ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2410.10091
  4. Cited By
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object
  Detectors

Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object Detectors

14 October 2024
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
    AAML
ArXiv (abs)PDFHTMLGithub (4★)

Papers citing "Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object Detectors"

39 / 39 papers shown
Title
Enhancing Robust Fairness via Confusional Spectral Regularization
Enhancing Robust Fairness via Confusional Spectral Regularization
Gaojie Jin
Sihao Wu
Jiaxu Liu
Tianjin Huang
Ronghui Mu
194
1
0
22 Jan 2025
Randomized Adversarial Training via Taylor Expansion
Randomized Adversarial Training via Taylor Expansion
Gao Jin
Xinping Yi
Dengyu Wu
Ronghui Mu
Xiaowei Huang
AAML
79
35
0
19 Mar 2023
Leveraging Local Patch Differences in Multi-Object Scenes for Generative
  Adversarial Attacks
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Abhishek Aich
Shasha Li
Chengyu Song
M. Salman Asif
S. Krishnamurthy
Amit K. Roy-Chowdhury
AAML
66
9
0
20 Sep 2022
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep
  Object Detectors
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors
Avishag Shapira
Alon Zolfi
Christian Scano
Battista Biggio
A. Shabtai
AAML
69
35
0
26 May 2022
Improving Adversarial Transferability via Neuron Attribution-Based
  Attacks
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Jianping Zhang
Weibin Wu
Jen-tse Huang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
89
136
0
31 Mar 2022
Enhancing Adversarial Training with Second-Order Statistics of Weights
Enhancing Adversarial Training with Second-Order Statistics of Weights
Gao Jin
Xinping Yi
Wei Huang
S. Schewe
Xiaowei Huang
AAML
79
47
0
11 Mar 2022
Shadows can be Dangerous: Stealthy and Effective Physical-world
  Adversarial Attack by Natural Phenomenon
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon
Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
AAML
116
149
0
08 Mar 2022
Adversarial Texture for Fooling Person Detectors in the Physical World
Adversarial Texture for Fooling Person Detectors in the Physical World
Zhan Hu
Siyuan Huang
Xiaopei Zhu
Gang Hua
Bo Zhang
Xiaolin Hu
AAML
65
106
0
07 Mar 2022
Label-Only Model Inversion Attacks via Boundary Repulsion
Label-Only Model Inversion Attacks via Boundary Repulsion
Mostafa Kahla
Si-An Chen
H. Just
R. Jia
75
77
0
03 Mar 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
82
71
0
22 Jan 2022
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view
  Physical Adversarial Attack
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack
Donghua Wang
Tingsong Jiang
Jialiang Sun
Weien Zhou
Xiaoya Zhang
Zhiqiang Gong
Wen Yao
Xiaoqian Chen
AAML
80
105
0
15 Sep 2021
Enhancing the Transferability of Adversarial Attacks through Variance
  Tuning
Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Xiaosen Wang
Kun He
AAML
98
394
0
29 Mar 2021
Dual Attention Suppression Attack: Generate Adversarial Camouflage in
  Physical World
Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World
Jiakai Wang
Aishan Liu
Zixin Yin
Shunchang Liu
Shiyu Tang
Xianglong Liu
AAML
198
202
0
01 Mar 2021
The Translucent Patch: A Physical and Universal Attack on Object
  Detectors
The Translucent Patch: A Physical and Universal Attack on Object Detectors
Alon Zolfi
Moshe Kravchik
Yuval Elovici
A. Shabtai
AAML
60
89
0
23 Dec 2020
SLAP: Improving Physical Adversarial Examples with Short-Lived
  Adversarial Perturbations
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Giulio Lovisotto
H.C.M. Turner
Ivo Sluganovic
Martin Strohmeier
Ivan Martinovic
AAML
65
103
0
08 Jul 2020
Physically Realizable Adversarial Examples for LiDAR Object Detection
Physically Realizable Adversarial Examples for LiDAR Object Detection
James Tu
Mengye Ren
S. Manivasagam
Ming Liang
Binh Yang
Richard Du
Frank Cheng
R. Urtasun
3DPC
69
241
0
01 Apr 2020
Reliable evaluation of adversarial robustness with an ensemble of
  diverse parameter-free attacks
