4.5 Article

A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Adversarial Machine Learning in Image Classification: A Survey Toward the Defender's Perspective

Gabriel Resende Machado et al.

Summary: This article provides a review of the latest research progress in Adversarial Machine Learning in Image Classification, presenting novel taxonomies for categorizing adversarial attacks and defenses, discussing the existence of adversarial examples, and offering guidance and future research directions.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks

Mengran Yu et al.

Summary: This paper proposes a simplified adversarial framework called FE-DaST based on a single-branch generator to train substitute models quickly and effectively. Experimental results demonstrate the superiority of FE-DaST over other methods in terms of computational loads, similarities between surrogate models and target models, and attack success rates.

COMPUTERS & SECURITY (2022)

Article Computer Science, Information Systems

White-box content camouflage attacks against deep learning

Tianrong Chen et al.

Summary: This paper examines content camouflage attacks on preprocessing modules in deep learning systems and formulates them as an optimization problem using a multi-scale discriminator. Experimental results demonstrate the effectiveness of the proposed attacks against deep learning systems.

COMPUTERS & SECURITY (2022)

Article Computer Science, Artificial Intelligence

Derivative-free optimization adversarial attacks for graph convolutional networks

Runze Yang et al.

Summary: Recent research has shown that graph convolutional networks are vulnerable to adversarial attacks, and this paper proposes a black-box adversarial attack framework based on derivative-free optimization to generate graph adversarial examples. By using advanced DFO algorithms and redesigning the perturbation vector, the framework can achieve better attack performance compared to existing methods, demonstrating the potential of DFO methods in node classification adversarial attacks.

PEERJ COMPUTER SCIENCE (2021)

Article Computer Science, Hardware & Architecture

Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction

Bin Liang et al.

Summary: This paper proposes a simple method for detecting adversarial image examples by introducing two classic image processing techniques and using image entropy as a metric. The method can effectively detect adversarial examples in unmodified DNN models and achieved excellent performance in evaluation.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Review Computer Science, Information Systems

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Zixiao Kong et al.

Summary: This article discusses the importance and methods of adversarial attack security, helping researchers understand how to enter this field for research. It focuses on the classification and methods of adversarial attacks on images, texts, and malicious code.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey

Naveed Akhtar et al.

Summary: Deep learning is a widely used tool in computer vision, but is vulnerable to adversarial attacks. Since 2018, many research contributions have inspired new directions in this field, leading to more comprehensive understanding of adversarial attacks and defenses in deep learning.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Boosting the Transferability of Adversarial Samples via Attention

Weibin Wu et al.

2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2020)

Article Computer Science, Artificial Intelligence

Sample Based Fast Adversarial Attack Method

Zhi-Ming Wang et al.

NEURAL PROCESSING LETTERS (2019)

Article Computer Science, Artificial Intelligence

One Pixel Attack for Fooling Deep Neural Networks

Jiawei Su et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)

Proceedings Paper Computer Science, Artificial Intelligence

The LogBarrier adversarial attack: making effective use of decision boundary information

Chris Finlay et al.

2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) (2019)

Article Computer Science, Software Engineering

Graphics and Media Technologies for Operators in Industry 4.0

Jorge Posada et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2018)

Article Computer Science, Interdisciplinary Applications

bibliometrix: An R-tool for comprehensive science mapping analysis

Massimo Aria et al.

JOURNAL OF INFORMETRICS (2017)

Article Computer Science, Interdisciplinary Applications

Triple Helix indicators as an emergent area of enquiry: a bibliometric perspective

Martin Meyer et al.

SCIENTOMETRICS (2014)

Article Multidisciplinary Sciences

Connectomic reconstruction of the inner plexiform layer in the mouse retina

Moritz Helmstaedter et al.

NATURE (2013)

Review Biotechnology & Applied Microbiology

Emerging trends in regenerative medicine: a scientometric analysis in CiteSpace

Chaomei Chen et al.

EXPERT OPINION ON BIOLOGICAL THERAPY (2012)

Article Engineering, Electrical & Electronic

Deep Neural Networks for Acoustic Modeling in Speech Recognition

Geoffrey Hinton et al.

IEEE SIGNAL PROCESSING MAGAZINE (2012)

Article Computer Science, Information Systems

CiteSpace II: Detecting and visualizing emerging trends and transient patterns in scientific literature

CM Chen

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY (2006)