@inproceedings{bb159000, AUTHOR = "Yan, B. and Wang, D. and Lu, H. and Yang, X.", TITLE = "Cooling-Shrinking Attack: Blinding the Tracker With Imperceptible Noises", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "987-996", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154904"} @inproceedings{bb159001, AUTHOR = "Yi, C. and Li, H. and Wan, R. and Kot, A.C.", TITLE = "Improving Robustness of DNNs against Common Corruptions via Gaussian Adversarial Training", BOOKTITLE = VCIP20, YEAR = "2020", PAGES = "17-20", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154905"} @inproceedings{bb159002, AUTHOR = "Liu, X. and Xiao, T. and Si, S. and Cao, Q. and Kumar, S. and Hsieh, C.", TITLE = "How Does Noise Help Robustness? Explanation and Exploration under the Neural SDE Framework", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "279-287", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154906"} @inproceedings{bb159003, AUTHOR = "Dong, X. and Han, J. and Chen, D. and Liu, J. and Bian, H. and Ma, Z. and Li, H. and Wang, X. and Zhang, W. and Yu, N.", TITLE = "Robust Superpixel-Guided Attentional Adversarial Attack", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "12892-12901", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154907"} @inproceedings{bb159004, AUTHOR = "Borkar, T. and Heide, F. and Karam, L.J.", TITLE = "Defending Against Universal Attacks Through Selective Feature Regeneration", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "706-716", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154908"} @inproceedings{bb159005, AUTHOR = "Li, G. and Ding, S. and Luo, J. and Liu, C.", TITLE = "Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "797-805", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154909"} @inproceedings{bb159006, AUTHOR = "Shi, Y. and Han, Y. and Tian, Q.", TITLE = "Polishing Decision-Based Adversarial Noise With a Customized Sampling", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "1027-1035", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154910"} @inproceedings{bb159007, AUTHOR = "He, Z. and Rakin, A.S. and Fan, D.L.", TITLE = "Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness Against Adversarial Attack", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "588-597", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154911"} @inproceedings{bb159008, AUTHOR = "Kaneko, T. and Harada, T.", TITLE = "Blur, Noise, and Compression Robust Generative Adversarial Networks", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "13574-13584", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154912"} @inproceedings{bb159009, AUTHOR = "Kaneko, T. and Harada, T.", TITLE = "Noise Robust Generative Adversarial Networks", BOOKTITLE = CVPR20, YEAR = "2020", PAGES = "8401-8411", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154913"} @inproceedings{bb159010, AUTHOR = "Kaneko, T. and Ushiku, Y. and Harada, T.", TITLE = "Label-Noise Robust Generative Adversarial Networks", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "2462-2471", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154914"} @inproceedings{bb159011, AUTHOR = "Xie, C. and Wu, Y.X. and van der Maaten, L. and Yuille, A.L. and He, K.M.", TITLE = "Feature Denoising for Improving Adversarial Robustness", BOOKTITLE = CVPR19, YEAR = "2019", PAGES = "501-509", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154915"} @inproceedings{bb159012, AUTHOR = "Prakash, A. and Moran, N. and Garber, S. and DiLillo, A. and Storer, J.", TITLE = "Deflecting Adversarial Attacks with Pixel Deflection", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "8571-8580", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154916"} @inproceedings{bb159013, AUTHOR = "Liao, F. and Liang, M. and Dong, Y. and