@article{bb159900,
        AUTHOR = "Zhou, C. and Wang, Y.G. and Wang, Z.J. and Kang, X.",
        TITLE = "Lp-norm distortion-efficient adversarial attack",
        JOURNAL = SP:IC,
        VOLUME = "131",
        YEAR = "2025",
        PAGES = "117241",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155799"}

@article{bb159901,
        AUTHOR = "Zhang, S.F. and Qian, Z.A. and Huang, K.Z. and Wang, Q.F. and Gu, B. and Xiong, H. and Yi, X.P.",
        TITLE = "Inter-feature Relationship Certifies Robust Generalization of
Adversarial Training",
        JOURNAL = IJCV,
        VOLUME = "132",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "5565-5581",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155800"}

@article{bb159902,
        AUTHOR = "Chen, H. and Zhao, S. and Yan, Y. and Qian, F.",
        TITLE = "Enhancing the Transferability of Adversarial Point Clouds by
Initializing Transferable Adversarial Noise",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "201-205",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155801"}

@article{bb159903,
        AUTHOR = "Luo, B.Y. and Cao, H. and Cui, J.H. and Lv, X. and He, J.Q. and Li, H.F. and Peng, C.L.",
        TITLE = "SAR-PATT: A Physical Adversarial Attack for SAR Image Automatic
Target Recognition",
        JOURNAL = RS,
        VOLUME = "17",
        YEAR = "2025",
        NUMBER = "1",
        PAGES = "21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155802"}

@article{bb159904,
        AUTHOR = "Zheng, S. and Han, D.S. and Lu, C. and Hou, C. and Han, Y.W. and Hao, X.H. and Zhang, C.N.",
        TITLE = "Transferable Targeted Adversarial Attack on Synthetic Aperture Radar
(SAR) Image Recognition",
        JOURNAL = RS,
        VOLUME = "17",
        YEAR = "2025",
        NUMBER = "1",
        PAGES = "146",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155803"}

@article{bb159905,
        AUTHOR = "Zhao, Y. and Huang, W. and Liu, W. and Yao, X.",
        TITLE = "Negatively correlated ensemble against transfer adversarial attacks",
        JOURNAL = PR,
        VOLUME = "161",
        YEAR = "2025",
        PAGES = "111155",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155804"}

@article{bb159906,
        AUTHOR = "Li, F.L. and Wang, T. and Zhu, L. and Li, J.J. and Shen, H.T.",
        TITLE = "Attack as Defense: Proactive Adversarial Multi-Modal Learning to
Evade Retrieval",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "4717-4733",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155805"}

@article{bb159907,
        AUTHOR = "Liu, A.S. and Liu, X.L. and Zhang, X.W. and Xiao, Y.S. and Zhou, Y.G. and Liang, S.Y. and Wang, J.K. and Cao, X.C. and Tao, D.C.",
        TITLE = "Pre-trained Trojan Attacks for Visual Recognition",
        JOURNAL = IJCV,
        VOLUME = "133",
        YEAR = "2025",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "Psges 3568-3585",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155806"}

@article{bb159908,
        AUTHOR = "Yu, Y. and Yang, W. and Yuan, H.B. and Li, L.Y. and Yang, C.",
        TITLE = "Distributed Secure State Estimation Against Stealthy Attacks",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "1930-1934",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155807"}

@article{bb159909,
        AUTHOR = "Zhang, S.H. and Han, S.J. and Yang, S. and Han, X.Q. and Su, J.B. and Zhai, G.Z. and Wang, H.",
        TITLE = "Transferable targeted adversarial attack via multi-source
perturbation generation and integration",
        JOURNAL = JVCIR,
        VOLUME = "111",
        YEAR = "2025",
        PAGES = "104493",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155808"}

@article{bb159910,
        AUTHOR = "Peng, H.Y. and Cheng, G. and Sun, X.",
        TITLE = "Generative attack in complex real-world scenarios",
        JOURNAL = PR,
        VOLUME = "169",
        YEAR = "2026",
        PAGES = "111893",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155809"}

@article{bb159911,
        AUTHOR = "Zhang, C. and Zhou, L. and Xu, X.G. and Wu, J. and Liu, Z.",
        TITLE = "Adversarial Attacks of Vision Tasks in the Past 10 Years: A Survey",
        JOURNAL = Surveys,
        VOLUME = "58",
        YEAR = "2025",
        NUMBER = "2",
        MONTH = "September",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155810"}

