ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.11616
  4. Cited By
Enhancing Cross-task Black-Box Transferability of Adversarial Examples
  with Dispersion Reduction

Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction

22 November 2019
Yantao Lu
Yunhan Jia
Jianyu Wang
Bai Li
Weiheng Chai
Lawrence Carin
Senem Velipasalar
    AAML
ArXiv (abs)PDFHTML

Papers citing "Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction"

46 / 46 papers shown
Title
Adversarial Attacks on VQA-NLE: Exposing and Alleviating Inconsistencies in Visual Question Answering Explanations
Adversarial Attacks on VQA-NLE: Exposing and Alleviating Inconsistencies in Visual Question Answering Explanations
Yahsin Yeh
Yilun Wu
Bokai Ruan
Honghan Shuai
AAML
32
0
0
17 Aug 2025
Fading the Digital Ink: A Universal Black-Box Attack Framework for 3DGS Watermarking Systems
Fading the Digital Ink: A Universal Black-Box Attack Framework for 3DGS Watermarking Systems
Qingyuan Zeng
Shu Jiang
Jiajing Lin
Zhenzhong Wang
Kay Chen Tan
Min Jiang
AAML
30
0
0
10 Aug 2025
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Yixiao Chen
Shikun Sun
Jianshu Li
Ruoyu Li
Zhe Li
Junliang Xing
AAML
397
0
0
04 Feb 2025
Cross-Modal Transferable Image-to-Video Attack on Video Quality Metrics
Cross-Modal Transferable Image-to-Video Attack on Video Quality Metrics
Georgii Gotin
E. Shumitskaya
Anastasia Antsiferova
D. Vatolin
AAML
165
0
0
14 Jan 2025
AIM: Additional Image Guided Generation of Transferable Adversarial Attacks
Teng Li
Jiabo He
Yu-Gang Jiang
AAMLDiffM
244
0
0
03 Jan 2025
Downstream Transfer Attack: Adversarial Attacks on Downstream Models
  with Pre-trained Vision Transformers
Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Weijie Zheng
Jiabo He
Hanxun Huang
Zuxuan Wu
Yu-Gang Jiang
AAML
143
0
0
03 Aug 2024
FACL-Attack: Frequency-Aware Contrastive Learning for Transferable
  Adversarial Attacks
FACL-Attack: Frequency-Aware Contrastive Learning for Transferable Adversarial Attacks
Hunmin Yang
Jongoh Jeong
Kuk-Jin Yoon
AAML
202
8
0
30 Jul 2024
Prompt-Driven Contrastive Learning for Transferable Adversarial Attacks
Prompt-Driven Contrastive Learning for Transferable Adversarial Attacks
Hunmin Yang
Jongoh Jeong
Kuk-Jin Yoon
AAMLVLM
251
8
0
30 Jul 2024
Cross-Task Attack: A Self-Supervision Generative Framework Based on
  Attention Shift
Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift
Qingyuan Zeng
Yunpeng Gong
Min Jiang
AAML
118
7
0
18 Jul 2024
CLIP-Guided Networks for Transferable Targeted Attacks
CLIP-Guided Networks for Transferable Targeted Attacks
Hao Fang
Jiawei Kong
Bin Chen
Tao Dai
Hao Wu
Shu-Tao Xia
AAML
238
10
0
14 Jul 2024
Enhancing Cross-Prompt Transferability in Vision-Language Models through
  Contextual Injection of Target Tokens
Enhancing Cross-Prompt Transferability in Vision-Language Models through Contextual Injection of Target Tokens
Xikang Yang
Xuehai Tang
Fuqing Zhu
Jizhong Han
Songlin Hu
VLMAAML
117
3
0
19 Jun 2024
Adversarial Attacks on Hidden Tasks in Multi-Task Learning
Adversarial Attacks on Hidden Tasks in Multi-Task Learning
Yu Zhe
Rei Nagaike
Daiki Nishiyama
Kazuto Fukuchi
Jun Sakuma
AAML
130
1
0
24 May 2024
As Firm As Their Foundations: Can open-sourced foundation models be used
  to create adversarial examples for downstream tasks?
As Firm As Their Foundations: Can open-sourced foundation models be used to create adversarial examples for downstream tasks?
Anjun Hu
Jindong Gu
Francesco Pinto
Konstantinos Kamnitsas
Juil Sock
AAMLSILM
126
7
0
19 Mar 2024
An Image Is Worth 1000 Lies: Adversarial Transferability across Prompts
  on Vision-Language Models
An Image Is Worth 1000 Lies: Adversarial Transferability across Prompts on Vision-Language Models
Haochen Luo
Jindong Gu
Fengyuan Liu
Juil Sock
VLMVPVLMAAML
134
28
0
14 Mar 2024
VQAttack: Transferable Adversarial Attacks on Visual Question Answering
  via Pre-trained Models
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models
Ziyi Yin
Muchao Ye
Tianrong Zhang
Yuan Liu
Han Liu
Jinghui Chen
Ting Wang
Fenglong Ma
OODAAML
88
3
0
16 Feb 2024
Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and
  Defensive Strategies
Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies
Feng Wang
M. C. Gursoy