Pang, T. and Hu, X. and Zhu, J.", TITLE = "Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser", BOOKTITLE = CVPR18, YEAR = "2018", PAGES = "1778-1787", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defnois6.html#TT154917"} @article{bb159014, AUTHOR = "Biggio, B. and Roli, F.", TITLE = "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning", JOURNAL = PR, VOLUME = "84", YEAR = "2018", PAGES = "317-331", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154918"} @article{bb159015, AUTHOR = "Croce, F. and Rauber, J. and Hein, M.", TITLE = "Scaling up the Randomized Gradient-Free Adversarial Attack Reveals Overestimation of Robustness Using Established Attacks", JOURNAL = IJCV, VOLUME = "128", YEAR = "2020", NUMBER = "4", MONTH = "April", PAGES = "1028-1046", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154919"} @inproceedings{bb159016, AUTHOR = "Croce, F. and Hein, M.", TITLE = "A Randomized Gradient-Free Attack on ReLU Networks", BOOKTITLE = GCPR18, YEAR = "2018", PAGES = "215-227", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154920"} @article{bb159017, AUTHOR = "Aberdam, A. and Golts, A. and Elad, M.", TITLE = "Ada-LISTA: Learned Solvers Adaptive to Varying Models", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "12", MONTH = "December", PAGES = "9222-9235", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154921"} @article{bb159018, AUTHOR = "Ozbulak, U. and Gasparyan, M. and de Neve, W. and van Messem, A.", TITLE = "Perturbation analysis of gradient-based adversarial attacks", JOURNAL = PRL, VOLUME = "135", YEAR = "2020", PAGES = "313-320", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154922"} @article{bb159019, AUTHOR = "Wan, S. and Wu, T.Y. and Hsu, H.W. and Wong, W.H. and Lee, C.Y.", TITLE = "Feature Consistency Training With JPEG Compressed Images", JOURNAL = CirSysVideo, VOLUME = "30", YEAR = "2020", NUMBER = "12", MONTH = "December", PAGES = "4769-4780", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154923"} @article{bb159020, AUTHOR = "Che, Z. and Borji, A. and Zhai, G. and Ling, S. and Li, J. and Tian, Y. and Guo, G. and Le Callet, P.", TITLE = "Adversarial Attack Against Deep Saliency Models Powered by Non-Redundant Priors", JOURNAL = IP, VOLUME = "30", YEAR = "2021", PAGES = "1973-1988", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154924"} @article{bb159021, AUTHOR = "Xu, Y. and Du, B. and Zhang, L.", TITLE = "Assessing the Threat of Adversarial Examples on Deep Neural Networks for Remote Sensing Scene Classification: Attacks and Defenses", JOURNAL = GeoRS, VOLUME = "59", YEAR = "2021", NUMBER = "2", MONTH = "February", PAGES = "1604-1617", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154925"} @article{bb159022, AUTHOR = "Xiao, Y. and Pun, C.M. and Liu, B.", TITLE = "Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation", JOURNAL = PR, VOLUME = "115", YEAR = "2021", PAGES = "107903", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154926"} @article{bb159023, AUTHOR = "Yamanaka, K. and Takahashi, K. and Fujii, T. and Matsumoto, R.", TITLE = "Simultaneous Attack on CNN-Based Monocular Depth Estimation and Optical Flow Estimation", JOURNAL = IEICE, VOLUME = "E104-D", YEAR = "2021", NUMBER = "5", MONTH = "May", PAGES = "785-788", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154927"} @article{bb159024, AUTHOR = "Lin, H.Y. and Biggio, B.", TITLE = "Adversarial Machine Learning: Attacks From Laboratories to the Real World", JOURNAL = Computer, VOLUME = "54", YEAR = "2021", NUMBER = "5", MONTH = "May", PAGES = "56-60", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154928"} @article{bb159025, AUTHOR = "Wang, B. and Zhao, M. and Wang, W. and Wei, F. and Qin, Z. and Ren, K.", TITLE = "Are You Confident That You Have Successfully Generated