Query-Efficient Decision-Based Black-Box Patch Attack
暂无分享,去创建一个
[1] Bo Li,et al. Towards Practical Certifiable Patch Defense with Vision Transformer , 2022, 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[2] D. Ranasinghe,et al. Query Efficient Decision Based Sparse Attacks Against Black-Box Deep Learning Models , 2022, ICLR.
[3] Jun Zhu,et al. Improving Transferability of Adversarial Patches on Face Recognition with Generative Models , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Jilin Li,et al. Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition , 2021, IJCAI.
[5] A. Dosovitskiy,et al. MLP-Mixer: An all-MLP Architecture for Vision , 2021, NeurIPS.
[6] Andreas Veit,et al. Understanding Robustness of Transformers for Image Classification , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[7] Kai-Kuang Ma,et al. Rpattack: Refined Patch Attack on General Object Detectors , 2021, 2021 IEEE International Conference on Multimedia and Expo (ICME).
[8] Asaf Shabtai,et al. The Translucent Patch: A Physical and Universal Attack on Object Detectors , 2020, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[9] S. Gelly,et al. An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale , 2020, ICLR.
[10] Xiaochun Cao,et al. Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples , 2020, ACM Multimedia.
[11] Nicolas Flammarion,et al. Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks , 2020, AAAI.
[12] Shuang Yang,et al. QEBA: Query-Efficient Boundary-Based Blackbox Attack , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Bernt Schiele,et al. Adversarial Training against Location-Optimized Adversarial Patches , 2020, ECCV Workshops.
[14] Weihong Deng,et al. Towards Transferable Adversarial Attack Against Deep Face Recognition , 2020, IEEE Transactions on Information Forensics and Security.
[15] Cihang Xie,et al. PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning , 2020, ECCV.
[16] Matthias Hein,et al. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks , 2020, ICML.
[17] Alexander Levine,et al. (De)Randomized Smoothing for Certifiable Defense against Patch Attacks , 2020, NeurIPS.
[18] Yannis Avrithis,et al. Walking on the Edge: Fast, Low-Distortion Adversarial Examples , 2019, IEEE Transactions on Information Forensics and Security.
[19] L. Davis,et al. Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors , 2019, ECCV.
[20] Y. Vorobeychik,et al. Defending Against Physically Realizable Attacks on Image Classification , 2019, ICLR.
[21] Aleksandr Petiushko,et al. AdvHat: Real-World Adversarial Attack on ArcFace Face ID System , 2019, 2020 25th International Conference on Pattern Recognition (ICPR).
[22] Cong Liu,et al. PhysGAN: Generating Physical-World-Resilient Adversarial Examples for Autonomous Driving , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[23] W. Liu,et al. Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Michael I. Jordan,et al. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[25] Salman Khan,et al. Local Gradients Smoothing: Defense Against Localized Adversarial Attacks , 2018, 2019 IEEE Winter Conference on Applications of Computer Vision (WACV).
[26] Jamie Hayes,et al. On Visible Adversarial Perturbations & Digital Watermarking , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[27] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[28] Logan Engstrom,et al. Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.
[29] Prateek Mittal,et al. DARTS: Deceiving Autonomous Cars with Toxic Signs , 2018, ArXiv.
[30] Xing Ji,et al. CosFace: Large Margin Cosine Loss for Deep Face Recognition , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[31] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Yoav Goldberg,et al. LaVAN: Localized and Visible Adversarial Noise , 2018, ICML.
[33] Martín Abadi,et al. Adversarial Patch , 2017, ArXiv.
[34] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[35] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[36] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[37] Radha Poovendran,et al. Google's Cloud Vision API is Not Robust to Noise , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[38] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[39] Abhishek Das,et al. Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[40] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[41] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[42] Leon A. Gatys,et al. Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[43] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[44] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[45] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[46] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[47] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[48] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[49] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[50] Honglak Lee,et al. Learning to Align from Scratch , 2012, NIPS.
[51] Rainer Storn,et al. Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..
[52] Bo Li,et al. Shape Matters: Deformable Patch Attack , 2022, ECCV.
[53] Pascal Frossard,et al. Measuring the effect of nuisance variables on classifiers , 2016, BMVC.
[54] D. E. Goldberg,et al. Genetic Algorithm in Search , 1989 .