@inproceedings{bb159912,
        AUTHOR = "Guo, P. and Gong, C. and Lin, X. and Liu, F. and Lu, Z.C. and Zhang, Q.F. and Wang, Z.K.",
        TITLE = "MOS-Attack: A Scalable Multi-Objective Adversarial Attack Framework",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "5041-5051",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155811"}

@inproceedings{bb159913,
        AUTHOR = "Li, Z.Z. and Du, X.Y. and Lei, N. and Chen, L.M. and Wang, W.M.",
        TITLE = "NoPain: No-box Point Cloud Attack via Optimal Transport Singular
Boundary",
        BOOKTITLE = CVPR25,
        YEAR = "2025",
        PAGES = "3492-3502",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155812"}

@inproceedings{bb159914,
        AUTHOR = "Lin, T. and Yu, L. and Jin, G. and Li, R. and Wu, P. and Zhang, L.J.",
        TITLE = "Out-of-bounding-box Triggers: A Stealthy Approach to Cheat Object
Detectors",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXVI: 269-287",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155813"}

@inproceedings{bb159915,
        AUTHOR = "Sun, Y.H. and Yuan, S.M. and Wang, X. and Gao, L. and Song, J.K.",
        TITLE = "Any Target Can be Offense: Adversarial Example Generation via
Generalized Latent Infection",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "XX: 383-398",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155814"}

@inproceedings{bb159916,
        AUTHOR = "Zhu, X.P. and Liu, Y.Q. and Hu, Z. and Li, J.M. and Hu, X.L.",
        TITLE = "Infrared Adversarial Car Stickers",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24284-24293",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155815"}

@inproceedings{bb159917,
        AUTHOR = "Chen, D. and Li, S. and Zhang, Y. and Li, C.H. and Kundu, S. and Beerel, P.A.",
        TITLE = "DIA: Diffusion based Inverse Network Attack on Collaborative
Inference",
        BOOKTITLE = FaDE-TCV24,
        YEAR = "2024",
        PAGES = "124-130",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155816"}

@inproceedings{bb159918,
        AUTHOR = "Fang, Z.W. and Wang, R. and Huang, T. and Jing, L.P.",
        TITLE = "Strong Transferable Adversarial Attacks via Ensembled Asymptotically
Normal Distribution Learning",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24841-24850",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155817"}

@inproceedings{bb159919,
        AUTHOR = "Ahmed, S. and Zhou, R. and Angizi, S. and Rakin, A.S.",
        TITLE = "Deep-TROJ: An Inference Stage Trojan Insertion Algorithm Through
Efficient Weight Replacement Attack",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24810-24819",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155818"}

@inproceedings{bb159920,
        AUTHOR = "Ming, D. and Ren, P. and Wang, Y.L. and Feng, X.",
        TITLE = "Transferable Structural Sparse Adversarial Attack Via Exact Group
Sparsity Training",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24696-24705",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155819"}

@inproceedings{bb159921,
        AUTHOR = "Guesmi, A. and Ding, R. and Hanif, M.A. and Alouani, I. and Shafique, M.",
        TITLE = "DAP: A Dynamic Adversarial Patch for Evading Person Detectors",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24595-24604",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155820"}

@inproceedings{bb159922,
        AUTHOR = "Xu, J.Y. and Lu, Y.T. and Li, Y.D. and Lu, S.Y. and Wang, D.D. and Wei, X.",
        TITLE = "Perturbing Attention Gives You More Bang for the Buck: Subtle Imaging
Perturbations That Efficiently Fool Customized Diffusion Models",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24534-24543",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155821"}

@inproceedings{bb159923,
        AUTHOR = "Mahmood, H. and Elhamifar, E.",
        TITLE = "Semantic-Aware Multi-Label Adversarial Attacks",
        BOOKTITLE = CVPR24,
        YEAR = "2024",
        PAGES = "24251-24262",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155822"}

@inproceedings{bb159924,
        AUTHOR = "Zhang, M.X. and Yu, N. and Wen, R. and Backes, M. and Zhang, Y.",
        TITLE = "Generated Distributions Are All You Need for Membership Inference
Attacks Against Generative Models",
        BOOKTITLE = WACV24,
        YEAR = "2024",
        PAGES = "4827-4837",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155823"}