Adversarial Examples?", JOURNAL = CirSysVideo, VOLUME = "31", YEAR = "2021", NUMBER = "6", MONTH = "June", PAGES = "2089-2099", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154929"} @article{bb159026, AUTHOR = "Tang, S.L. and Huang, X.L. and Chen, M.J. and Sun, C.J. and Yang, J.", TITLE = "Adversarial Attack Type I: Cheat Classifiers by Significant Changes", JOURNAL = PAMI, VOLUME = "43", YEAR = "2021", NUMBER = "3", MONTH = "March", PAGES = "1100-1109", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154930"} @article{bb159027, AUTHOR = "Wang, L. and Yoon, K.J.", TITLE = "PSAT-GAN: Efficient Adversarial Attacks Against Holistic Scene Understanding", JOURNAL = IP, VOLUME = "30", YEAR = "2021", PAGES = "7541-7553", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154931"} @article{bb159028, AUTHOR = "Mohamad Nezami, O. and Chaturvedi, A. and Dras, M. and Garain, U.", TITLE = "Pick-Object-Attack: Type-specific adversarial attack for object detection", JOURNAL = CVIU, VOLUME = "211", YEAR = "2021", PAGES = "103257", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154932"} @article{bb159029, AUTHOR = "Qin, C. and Wu, L. and Zhang, X.P. and Feng, G.R.", TITLE = "Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval", JOURNAL = SPLetters, VOLUME = "28", YEAR = "2021", PAGES = "1893-1897", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154933"} @article{bb159030, AUTHOR = "Du, C. and Zhang, L.", TITLE = "Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network", JOURNAL = RS, VOLUME = "13", YEAR = "2021", NUMBER = "21", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154934"} @article{bb159031, AUTHOR = "Wang, H.J. and Li, G.B. and Liu, X.B. and Lin, L.", TITLE = "A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "4", MONTH = "April", PAGES = "1725-1737", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154935"} @article{bb159032, AUTHOR = "Chen, S. and He, Z.B. and Sun, C.J. and Yang, J. and Huang, X.L.", TITLE = "Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "4", MONTH = "April", PAGES = "2188-2197", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154936"} @article{bb159033, AUTHOR = "Kim, J.", TITLE = "On Optimality of Deterministic Rules in Adversarial Bayesian Detection", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "757-761", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154937"} @article{bb159034, AUTHOR = "Sun, X.X. and Cheng, G. and Pei, L. and Han, J.W.", TITLE = "Query-efficient decision-based attack via sampling distribution reshaping", JOURNAL = PR, VOLUME = "129", YEAR = "2022", PAGES = "108728", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154938"} @article{bb159035, AUTHOR = "Chen, S.M. and Zhang, Q.Q. and Lin, D.Y. and Wang, S.Y.", TITLE = "A Class of Nonlinear Kalman Filters Under a Generalized Measurement Model With False Data Injection Attacks", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "1187-1191", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154939"} @article{bb159036, AUTHOR = "Chen, M. and Wang, Y.J. and Zhu, X.T.", TITLE = "Few-shot Website Fingerprinting attack with Meta-Bias Learning", JOURNAL = PR, VOLUME = "130", YEAR = "2022", PAGES = "108739", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154940"} @article{bb159037, AUTHOR = "Zhang, Z. and Wang, X.G. and Lu, G.M. and Shen, F.M. and Zhu, L.", TITLE = "Targeted Attack of Deep Hashing Via Prototype-Supervised Adversarial Networks", JOURNAL = MultMed, VOLUME = "24", YEAR = "2022", PAGES = "3392-3404", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154941"} @article{bb159038, AUTHOR = "Wang, T.S. and Zhu, L. and Zhang, Z. and Zhang, H.X. and Han, J.W.", TITLE = "Targeted Adversarial Attack Against Deep Cross-Modal Hashing Retrieval", JOURNAL = CirSysVideo, VOLUME = "33", YEAR = "2023", NUMBER = "10", MONTH = "October", PAGES = "6159-6172", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154942"} @article{bb159039, AUTHOR = "Guo, X. and Zhang, H.X. and Liu, L. and Liu, D.M. and Lu, X. and Meng, H.", TITLE = "Primary Code Guided Targeted Attack against Cross-modal Hashing Retrieval", JOURNAL = MultMed, VOLUME = "27", YEAR = "2025", PAGES = "312-326", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154943"} @inproceedings{bb159040, AUTHOR = "Wang, X.G. and Zhang, Z. and Wu, B.Y. and Shen, F.M. and Lu, G.M.", TITLE = "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing", BOOKTITLE = CVPR21, YEAR = "2021", PAGES = "16352-16361", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154944"} @article{bb159041, AUTHOR = "He, Z.W. and Wang, W. and Dong, J. and Tan, T.N.", TITLE = "Revisiting ensemble adversarial attack", JOURNAL = SP:IC, VOLUME = "107", YEAR = "2022", PAGES = "116747", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154945"} @article{bb159042, AUTHOR = "Akhtar, N. and Jalwana, M.A.A.K. and Bennamoun, M. and Mian, A.", TITLE = "Attack to Fool and Explain Deep Networks", JOURNAL = PAMI, VOLUME = "44", YEAR = "2022", NUMBER = "10", MONTH = "October", PAGES = "5980-5995", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154946"} @article{bb159043, AUTHOR = "Deng, Y.P. and Karam, L.J.", TITLE = "Frequency-Tuned Universal Adversarial Attacks on Texture Recognition", JOURNAL = IP, VOLUME = "31", YEAR = "2022", PAGES = "5856-5868", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154947"} @article{bb159044, AUTHOR = "Giulivi, L. and Jere, M. and Rossi, L. and Koushanfar, F. and Ciocarlie, G. and Hitaj, B. and Boracchi, G.", TITLE = "Adversarial scratches: Deployable attacks to CNN classifiers", JOURNAL = PR, VOLUME = "133", YEAR = "2023", PAGES = "108985", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154948"} @article{bb159045, AUTHOR = "Lin, X.X. and Zhou, C. and Wu, J. and Yang, H. and Wang, H.B. and Cao, Y. and Wang, B.", TITLE = "Exploratory Adversarial Attacks on Graph Neural Networks for Semi-Supervised Node Classification", JOURNAL = PR, VOLUME = "133", YEAR = "2023", PAGES = "109042", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154949"} @article{bb159046, AUTHOR = "Bai, T. and Wang, H. and Wen, B.", TITLE = "Targeted Universal Adversarial Examples for Remote Sensing", JOURNAL = RS, VOLUME = "14", YEAR = "2022", NUMBER = "22", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154950"} @article{bb159047, AUTHOR = "Agarwal, A. and Ratha, N. and Vatsa, M. and Singh, R.", TITLE = "Crafting Adversarial Perturbations via Transformed Image Component Swapping", JOURNAL = IP, VOLUME = "31", YEAR = "2022", PAGES = "7338-7349", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154951"} @article{bb159048, AUTHOR = "Kazemi, E. and Kerdreux, T. and Wang, L.Q.", TITLE = "Minimally Distorted Structured Adversarial Attacks", JOURNAL = IJCV, VOLUME = "131", YEAR = "2023", NUMBER = "1", MONTH = "January", PAGES = "160-176", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154952"} @article{bb159049, AUTHOR = "Yuan, H.J. and Chu, Q. and Zhu, F. and Zhao, R. and Liu, B. and Yu, N.H.", TITLE = "AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial Attacks", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "203-213", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154953"} @article{bb159050, AUTHOR = "Wei, X.X. and Guo, Y. and Yu, J.", TITLE = "Adversarial Sticker: A Stealthy Attack Method in the Physical World", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "3", MONTH = "March", PAGES = "2711-2725", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154954"} @article{bb159051, AUTHOR = "Guo, Y.W. and Li, Q.Z. and