Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2504.14541
Cited By
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
20 April 2025
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation"
50 / 62 papers shown
Title
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems
Song Xia
Yi Yu
Wenhan Yang
Meiwen Ding
Zhuo Chen
Lingyu Duan
Alex C. Kot
Xudong Jiang
114
3
0
01 Mar 2025
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Yi Yu
Yufei Wang
Wenhan Yang
Lanqing Guo
Shijian Lu
Ling-yu Duan
Yap-Peng Tan
Alex C. Kot
AAML
123
8
0
02 Dec 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAML
SILM
121
6
0
26 Oct 2024
Towards Physical World Backdoor Attacks against Skeleton Action Recognition
Qichen Zheng
Yi Yu
Siyuan Yang
Jun Liu
Kwok-Yan Lam
Alex C. Kot
AAML
74
4
0
16 Aug 2024
Semantic Deep Hiding for Robust Unlearnable Examples
Ruohan Meng
Chenyu Yi
Yi Yu
Siyuan Yang
Bingquan Shen
Alex C. Kot
119
5
0
25 Jun 2024
Learning to Transform Dynamically for Better Adversarial Transferability
Rongyi Zhu
Zeliang Zhang
Susan Liang
Zhuo Liu
Chenliang Xu
AAML
99
17
0
23 May 2024
Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders
Yi Yu
Yufei Wang
Song Xia
Wenhan Yang
Shijian Lu
Yap-Peng Tan
A.C. Kot
AAML
69
13
0
02 May 2024
Mitigating the Curse of Dimensionality for Certified Robustness via Dual Randomized Smoothing
Song Xia
Yu Yi
Xudong Jiang
Henghui Ding
91
9
0
15 Apr 2024
Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations
Xun Lin
Yi Yu
Song Xia
Jue Jiang
Haoran Wang
...
Yizhong Liu
Ying Fu
Shuai Wang
Wenzhong Tang
Alex C. Kot
AAML
36
7
0
21 Mar 2024
Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks
Chong Wang
Yi Yu
Lanqing Guo
Bihan Wen
AAML
87
7
0
15 Mar 2024
Boosting Adversarial Transferability by Block Shuffle and Rotation
Kunyu Wang
Xu He
Wenxuan Wang
Xiaosen Wang
AAML
90
41
0
20 Aug 2023
Query-Efficient Decision-based Black-Box Patch Attack
Zhaoyu Chen
Yue Liu
Shuang Wu
Shouhong Ding
Wenqiang Zhang
AAML
78
34
0
02 Jul 2023
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability
Haotian Xue
Alexandre Araujo
Bin Hu
Yongxin Chen
DiffM
117
48
0
25 May 2023
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization
Yulong Yang
Chenhao Lin
Qian Li
Zhengyu Zhao
Haoran Fan
Dawei Zhou
Nannan Wang
Tongliang Liu
Chao Shen
AAML
MQ
109
14
0
10 May 2023
Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization
Jianping Zhang
Yizhan Huang
Weibin Wu
Michael R. Lyu
AAML
ViT
71
54
0
28 Mar 2023
Improving the Transferability of Adversarial Samples by Path-Augmented Method
Jianping Zhang
Jen-tse Huang
Wenxuan Wang
Yichen Li
Weibin Wu
Xiaosen Wang
Yuxin Su
Michael R. Lyu
AAML
104
52
0
28 Mar 2023
Randomized Adversarial Training via Taylor Expansion
Gao Jin
Xinping Yi
Dengyu Wu
Ronghui Mu
Xiaowei Huang
AAML
81
35
0
19 Mar 2023
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration
Juanjuan Weng
Zhiming Luo
Zhun Zhong
Shaozi Li
N. Sebe
AAML
79
19
0
07 Mar 2023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Yi Yu
Yufei Wang
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
108
44
0
28 Feb 2023
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
71
53
0
26 May 2022
Diffusion Models for Adversarial Purification
Weili Nie
Brandon Guo
Yujia Huang
Chaowei Xiao
Arash Vahdat
Anima Anandkumar
WIGM
269
450
0
16 May 2022
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Jianping Zhang
Weibin Wu
Jen-tse Huang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
91
136
0
31 Mar 2022
Towards Robust Rain Removal Against Adversarial Attacks: A Comprehensive Benchmark Analysis and Beyond
Yi Yu
Wenhan Yang
Yap-Peng Tan
Alex C. Kot
AAML
91
64
0
31 Mar 2022