@inproceedings{bb159925,
        AUTHOR = "Cohen, G. and Giryes, R.",
        TITLE = "Membership Inference Attack Using Self Influence Functions",
        BOOKTITLE = WACV24,
        YEAR = "2024",
        PAGES = "4880-4889",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155824"}

@inproceedings{bb159926,
        AUTHOR = "Ledda, E. and Angioni, D. and Piras, G. and Fumera, G. and Biggio, B. and Roli, F.",
        TITLE = "Adversarial Attacks Against Uncertainty Quantification",
        BOOKTITLE = Uncertainty23,
        YEAR = "2023",
        PAGES = "4601-4610",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155825"}

@inproceedings{bb159927,
        AUTHOR = "Tal, O.B. and Haviv, A. and Bermano, A.H.",
        TITLE = "OMG-Attack: Self-Supervised On-Manifold Generation of Transferable
Evasion Attacks",
        BOOKTITLE = AROW23,
        YEAR = "2023",
        PAGES = "3698-3708",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155826"}

@inproceedings{bb159928,
        AUTHOR = "Ambati, R. and Akhtar, N. and Mian, A. and Rawat, Y.S.",
        TITLE = "PRAT: PRofiling Adversarial aTtacks",
        BOOKTITLE = AROW23,
        YEAR = "2023",
        PAGES = "3669-3678",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155827"}

@inproceedings{bb159929,
        AUTHOR = "Ko, M. and Jin, M. and Wang, C.G. and Jia, R.X.",
        TITLE = "Practical Membership Inference Attacks Against Large-Scale
Multi-Modal Models: A Pilot Study",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4848-4858",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155828"}

@inproceedings{bb159930,
        AUTHOR = "Dong, J.S. and Qiu, H. and Li, Y.M. and Zhang, T.W. and Li, Y.J. and Lai, Z. and Zhang, C. and Xia, S.T.",
        TITLE = "One-bit Flip is All You Need: When Bit-flip Attack Meets Model
Training",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4665-4675",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155829"}

@inproceedings{bb159931,
        AUTHOR = "Ma, W.S. and Li, Y.D. and Jia, X.F. and Xu, W.",
        TITLE = "Transferable Adversarial Attack for Both Vision Transformers and
Convolutional Networks via Momentum Integrated Gradients",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4607-4616",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155830"}

@inproceedings{bb159932,
        AUTHOR = "Chen, X.Q. and Gao, X.T. and Zhao, J.J. and Ye, K.J. and Xu, C.Z.",
        TITLE = "AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion
Models",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4539-4549",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155831"}

@inproceedings{bb159933,
        AUTHOR = "Zhou, T. and Ye, Q. and Luo, W.H. and Zhang, K. and Shi, Z.G. and Chen, J.M.",
        TITLE = "F&F Attack: Adversarial Attack against Multiple Object Trackers
by Inducing False Negatives and False Positives",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4550-4560",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155832"}

@inproceedings{bb159934,
        AUTHOR = "Qian, Y.G. and He, S. and Zhao, C.Y. and Sha, J.Q. and Wang, W. and Wang, B.",
        TITLE = "LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping
Vulnerable Frequency Regions",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4487-4498",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155833"}

@inproceedings{bb159935,
        AUTHOR = "Maho, T. and Moosavi Dezfooli, S.M. and Furon, T.",
        TITLE = "How to choose your best allies for a transferable attack?",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4519-4528",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155834"}

@inproceedings{bb159936,
        AUTHOR = "Wang, D.H. and Yao, W. and Jiang, T. and Li, C. and Chen, X.Q.",
        TITLE = "RFLA:
A Stealthy Reflected Light Adversarial Attack in the Physical World",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4432-4442",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155835"}

@inproceedings{bb159937,
        AUTHOR = "Zhou, Z.Q. and Hu, S. and Zhao, R.Z. and Wang, Q. and Zhang, L.Y. and Hou, J.H. and Jin, H.",
        TITLE = "Downstream-agnostic Adversarial Examples",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4322-4332",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155836"}

@inproceedings{bb159938,
        AUTHOR = "Kim, H.S. and Son, M.J. and Kim, M. and Kwon, M.J. and Kim, C.",
        TITLE = "Breaking Temporal Consistency: Generating Video Universal Adversarial
Perturbations Using Image Models",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4302-4311",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155837"}

