
Liwei Song
Sameer Wagh
Prateek Mittal
AAML
70
72
0
09 Mar 2020
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks
Francesco Croce
Matthias Hein
AAML
196
1,821
0
03 Mar 2020
Label-Consistent Backdoor Attacks
Alexander Turner
Dimitris Tsipras
Aleksander Madry
AAML
23
387
0
05 Dec 2019
Square Attack: a query-efficient black-box adversarial attack via random search
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
Matthias Hein
AAML
56
977
0
29 Nov 2019
Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors
Zuxuan Wu
Ser-Nam Lim
L. Davis
Tom Goldstein
AAML
103
264
0
31 Oct 2019
Universal Physical Camouflage Attacks on Object Detectors
Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
C. Zou
Ning Liu
AAML
155
163
0
10 Sep 2019
AdvHat: Real-world adversarial attack on ArcFace Face ID system
Stepan Alekseevich Komkov
Aleksandr Petiushko
AAML
CVBM
41
284
0
23 Aug 2019
Enhancing Adversarial Example Transferability with an Intermediate Level Attack
Qian Huang
Isay Katsman
Horace He
Zeqi Gu
Serge J. Belongie
Ser-Nam Lim
SILM
AAML
53
242
0
23 Jul 2019
Functional Adversarial Attacks
Cassidy Laidlaw
Soheil Feizi
AAML
56
184
0
29 May 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
56
661
0
03 Apr 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
52
379
0
22 Mar 2019
Wasserstein Adversarial Examples via Projected Sinkhorn Iterations
Eric Wong
Frank R. Schmidt
J. Zico Kolter
AAML
62
211
0
21 Feb 2019
advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch
G. Ding
Luyu Wang
Xiaomeng Jin
53
183
0
20 Feb 2019
1
2
Next