Zuo, W.M. and Chen, H.", TITLE = "An Intermediate-Level Attack Framework on the Basis of Linear Regression", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "3", MONTH = "March", PAGES = "2726-2735", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154955"} @article{bb159052, AUTHOR = "Qin, C. and Gao, S.Y. and Zhang, X.P. and Feng, G.R.", TITLE = "CADW: CGAN-Based Attack on Deep Robust Image Watermarking", JOURNAL = MultMedMag, VOLUME = "30", YEAR = "2023", NUMBER = "1", MONTH = "January", PAGES = "28-35", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154956"} @article{bb159053, AUTHOR = "Chen, M. and Guo, D. and Yao, H. and Qin, C.", TITLE = "Feature-Attention-Mechanism-Based Attack for Deep Robust Watermarking", JOURNAL = MultMedMag, VOLUME = "32", YEAR = "2025", NUMBER = "1", MONTH = "January", PAGES = "83-91", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154957"} @article{bb159054, AUTHOR = "Lin, G.Y. and Pan, Z.S. and Zhou, X.Y. and Duan, Y.X. and Bai, W. and Zhan, D. and Zhu, L.Q. and Zhao, G.Q. and Li, T.", TITLE = "Boosting Adversarial Transferability with Shallow-Feature Attack on SAR Images", JOURNAL = RS, VOLUME = "15", YEAR = "2023", NUMBER = "10", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154958"} @article{bb159055, AUTHOR = "Pan, J.H. and Foo, L.G. and Zheng, Q.C. and Fan, Z.P. and Rahmani, H. and Ke, Q.H. and Liu, J.", TITLE = "GradMDM: Adversarial Attack on Dynamic Networks", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "9", MONTH = "September", PAGES = "11374-11381", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154959"} @inproceedings{bb159056, AUTHOR = "Pan, J.H. and Zheng, Q.C. and Fan, Z.P. and Rahmani, H. and Ke, Q.H. and Liu, J.", TITLE = "GradAuto: Energy-Oriented Attack on Dynamic Neural Networks", BOOKTITLE = ECCV22, YEAR = "2022", PAGES = "IV:637-653", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154960"} @article{bb159057, AUTHOR = "Bai, J.W. and Wu, B.Y. and Li, Z.F. and Xia, S.T.", TITLE = "Versatile Weight Attack via Flipping Limited Bits", JOURNAL = PAMI, VOLUME = "45", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "13653-13665", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154961"} @article{bb159058, AUTHOR = "Zhang, S.H. and Zuo, D.X. and Yang, Y.L. and Zhang, X.W.", TITLE = "A Transferable Adversarial Belief Attack With Salient Region Perturbation Restriction", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "4296-4306", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154962"} @article{bb159059, AUTHOR = "Liang, X.Y. and Qian, Y.G. and Huang, J.C. and Ling, X. and Wang, B. and Wu, C.M. and Swaileh, W.", TITLE = "Towards desirable decision boundary by Moderate-Margin Adversarial Training", JOURNAL = PRL, VOLUME = "173", YEAR = "2023", PAGES = "30-37", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154963"} @article{bb159060, AUTHOR = "Zheng, S.J. and Liu, W.Q. and Shen, S.Q. and Zang, Y. and Wen, C. and Cheng, M. and Wang, C.", TITLE = "Adaptive local adversarial attacks on 3D point clouds", JOURNAL = PR, VOLUME = "144", YEAR = "2023", PAGES = "109825", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154964"} @article{bb159061, AUTHOR = "Li, Y. and Pan, Q. and Feng, Z.W. and Cambria, E.", TITLE = "Few pixels attacks with generative model", JOURNAL = PR, VOLUME = "144", YEAR = "2023", PAGES = "109849", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154965"} @article{bb159062, AUTHOR = "Xiao, Y. and Zhou, J.Z. and Chen, K.Y. and Liu, Z.B.", TITLE = "Revisiting the transferability of adversarial examples via source-agnostic adversarial feature inducing method", JOURNAL = PR, VOLUME = "144", YEAR = "2023", PAGES = "109828", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154966"} @article{bb159063, AUTHOR = "Sun, J.L. and Yao, W. and Jiang, T. and Chen, X.Q.", TITLE = "Efficient search of comprehensively robust neural architectures via multi-fidelity evaluation", JOURNAL = PR, VOLUME = "146", YEAR = "2024", PAGES = "110038", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154967"} @article{bb159064, AUTHOR = "Chen, T. and Ma, Z.", TITLE = "Toward Robust Neural Image Compression: Adversarial Attack and Model Finetuning", JOURNAL = CirSysVideo, VOLUME = "33", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "7842-7856", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154968"} @article{bb159065, AUTHOR = "Wan, C. and Huang, F. and Zhao, X.F.", TITLE = "Average Gradient-Based Adversarial Attack", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "9572-9585", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154969"} @article{bb159066, AUTHOR = "Akers, M. and Barton, A.", TITLE = "Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning", JOURNAL = Computer, VOLUME = "57", YEAR = "2024", NUMBER = "1", MONTH = "January", PAGES = "88-99", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154970"} @article{bb159067, AUTHOR = "Wei, X.X. and Zhao, S.", TITLE = "Boosting Adversarial Transferability With Learnable Patch-Wise Masks", JOURNAL = MultMed, VOLUME = "26", YEAR = "2024", PAGES = "3778-3787", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154971"} @article{bb159068, AUTHOR = "Li, J. and Wei, X.M.", TITLE = "Research on efficient detection network method for remote sensing images based on self attention mechanism", JOURNAL = IVC, VOLUME = "142", YEAR = "2024", PAGES = "104884", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154972"} @article{bb159069, AUTHOR = "Wei, X.X. and Huang, Y. and Sun, Y.T. and Yu, J.", TITLE = "Unified Adversarial Patch for Visible-Infrared Cross-Modal Attacks in the Physical World", JOURNAL = PAMI, VOLUME = "46", YEAR = "2024", NUMBER = "4", MONTH = "April", PAGES = "2348-2363", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154973"} @inproceedings{bb159070, AUTHOR = "Wei, X.X. and Huang, Y. and Sun, Y.T. and Yu, J.", TITLE = "Unified Adversarial Patch for Cross-modal Attacks in the Physical World", BOOKTITLE = ICCV23, YEAR = "2023", PAGES = "4422-4431", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154974"} @article{bb159071, AUTHOR = "Liu, T.F. and Yang, C. and Liu, X.J. and Han, R.D. and Ma, J.F.", TITLE = "RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "3", MONTH = "March", PAGES = "2586-2598", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154975"} @article{bb159072, AUTHOR = "Tao, A. and Duan, Y. and Wang, Y.Q. and Lu, J.W. and Zhou, J.", TITLE = "Dynamics-Aware Adversarial Attack of Adaptive Neural Networks", JOURNAL = CirSysVideo, VOLUME = "34", YEAR = "2024", NUMBER = "7", MONTH = "July", PAGES = "5505-5518", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154976"} @article{bb159073, AUTHOR = "Li, X. and Zhu, G.P. and Wang, S. and Zhou, Y.C. and Zhang, X.P.", TITLE = "Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model", JOURNAL = CirSysVideo, VOLUME = "34", YEAR = "2024", NUMBER = "7", MONTH = "July", PAGES = "6391-6402", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154977"} @article{bb159074, AUTHOR = "Liu, J.W. and Gong, X. and Wang, T.T. and Hu, Y.F. and Chen, H.", TITLE = "A proxy-data-based hierarchical adversarial patch generation method", JOURNAL = CVIU, VOLUME = "246", YEAR = "2024", PAGES = "104066", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154978"} @article{bb159075, AUTHOR = "Riaz, K. and Anjum, M.L. and Hussain, W. and Manzoor, R.", TITLE = "Targeted adversarial attack on classic vision pipelines", JOURNAL = CVIU, VOLUME = "249", YEAR = "2024", PAGES = "104140", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154979"} @article{bb159076, AUTHOR = "Fan, H.J. and Qin, X.N. and Chen, S. and Shum, H.P.H. and Li, M.", TITLE = "One-index vector quantization based adversarial attack on image classification", JOURNAL = PRL, VOLUME = "186", YEAR = "2024", PAGES = "47-56", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154980"} @article{bb159077, AUTHOR = "Zhao, K. and Wang, T. and Zhang, R.X. and Shen, W.", TITLE = "Adaptive feature alignment for adversarial training", JOURNAL = PRL, VOLUME = "186", YEAR = "2024", PAGES = "184-190", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154981"} @article{bb159078, AUTHOR = "Zhou, C. and Wang, Y.G. and Wang, Z.J. and Kang, X.", TITLE = "Lp-norm distortion-efficient adversarial attack", JOURNAL = SP:IC, VOLUME = "131", YEAR = "2025", PAGES = "117241", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154982"} @article{bb159079, AUTHOR = "Zhang, S.F. and Qian, Z.A. and Huang, K.Z. and Wang, Q.F. and Gu, B. and Xiong, H. and Yi, X.P.", TITLE = "Inter-feature Relationship Certifies Robust Generalization of Adversarial Training", JOURNAL = IJCV, VOLUME = "132", YEAR = "2024", NUMBER = "12", MONTH = "December", PAGES = "5565-5581", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154983"} @article{bb159080, AUTHOR = "Chen, H. and Zhao, S. and Yan, Y. and Qian, F.", TITLE = "Enhancing the Transferability of Adversarial Point Clouds by Initializing Transferable Adversarial Noise", JOURNAL = SPLetters, VOLUME = "32", YEAR = "2025", PAGES = "201-205", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154984"} @article{bb159081, AUTHOR = "Luo, B.Y. and Cao, H. and Cui, J.H. and Lv, X. and He, J.Q. and Li, H.F. and Peng, C.L.", TITLE = "SAR-PATT: A Physical Adversarial Attack for SAR Image Automatic Target Recognition", JOURNAL = RS, VOLUME = "17", YEAR = "2025", NUMBER = "1", PAGES = "21", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154985"} @article{bb159082, AUTHOR = "Zheng, S. and Han, D.S. and Lu, C. and Hou, C. and Han, Y.W. and Hao, X.H. and Zhang, C.N.", TITLE = "Transferable Targeted Adversarial Attack on Synthetic Aperture Radar (SAR) Image Recognition", JOURNAL = RS, VOLUME = "17", YEAR = "2025", NUMBER = "1", PAGES = "146", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154986"} @article{bb159083, AUTHOR = "Zhao, Y. and Huang, W. and Liu, W. and Yao, X.", TITLE = "Negatively correlated ensemble against transfer adversarial attacks", JOURNAL = PR, VOLUME = "161", YEAR = "2025", PAGES = "111155", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154987"} @article{bb159084, AUTHOR = "Li, F.L. and Wang, T. and Zhu, L. and Li, J.J. and Shen, H.T.", TITLE = "Attack as Defense: Proactive Adversarial Multi-Modal Learning to Evade Retrieval", JOURNAL = PAMI, VOLUME = "47", YEAR = "2025", NUMBER = "6", MONTH = "June", PAGES = "4717-4733", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154988"} @article{bb159085, AUTHOR = "Liu, A.S. and Liu, X.L. and Zhang, X.W. and Xiao, Y.S. and Zhou, Y.G. and Liang, S.Y. and Wang, J.K. and Cao, X.C. and Tao, D.C.", TITLE = "Pre-trained Trojan Attacks for Visual Recognition", JOURNAL = IJCV, VOLUME = "133", YEAR = "2025", NUMBER = "6", MONTH = "June", PAGES = "Psges 3568-3585", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154989"} @article{bb159086, AUTHOR = "Yu, Y. and Yang, W. and Yuan, H.B. and Li, L.Y. and Yang, C.", TITLE = "Distributed Secure State Estimation Against Stealthy Attacks", JOURNAL = SPLetters, VOLUME = "32", YEAR = "2025", PAGES = "1930-1934", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154990"} @article{bb159087, AUTHOR = "Zhang, S.H. and Han, S.J. and Yang, S. and Han, X.Q. and Su, J.B. and Zhai, G.Z. and Wang, H.", TITLE = "Transferable targeted adversarial attack via multi-source