@inproceedings{bb159939,
        AUTHOR = "Stolik, T. and Lang, I. and Avidan, S.",
        TITLE = "SAGA: Spectral Adversarial Geometric Attack on 3D Meshes",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "4261-4271",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155838"}

@inproceedings{bb159940,
        AUTHOR = "Zeng, H. and Zhang, T. and Chen, B.W. and Peng, A.J.",
        TITLE = "Enhancing Targeted Transferability Via Suppressing High-Confidence
Labels",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3309-3313",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155839"}

@inproceedings{bb159941,
        AUTHOR = "Kim, Y. and Cho, S.J. and Byun, J. and Kwon, M.J. and Kim, C.",
        TITLE = "Improving Adversarial Transferability Via Feature Translation",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3359-3363",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155840"}

@inproceedings{bb159942,
        AUTHOR = "Coscia, P. and Genovese, A. and Scotti, F. and Piuri, V.",
        TITLE = "Adversarial Defect Synthesis for Industrial Products in Low Data
Regime",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "1360-1364",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155841"}

@inproceedings{bb159943,
        AUTHOR = "Lin, Z. and Peng, A.J. and Zeng, H. and Wu, K.J. and Yu, W.X.",
        TITLE = "An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3439-3443",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155842"}

@inproceedings{bb159944,
        AUTHOR = "Ma, M.Z. and Zheng, W.J. and Lv, W.L. and Ren, L. and Su, H. and Yin, Z.X.",
        TITLE = "Multi-Label Adversarial Attack Based on Label Correlation",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "2050-2054",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155843"}

@inproceedings{bb159945,
        AUTHOR = "Wu, T. and Luo, T. and Wunsch, D.C.",
        TITLE = "GNP Attack: Transferable Adversarial Examples Via Gradient Norm
Penalty",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "3110-3114",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155844"}

@inproceedings{bb159946,
        AUTHOR = "Sha, Z.Y. and He, X.L. and Yu, N. and Backes, M. and Zhang, Y.",
        TITLE = "Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image
Encoders",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16373-16383",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155845"}

@inproceedings{bb159947,
        AUTHOR = "Feng, W.W. and Xu, N. and Zhang, T.Z. and Zhang, Y.D.",
        TITLE = "Dynamic Generative Targeted Attacks with Pattern Injection",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "16404-16414",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155846"}

@inproceedings{bb159948,
        AUTHOR = "Takahashi, H. and Liu, J.J. and Liu, Y.",
        TITLE = "Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12198-12207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155847"}

@inproceedings{bb159949,
        AUTHOR = "Wei, Z.P. and Chen, J.J. and Wu, Z.X. and Jiang, Y.G.",
        TITLE = "Enhancing the Self-Universality for Transferable Targeted Attacks",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "12281-12290",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155848"}

@inproceedings{bb159950,
        AUTHOR = "Chen, W.X. and Song, D. and Li, B.",
        TITLE = "TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets",
        BOOKTITLE = CVPR23,
        YEAR = "2023",
        PAGES = "4035-4044",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155849"}

@inproceedings{bb159951,
        AUTHOR = "Zhuang, H.M. and Zhang, Y.H. and Liu, S.",
        TITLE = "A Pilot Study of Query-Free Adversarial Attack against Stable
Diffusion",
        BOOKTITLE = AML23,
        YEAR = "2023",
        PAGES = "2385-2392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155850"}

@inproceedings{bb159952,
        AUTHOR = "Brown, D. and Kvinge, H.",
        TITLE = "Making Corgis Important for Honeycomb Classification:
Adversarial Attacks on Concept-based Explainability Tools",
        BOOKTITLE = TAG-PRA23,
        YEAR = "2023",
        PAGES = "620-627",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155851"}

@inproceedings{bb159953,
        AUTHOR = "Shukla, N. and Banerjee, S.",
        TITLE = "Generating Adversarial Attacks in the Latent Space",
        BOOKTITLE = GCV23,
        YEAR = "2023",
        PAGES = "730-739",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155852"}

@inproceedings{bb159954,
        AUTHOR = "Zhang, L. and Wang, X.D.",
        TITLE = "Advfilter: Adversarial Example Generated by Perturbing Optical Path",
        BOOKTITLE = "ACCVWS22",
        YEAR = "2022",
        PAGES = "33-44",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155853"}