Can Neural Nets Learn the Same Model Twice? Investigating Reproducibility and Double Descent from the Decision Boundary Perspective
Gowthami Somepalli
Liam H. Fowl
Arpit Bansal
Ping Yeh-Chiang
Yehuda Dar
Richard Baraniuk
Micah Goldblum
Tom Goldstein
57
67
0
15 Mar 2022
Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal
Yucheng Shi
Yahong Han
Yu-an Tan
Xiaohui Kuang
100
31
0
07 Dec 2021
Feature Importance-aware Transferable Adversarial Attacks
Peng Kuang
Hengchang Guo
Zhifei Zhang
Wenxin Liu
Zhan Qin
K. Ren
AAML
74
217
0
29 Jul 2021
Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Xiaosen Wang
Kun He
AAML
104
394
0
29 Mar 2021
Score-Based Generative Modeling through Stochastic Differential Equations
Yang Song
Jascha Narain Sohl-Dickstein
Diederik P. Kingma
Abhishek Kumar
Stefano Ermon
Ben Poole
DiffM
SyDa
373
6,586
0
26 Nov 2020
A Self-supervised Approach for Adversarial Robustness
Muzammal Naseer
Salman Khan
Munawar Hayat
Fahad Shahbaz Khan
Fatih Porikli
AAML
87
260
0
08 Jun 2020
FDA: Feature Disruptive Attack
Aditya Ganeshan
S. VivekB.
R. Venkatesh Babu
AAML
103
105
0
10 Sep 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
John E. Hopcroft
AAML
94
573
0
17 Aug 2019
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Shuyu Cheng
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
AAML
90
274
0
17 Jun 2019
Simple Black-box Adversarial Attacks
Chuan Guo
Jacob R. Gardner
Yurong You
A. Wilson
Kilian Q. Weinberger
AAML
65
580
0
17 May 2019
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Bryse Flowers
R. M. Buehrer
William C. Headley
AAML
71
127
0
01 Mar 2019
Theoretically Principled Trade-off between Robustness and Accuracy
Hongyang R. Zhang
Yaodong Yu
Jiantao Jiao
Eric Xing
L. Ghaoui
Michael I. Jordan
159
2,560
0
24 Jan 2019
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
H. Foroosh
AAML
121
270
0
30 Nov 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
106
348
0
12 Jul 2018
Black-box Adversarial Attacks with Limited Queries and Information
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
MLAU
AAML
165
1,208
0
23 Apr 2018
Improving Transferability of Adversarial Examples with Input Diversity
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
AAML
113
1,125
0
19 Mar 2018
Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples
Zihao Liu
Qi Liu
Tao Liu
Nuo Xu
Xue Lin
Yanzhi Wang
Wujie Wen
AAML
MQ
69
263
0
14 Mar 2018
Deflecting Adversarial Attacks with Pixel Deflection
Aaditya (Adi) Prakash
N. Moran
Solomon Garber
Antonella DiLillo
J. Storer
AAML
91
303
0
26 Jan 2018
MobileNetV2: Inverted Residuals and Linear Bottlenecks
Mark Sandler
Andrew G. Howard
Menglong Zhu
A. Zhmoginov
Liang-Chieh Chen
215
19,353
0
13 Jan 2018
Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser
Fangzhou Liao
Ming Liang
Yinpeng Dong
Tianyu Pang
Xiaolin Hu
Jun Zhu
87
888
0
08 Dec 2017
Mitigating Adversarial Effects Through Randomization
Cihang Xie
Jianyu Wang
Zhishuai Zhang
Zhou Ren
Alan Yuille
AAML
122
1,062
0
06 Nov 2017
Countering Adversarial Images using Input Transformations
Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
AAML
135
1,406
0
31 Oct 2017
PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples
Yang Song
Taesup Kim
Sebastian Nowozin
Stefano Ermon
Nate Kushman
AAML
126
790
0
30 Oct 2017
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen
Huan Zhang
Yash Sharma
Jinfeng Yi
Cho-Jui Hsieh
AAML
95
1,887
0
14 Aug 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
319
12,151
0
19 Jun 2017
Ensemble Adversarial Training: Attacks and Defenses
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
177
2,729
0
19 May 2017
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
Weilin Xu
David Evans
Yanjun Qi
AAML
97
1,273
0
04 Apr 2017
1
2
Next