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks
Francesco Croce
Matthias Hein
AAML
227
1,858
0
03 Mar 2020
Skip Connections Matter: On the Transferability of Adversarial Examples
  Generated with ResNets
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
AAMLSILM
81
314
0
14 Feb 2020
Universal Physical Camouflage Attacks on Object Detectors
Universal Physical Camouflage Attacks on Object Detectors
Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
C. Zou
Ning Liu
AAML
178
167
0
10 Sep 2019
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous
  Driving
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
Yulong Cao
Chaowei Xiao
Benjamin Cyr
Yimeng Zhou
Wonseok Park
Sara Rampazzi
Qi Alfred Chen
Kevin Fu
Z. Morley Mao
AAML
49
540
0
16 Jul 2019
RetinaFace: Single-stage Dense Face Localisation in the Wild
RetinaFace: Single-stage Dense Face Localisation in the Wild
Jiankang Deng
Jiaxin Guo
Yuxiang Zhou
Jinke Yu
I. Kotsia
Stefanos Zafeiriou
CVBM3DH
95
598
0
02 May 2019
Fooling automated surveillance cameras: adversarial patches to attack
  person detection
Fooling automated surveillance cameras: adversarial patches to attack person detection
Simen Thys
W. V. Ranst
Toon Goedemé
AAML
107
570
0
18 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
71
670
0
03 Apr 2019
Adversarial camera stickers: A physical camera-based attack on deep
  learning systems
Adversarial camera stickers: A physical camera-based attack on deep learning systems
Juncheng Billy Li
Frank R. Schmidt
J. Zico Kolter
AAML
59
168
0
21 Mar 2019
Fast Online Object Tracking and Segmentation: A Unifying Approach
Fast Online Object Tracking and Segmentation: A Unifying Approach
Qiang Wang
Li Zhang
Luca Bertinetto
Weiming Hu
Philip Torr
VOS
93
1,205
0
12 Dec 2018
DPatch: An Adversarial Patch Attack on Object Detectors
DPatch: An Adversarial Patch Attack on Object Detectors
Xin Liu
Huanrui Yang
Ziwei Liu
Linghao Song
Hai Helen Li
Yiran Chen
AAMLObjD
60
293
0
05 Jun 2018
Black-box Adversarial Attacks with Limited Queries and Information
Black-box Adversarial Attacks with Limited Queries and Information
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
MLAUAAML
163
1,206
0
23 Apr 2018
Improving Transferability of Adversarial Examples with Input Diversity
Improving Transferability of Adversarial Examples with Input Diversity
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
AAML
108
1,125
0
19 Mar 2018
CARLA: An Open Urban Driving Simulator
CARLA: An Open Urban Driving Simulator
Alexey Dosovitskiy
G. Ros
Felipe Codevilla
Antonio M. López
V. Koltun
VLM
143
5,206
0
10 Nov 2017
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural
  Networks without Training Substitute Models
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen
Huan Zhang
Yash Sharma
Jinfeng Yi
Cho-Jui Hsieh
AAML
85
1,885
0
14 Aug 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILMOOD
317
12,131
0
19 Jun 2017
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OODAAML
282
8,583
0
16 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILMAAML
545
5,910
0
08 Jul 2016
DeepFool: a simple and accurate method to fool deep neural networks
DeepFool: a simple and accurate method to fool deep neural networks
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
AAML
154
4,905
0
14 Nov 2015
FaceNet: A Unified Embedding for Face Recognition and Clustering
FaceNet: A Unified Embedding for Face Recognition and Clustering
Florian Schroff
Dmitry Kalenichenko
James Philbin
3DH
389
13,145
0
12 Mar 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
282
19,121
0
20 Dec 2014
Understanding Deep Image Representations by Inverting Them
Understanding Deep Image Representations by Inverting Them
Aravindh Mahendran
Andrea Vedaldi
FAtt
131
1,965
0
26 Nov 2014
Microsoft COCO: Common Objects in Context
Microsoft COCO: Common Objects in Context
Nayeon Lee
Michael Maire
Serge J. Belongie
Lubomir Bourdev
Ross B. Girshick
James Hays
Pietro Perona
Deva Ramanan
C. L. Zitnick
Piotr Dollár
ObjD
429
43,814
0
01 May 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
282
14,963
1
21 Dec 2013
1