@inproceedings{bb159955,
        AUTHOR = "Koren, T. and Talker, L. and Dinerstein, M. and Vitek, R.",
        TITLE = "Consistent Semantic Attacks on Optical Flow",
        BOOKTITLE = ACCV22,
        YEAR = "2022",
        PAGES = "VII:501-517",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155854"}

@inproceedings{bb159956,
        AUTHOR = "Wu, H. and Wang, J. and Zhang, J.W. and Luo, X.Y. and Ma, B.",
        TITLE = "Improving the Transferability of Adversarial Attacks Through Both Front
and Rear Vector Method",
        BOOKTITLE = IWDW22,
        YEAR = "2022",
        PAGES = "83-97",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155855"}

@inproceedings{bb159957,
        AUTHOR = "Waseda, F. and Nishikawa, S. and Le, T.N. and Nguyen, H.H. and Echizen, I.",
        TITLE = "Closer Look at the Transferability of Adversarial Examples:
How They Fool Different Models Differently",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "1360-1368",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155856"}

@inproceedings{bb159958,
        AUTHOR = "Shapira, A. and Zolfi, A. and Demetrio, L. and Biggio, B. and Shabtai, A.",
        TITLE = "Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep
Object Detectors",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "4560-4569",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155857"}

@inproceedings{bb159959,
        AUTHOR = "Tan, H.X. and Kotthaus, H.",
        TITLE = "Explainability-Aware One Point Attack for Point Cloud Neural Networks",
        BOOKTITLE = WACV23,
        YEAR = "2023",
        PAGES = "4570-4579",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155858"}

@inproceedings{bb159960,
        AUTHOR = "Chen, C.C. and Zhu, W.J. and Peng, B. and Lu, H.J.",
        TITLE = "Towards Robust Community Detection via Extreme Adversarial Attacks",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "2231-2237",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155859"}

@inproceedings{bb159961,
        AUTHOR = "Tavallali, P. and Behzadan, V. and Alizadeh, A. and Ranganath, A. and Singhal, M.",
        TITLE = "Adversarial Label-Poisoning Attacks and Defense for General
Multi-Class Models Based on Synthetic Reduced Nearest Neighbor",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3717-3722",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155860"}

@inproceedings{bb159962,
        AUTHOR = "Lin, Z. and Peng, A.J. and Wei, R. and Yu, W.X. and Zeng, H.",
        TITLE = "An Enhanced Transferable Adversarial Attack of Scale-Invariant
Methods",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3788-3792",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155861"}

@inproceedings{bb159963,
        AUTHOR = "Ran, Y. and Wang, Y.G.",
        TITLE = "Sign-OPT+: An Improved Sign Optimization Adversarial Attack",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "461-465",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155862"}

@inproceedings{bb159964,
        AUTHOR = "Wang, D. and Lin, J.Y. and Wang, Y.G.",
        TITLE = "Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "546-550",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155863"}

@inproceedings{bb159965,
        AUTHOR = "Aneja, S. and Markhasin, L. and Nießner, M.",
        TITLE = "TAFIM: Targeted Adversarial Attacks Against Facial Image Manipulations",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "XIV:58-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155864"}

@inproceedings{bb159966,
        AUTHOR = "Long, Y.Y. and Zhang, Q.L. and Zeng, B. and Gao, L.L. and Liu, X.L. and Zhang, J. and Song, J.K.",
        TITLE = "Frequency Domain Model Augmentation for Adversarial Attack",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "IV:549-566",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155865"}

@inproceedings{bb159967,
        AUTHOR = "Yuan, Z. and Zhang, J. and Shan, S.G.",
        TITLE = "Adaptive Image Transformations for Transfer-Based Adversarial Attack",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:1-17",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155866"}

@inproceedings{bb159968,
        AUTHOR = "Cao, Y.L. and Xiao, C.W. and Anandkumar, A. and Xu, D. and Pavone, M.",
        TITLE = "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:36-52",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155867"}

@inproceedings{bb159969,
        AUTHOR = "Bai, J.W. and Gao, K.F. and Gong, D.H. and Xia, S.T. and Li, Z.F. and Liu, W.",
        TITLE = "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:104-121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155868"}