perturbation generation and integration", JOURNAL = JVCIR, VOLUME = "111", YEAR = "2025", PAGES = "104493", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154991"} @article{bb159088, AUTHOR = "Peng, H.Y. and Cheng, G. and Sun, X.", TITLE = "Generative attack in complex real-world scenarios", JOURNAL = PR, VOLUME = "169", YEAR = "2026", PAGES = "111893", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154992"} @inproceedings{bb159089, AUTHOR = "Guo, P. and Gong, C. and Lin, X. and Liu, F. and Lu, Z.C. and Zhang, Q.F. and Wang, Z.K.", TITLE = "MOS-Attack: A Scalable Multi-Objective Adversarial Attack Framework", BOOKTITLE = CVPR25, YEAR = "2025", PAGES = "5041-5051", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154993"} @inproceedings{bb159090, AUTHOR = "Li, Z.Z. and Du, X.Y. and Lei, N. and Chen, L.M. and Wang, W.M.", TITLE = "NoPain: No-box Point Cloud Attack via Optimal Transport Singular Boundary", BOOKTITLE = CVPR25, YEAR = "2025", PAGES = "3492-3502", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154994"} @inproceedings{bb159091, AUTHOR = "Lin, T. and Yu, L. and Jin, G. and Li, R. and Wu, P. and Zhang, L.J.", TITLE = "Out-of-bounding-box Triggers: A Stealthy Approach to Cheat Object Detectors", BOOKTITLE = ECCV24, YEAR = "2024", PAGES = "LXVI: 269-287", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154995"} @inproceedings{bb159092, AUTHOR = "Sun, Y.H. and Yuan, S.M. and Wang, X. and Gao, L. and Song, J.K.", TITLE = "Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection", BOOKTITLE = ECCV24, YEAR = "2024", PAGES = "XX: 383-398", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154996"} @inproceedings{bb159093, AUTHOR = "Zhu, X.P. and Liu, Y.Q. and Hu, Z. and Li, J.M. and Hu, X.L.", TITLE = "Infrared Adversarial Car Stickers", BOOKTITLE = CVPR24, YEAR = "2024", PAGES = "24284-24293", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154997"} @inproceedings{bb159094, AUTHOR = "Chen, D. and Li, S. and Zhang, Y. and Li, C.H. and Kundu, S. and Beerel, P.A.", TITLE = "DIA: Diffusion based Inverse Network Attack on Collaborative Inference", BOOKTITLE = FaDE-TCV24, YEAR = "2024", PAGES = "124-130", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154998"} @inproceedings{bb159095, AUTHOR = "Fang, Z.W. and Wang, R. and Huang, T. and Jing, L.P.", TITLE = "Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution Learning", BOOKTITLE = CVPR24, YEAR = "2024", PAGES = "24841-24850", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT154999"} @inproceedings{bb159096, AUTHOR = "Ahmed, S. and Zhou, R. and Angizi, S. and Rakin, A.S.", TITLE = "Deep-TROJ: An Inference Stage Trojan Insertion Algorithm Through Efficient Weight Replacement Attack", BOOKTITLE = CVPR24, YEAR = "2024", PAGES = "24810-24819", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155000"} @inproceedings{bb159097, AUTHOR = "Ming, D. and Ren, P. and Wang, Y.L. and Feng, X.", TITLE = "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", BOOKTITLE = CVPR24, YEAR = "2024", PAGES = "24696-24705", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155001"} @inproceedings{bb159098, AUTHOR = "Guesmi, A. and Ding, R. and Hanif, M.A. and Alouani, I. and Shafique, M.", TITLE = "DAP: A Dynamic Adversarial Patch for Evading Person Detectors", BOOKTITLE = CVPR24, YEAR = "2024", PAGES = "24595-24604", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155002"} @inproceedings{bb159099, AUTHOR = "Xu, J.Y. and Lu, Y.T. and Li, Y.D. and Lu, S.Y. and Wang, D.D. and Wei, X.", TITLE = "Perturbing Attention Gives You More Bang for the Buck: Subtle Imaging Perturbations That Efficiently Fool Customized Diffusion Models", BOOKTITLE = CVPR24, YEAR = "2024", PAGES = "24534-24543", BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155003"}