ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1908.09163
  4. Cited By
Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve
  the Tower

Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower

IEEE International Conference on Computer Vision (ICCV), 2019
24 August 2019
Giorgos Tolias
Filip Radenovic
Ondřej Chum
    AAML
ArXiv (abs)PDFHTML

Papers citing "Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower"

28 / 28 papers shown
Task-Agnostic Attacks Against Vision Foundation Models
Brian Pulfer
Yury Belousov
Vitaliy Kinakh
Teddy Furon
S. Voloshynovskiy
AAML
237
0
0
05 Mar 2025
Learning to Learn Transferable Generative Attack for Person Re-Identification
Learning to Learn Transferable Generative Attack for Person Re-IdentificationIEEE Transactions on Image Processing (TIP), 2024
Yuan Bian
Min Liu
Xueping Wang
Yunfeng Ma
Yaonan Wang
AAMLOOD
487
1
0
06 Sep 2024
Collapse-Aware Triplet Decoupling for Adversarially Robust Image
  Retrieval
Collapse-Aware Triplet Decoupling for Adversarially Robust Image RetrievalInternational Conference on Machine Learning (ICML), 2023
Qiwei Tian
Chenhao Lin
Subrat Kishore Dutta
Qian Li
Chao Shen
301
3
0
12 Dec 2023
Poisoning Retrieval Corpora by Injecting Adversarial Passages
Poisoning Retrieval Corpora by Injecting Adversarial PassagesConference on Empirical Methods in Natural Language Processing (EMNLP), 2023
Zexuan Zhong
Ziqing Huang
Alexander Wettig
Danqi Chen
AAML
301
115
0
29 Oct 2023
A Survey on Transferability of Adversarial Examples across Deep Neural
  Networks
A Survey on Transferability of Adversarial Examples across Deep Neural Networks
Jindong Gu
Yang Liu
Pau de Jorge
Wenqain Yu
Xinwei Liu
...
Anjun Hu
Ashkan Khakzar
Zhijiang Li
Simeng Qin
Juil Sock
AAML
422
51
0
26 Oct 2023
OMG-ATTACK: Self-Supervised On-Manifold Generation of Transferable
  Evasion Attacks
OMG-ATTACK: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
Ofir Bar Tal
Adi Haviv
Amit H. Bermano
AAML
176
0
0
05 Oct 2023
Robust Ranking Explanations
Robust Ranking Explanations
Chao Chen
Chenghua Guo
Guixiang Ma
Ming Zeng
Xi Zhang
Sihong Xie
FAttAAML
369
0
0
08 Jul 2023
Blockchain-aided Secure Semantic Communication for AI-Generated Content
  in Metaverse
Blockchain-aided Secure Semantic Communication for AI-Generated Content in MetaverseIEEE Open Journal of the Computer Society (JOCS), 2023
Yi-Lan Lin
Hongyang Du
Dusit Niyato
Jiangtian Nie
Jiayi Zhang
Yanyu Cheng
Zhaohui Yang
149
88
0
25 Jan 2023
Advancing Deep Metric Learning Through Multiple Batch Norms And
  Multi-Targeted Adversarial Examples
Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Inderjeet Singh
Kazuya Kakizaki
Toshinori Araki
AAMLOOD
201
0
0
29 Nov 2022
MORA: Improving Ensemble Robustness Evaluation with Model-Reweighing
  Attack
MORA: Improving Ensemble Robustness Evaluation with Model-Reweighing AttackNeural Information Processing Systems (NeurIPS), 2022
Yunrui Yu
Xitong Gao
Chengzhong Xu
AAML
161
11
0
15 Nov 2022
Active Image Indexing
Active Image IndexingInternational Conference on Learning Representations (ICLR), 2022
Pierre Fernandez
Matthijs Douze
Edouard Grave
Teddy Furon
VLM
199
11
0
05 Oct 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Enhancing Adversarial Robustness for Deep Metric LearningComputer Vision and Pattern Recognition (CVPR), 2022
Mo Zhou
Vishal M. Patel
AAML
213
19
0
02 Mar 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
185
4
0
25 Feb 2022
Person Re-identification Method Based on Color Attack and Joint Defence
Person Re-identification Method Based on Color Attack and Joint Defence
Yunpeng Gong
Liqing Huang