@inproceedings{bb159970,
        AUTHOR = "Liu, G. and Huang, X.W. and Yi, X.P.",
        TITLE = "Adversarial Label Poisoning Attack on Graph Neural Networks via Label
Propagation",
        BOOKTITLE = ECCV22,
        YEAR = "2022",
        PAGES = "V:227-243",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155869"}

@inproceedings{bb159971,
        AUTHOR = "Byun, J. and Shim, K. and Go, H. and Kim, C.",
        TITLE = "Hidden Conditional Adversarial Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "1306-1310",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155870"}

@inproceedings{bb159972,
        AUTHOR = "Son, M.J. and Kwon, M.J. and Kim, H.S. and Byun, J. and Cho, S. and Kim, C.",
        TITLE = "Adaptive Warping Network for Transferable Adversarial Attacks",
        BOOKTITLE = ICIP22,
        YEAR = "2022",
        PAGES = "3056-3060",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155871"}

@inproceedings{bb159973,
        AUTHOR = "Cao, X.Y. and Gong, N.Z.Q.",
        TITLE = "MPAF: Model Poisoning Attacks to Federated Learning based on Fake
Clients",
        BOOKTITLE = FedVision22,
        YEAR = "2022",
        PAGES = "3395-3403",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155872"}

@inproceedings{bb159974,
        AUTHOR = "Xu, Q.L. and Tao, G.H. and Zhang, X.Y.",
        TITLE = "Bounded Adversarial Attack on Deep Content Features",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15182-15191",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155873"}

@inproceedings{bb159975,
        AUTHOR = "Luo, C. and Lin, Q.L. and Xie, W.C. and Wu, B.Z. and Xie, J.H. and Shen, L.L.",
        TITLE = "Frequency-driven Imperceptible Adversarial Attack on Semantic
Similarity",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15294-15303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155874"}

@inproceedings{bb159976,
        AUTHOR = "Suryanto, N. and Kim, Y. and Kang, H. and Larasati, H.T. and Yun, Y.Y. and Le, T.T.H. and Yang, H. and Oh, S.Y. and Kim, H.",
        TITLE = "DTA: Physical Camouflage Attacks using Differentiable Transformation
Network",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15284-15293",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155875"}

@inproceedings{bb159977,
        AUTHOR = "Zhong, Y.Q. and Liu, X.M. and Zhai, D. and Jiang, J.J. and Ji, X.Y.",
        TITLE = "Shadows can be Dangerous: Stealthy and Effective Physical-world
Adversarial Attack by Natural Phenomenon",
        BOOKTITLE = CVPR22,
        YEAR = "2022",
        PAGES = "15324-15333",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155876"}

@inproceedings{bb159978,
        AUTHOR = "Tong, A.C.H.",
        TITLE = "Symmetric adversarial poisoning against deep learning",
        BOOKTITLE = IPTA20,
        YEAR = "2020",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155877"}

@inproceedings{bb159979,
        AUTHOR = "Li, Y.M. and Wen, C.C. and Juefei Xu, F. and Feng, C.",
        TITLE = "Fooling LiDAR Perception via Adversarial Trajectory Perturbation",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7878-7887",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155878"}

@inproceedings{bb159980,
        AUTHOR = "Wang, X.S. and He, X.R. and Wang, J.D. and He, K.",
        TITLE = "Admix: Enhancing the Transferability of Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16138-16147",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155879"}

@inproceedings{bb159981,
        AUTHOR = "Chen, S. and Kahla, M. and Jia, R.X. and Qi, G.J.",
        TITLE = "Knowledge-Enriched Distributional Model Inversion Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16158-16167",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155880"}

@inproceedings{bb159982,
        AUTHOR = "Zhou, M. and Wang, L. and Niu, Z.X. and Zhang, Q.L. and Xu, Y.H. and Zheng, N.N. and Hua, G.",
        TITLE = "Practical Relative Order Attack in Deep Ranking",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "16393-16402",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155881"}

@inproceedings{bb159983,
        AUTHOR = "Shafran, A. and Peleg, S. and Hoshen, Y.",
        TITLE = "Membership Inference Attacks are Easier on Difficult Problems",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "14800-14809",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155882"}

@inproceedings{bb159984,
        AUTHOR = "Naseer, M. and Khan, S. and Hayat, M. and Khan, F.S. and Porikli, F.M.",
        TITLE = "On Generating Transferable Targeted Perturbations",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7688-7697",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155883"}