Lifei Chen
AAML
317
75
0
18 Nov 2021
Multi-Expert Adversarial Attack Detection in Person Re-identification
  Using Context Inconsistency
Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context InconsistencyIEEE International Conference on Computer Vision (ICCV), 2021
Xueping Wang
Shasha Li
Min Liu
Yaonan Wang
Amit K. Roy-Chowdhury
AAML
244
34
0
23 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
489
298
0
01 Aug 2021
Discriminator-Free Generative Adversarial Attack
Discriminator-Free Generative Adversarial AttackACM Multimedia (ACM MM), 2021
Shaohao Lu
Yuqiao Xian
Ke Yan
Yi Hu
Xing Sun
Xiaowei Guo
Feiyue Huang
Weishi Zheng
AAMLGAN
180
23
0
20 Jul 2021
The 2021 Image Similarity Dataset and Challenge
The 2021 Image Similarity Dataset and Challenge
Matthijs Douze
Giorgos Tolias
Ed Pizzi
Zoe Papakipos
L. Chanussot
...
Maxim Maximov
Laura Leal-Taixé
Ismail Elezi
Ondřej Chum
Cristian Canton Ferrer
248
70
0
17 Jun 2021
Adversarial Attack and Defense in Deep Ranking
Adversarial Attack and Defense in Deep RankingIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2021
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
N. Zheng
G. Hua
OOD
231
19
0
07 Jun 2021
Prototype-supervised Adversarial Network for Targeted Attack of Deep
  Hashing
Prototype-supervised Adversarial Network for Targeted Attack of Deep HashingComputer Vision and Pattern Recognition (CVPR), 2021
Xunguang Wang
Zheng Zhang
Baoyuan Wu
Fumin Shen
Guangming Lu
AAMLGAN
253
53
0
17 May 2021
Practical Relative Order Attack in Deep Ranking
Practical Relative Order Attack in Deep RankingIEEE International Conference on Computer Vision (ICCV), 2021
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
Yinghui Xu
N. Zheng
G. Hua
372
19
0
09 Mar 2021
Deep Learning for Instance Retrieval: A Survey
Deep Learning for Instance Retrieval: A SurveyIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2021
Wei Chen
Yu Liu
Weiping Wang
E. Bakker
Theodoros Georgiou
Paul Fieguth
Tianpeng Liu
M. Lew
VLM
434
202
0
27 Jan 2021
Shaping Deep Feature Space towards Gaussian Mixture for Visual
  Classification
Shaping Deep Feature Space towards Gaussian Mixture for Visual ClassificationIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2020
Weitao Wan
Jiansheng Chen
Cheng Yu
Tong Wu
Yuanyi Zhong
Ming-Hsuan Yang
142
10
0
18 Nov 2020
Adversarial Image Color Transformations in Explicit Color Filter Space
Adversarial Image Color Transformations in Explicit Color Filter SpaceIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2020
Subrat Kishore Dutta
Zhuoran Liu
Martha Larson
AAML
357
15
0
12 Nov 2020
RobustBench: a standardized adversarial robustness benchmark
RobustBench: a standardized adversarial robustness benchmark
Francesco Croce
Maksym Andriushchenko
Vikash Sehwag
Edoardo Debenedetti
Nicolas Flammarion
M. Chiang
Prateek Mittal
Matthias Hein
VLM
757
823
0
19 Oct 2020
An alternative proof of the vulnerability of retrieval in high intrinsic
  dimensionality neighborhood
An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood
Teddy Furon
AAML
511
0
0
02 Oct 2020
Targeted Attack for Deep Hashing based Retrieval
Targeted Attack for Deep Hashing based RetrievalEuropean Conference on Computer Vision (ECCV), 2020
Jiawang Bai
Bin Chen
Yiming Li
Dongxian Wu
Weiwei Guo
Shutao Xia
En-Hui Yang
AAML
271
94
0
15 Apr 2020
Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Walking on the Edge: Fast, Low-Distortion Adversarial ExamplesIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2019
Hanwei Zhang
Yannis Avrithis
Teddy Furon
Laurent Amsaleg
AAML
235
55
0
04 Dec 2019
1
Page 1 of 1