@inproceedings{bb159985,
        AUTHOR = "Chen, H. and Fu, C. and Zhao, J. and Koushanfar, F.",
        TITLE = "ProFlip: Targeted Trojan Attack with Progressive Bit Flips",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7698-7707",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155884"}

@inproceedings{bb159986,
        AUTHOR = "Rony, J. and Granger, E. and Pedersoli, M. and Ayed, I.B.",
        TITLE = "Augmented Lagrangian Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7718-7727",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155885"}

@inproceedings{bb159987,
        AUTHOR = "Yuan, Z. and Zhang, J. and Jia, Y. and Tan, C. and Xue, T. and Shan, S.G.",
        TITLE = "Meta Gradient Adversarial Attack",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7728-7737",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155886"}

@inproceedings{bb159988,
        AUTHOR = "Park, G.Y. and Lee, S.W.",
        TITLE = "Reliably fast adversarial training via latent adversarial
perturbation",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7738-7747",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155887"}

@inproceedings{bb159989,
        AUTHOR = "Tu, J. and Wang, T. and Wang, J.K. and Manivasagam, S. and Ren, M. and Urtasun, R.",
        TITLE = "Adversarial Attacks On Multi-Agent Communication",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7748-7757",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155888"}

@inproceedings{bb159990,
        AUTHOR = "Feng, W.W. and Wu, B.Y. and Zhang, T.Z. and Zhang, Y. and Zhang, Y.D.",
        TITLE = "Meta-Attack: Class-agnostic and Model-agnostic Physical Adversarial
Attack",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7767-7776",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155889"}

@inproceedings{bb159991,
        AUTHOR = "Kim, J.Y. and Hua, B.S. and Nguyen, D.T. and Yeung, S.K.",
        TITLE = "Minimal Adversarial Examples for Deep Learning on 3D Point Clouds",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7777-7786",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155890"}

@inproceedings{bb159992,
        AUTHOR = "Stutz, D. and Hein, M. and Schiele, B.",
        TITLE = "Relating Adversarially Robust Generalization to Flat Minima",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7787-7797",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155891"}

@inproceedings{bb159993,
        AUTHOR = "Li, C. and Gao, S.Q. and Deng, C. and Liu, W. and Huang, H.",
        TITLE = "Adversarial Attack on Deep Cross-Modal Hamming Retrieval",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "2198-2207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155892"}

@inproceedings{bb159994,
        AUTHOR = "Duan, R.J. and Chen, Y.F. and Niu, D. and Yang, Y. and Qin, A.K. and He, Y.",
        TITLE = "AdvDrop: Adversarial Attack to DNNs by Dropping Information",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7486-7495",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155893"}

@inproceedings{bb159995,
        AUTHOR = "Hwang, J. and Kim, J.H. and Choi, J.H. and Lee, J.S.",
        TITLE = "Just One Moment: Structural Vulnerability of Deep Action Recognition
against One Frame Attack",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7648-7656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155894"}

@inproceedings{bb159996,
        AUTHOR = "Moayeri, M. and Feizi, S.",
        TITLE = "Sample Efficient Detection and Classification of Adversarial Attacks
via Self-Supervised Embeddings",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7657-7666",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155895"}

@inproceedings{bb159997,
        AUTHOR = "Wang, Z.B. and Guo, H.C. and Zhang, Z.F. and Liu, W.X. and Qin, Z. and Ren, K.",
        TITLE = "Feature Importance-aware Transferable Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "7619-7628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155896"}

@inproceedings{bb159998,
        AUTHOR = "Wang, X. and Lin, S.Y. and Zhang, H. and Zhu, Y.F. and Zhang, Q.S.",
        TITLE = "Interpreting Attributions and Interactions of Adversarial Attacks",
        BOOKTITLE = ICCV21,
        YEAR = "2021",
        PAGES = "1075-1084",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155897"}

@inproceedings{bb159999,
        AUTHOR = "Kumar, C. and Kumar, D. and Shao, M.",
        TITLE = "Generative Adversarial Attack on Ensemble Clustering",
        BOOKTITLE = WACV22,
        YEAR = "2022",
        PAGES = "3839-3848",
        BIBSOURCE = "http://www.visionbib.com/bibliography/pattern654defatk5.html#TT155898"}

Last update:Nov 26, 2025 at 20:24:09