Senem Velipasalar
AAML
66
1
0
19 Nov 2023
A Survey on Transferability of Adversarial Examples across Deep Neural
  Networks
A Survey on Transferability of Adversarial Examples across Deep Neural Networks
Jindong Gu
Yang Liu
Pau de Jorge
Wenqain Yu
Xinwei Liu
...
Anjun Hu
Ashkan Khakzar
Zhijiang Li
Simeng Qin
Juil Sock
AAML
197
40
0
26 Oct 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David Evans
AAML
179
7
0
26 Oct 2023
VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via
  Pre-trained Models
VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models
Ziyi Yin
Muchao Ye
Tianrong Zhang
Tianyu Du
Jinguo Zhu
Han Liu
Jinghui Chen
Ting Wang
Fenglong Ma
AAMLVLMCoGe
153
54
0
07 Oct 2023
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen
Hechang Chen
Keyan Chen
Yilan Zhang
Zhengxia Zou
Z. Shi
DiffM
170
93
0
14 May 2023
Boosting Cross-task Transferability of Adversarial Patches with Visual
  Relations
Boosting Cross-task Transferability of Adversarial Patches with Visual Relations
Tony Ma
Songze Li
Yisong Xiao
Shunchang Liu
80
2
0
11 Apr 2023
Adversarial Attack and Defense for Medical Image Analysis: Methods and
  Applications
Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Junhao Dong
Junxi Chen
Xiaohua Xie
Jianhuang Lai
Hechang Chen
AAMLMedIm
166
25
0
24 Mar 2023
General Adversarial Defense Against Black-box Attacks via Pixel Level
  and Feature Level Distribution Alignments
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Juil Sock
Jiaya Jia
AAML
79
3
0
11 Dec 2022
Pre-trained Adversarial Perturbations
Pre-trained Adversarial Perturbations
Y. Ban
Yinpeng Dong
AAML
150
26
0
07 Oct 2022
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of
  Texture
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture
Hui Xia
Rui Zhang
Shuliang Jiang
Zizi Kang
AAML
73
0
0
22 Jun 2022
SSMI: How to Make Objects of Interest Disappear without Accessing Object
  Detectors?
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?
Hui Xia
Rui Zhang
Zizi Kang
Shuliang Jiang
AAML
65
0
0
22 Jun 2022
Adversarially robust segmentation models learn perceptually-aligned
  gradients
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
84
0
0
03 Apr 2022
Improving the Transferability of Targeted Adversarial Examples through
  Object-Based Diverse Input
Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input
Junyoung Byun
Seungju Cho
Myung-Joon Kwon
Heeseon Kim
Changick Kim
AAMLDiffM
89
76
0
17 Mar 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
225
21
0
09 Mar 2022
Adversarial samples for deep monocular 6D object pose estimation
Adversarial samples for deep monocular 6D object pose estimation
Jinlai Zhang
Weiming Li
Shuang Liang
Hongya Wang
Jihong Zhu
AAML
131
3
0
01 Mar 2022
Adversarial Attacks on Speech Recognition Systems for Mission-Critical
  Applications: A Survey
Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey
Ngoc Dung Huynh
Mohamed Reda Bouadjenek
Imran Razzak
Kevin Lee
Chetan Arora
Ali Hassani
A. Zaslavsky
AAML
109
7
0
22 Feb 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for
  Black-box Domains
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
223
72
0
27 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Yaning Tan
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
168
86
0
22 Jan 2022
Detect & Reject for Transferability of Black-box Adversarial Attacks
  Against Network Intrusion Detection Systems
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems
Islam Debicha
Thibault Debatty
Jean-Michel Dricot
Wim Mees
Tayeb Kenaza
AAML
44
9
0
22 Dec 2021
Cross-Modal Transferable Adversarial Attacks from Images to Videos
Cross-Modal Transferable Adversarial Attacks from Images to Videos
Zhipeng Wei
Jingjing Chen
Zuxuan Wu
Yu-Gang Jiang
AAML
132
44
0
10 Dec 2021
Fast Gradient Non-sign Methods
Fast Gradient Non-sign Methods
Yaya Cheng
Jingkuan Song
Xiaosu Zhu
Qilong Zhang
Lianli Gao
Heng Tao Shen
AAML
182
12
0
25 Oct 2021
Adversarial Attack across Datasets
Adversarial Attack across Datasets
Yunxiao Qin
Yuanhao Xiong
Jinfeng Yi
Lihong Cao
Cho-Jui Hsieh
AAML
131
3
0
13 Oct 2021
Exploring Transferable and Robust Adversarial Perturbation Generation
  from the Perspective of Network Hierarchy
Exploring Transferable and Robust Adversarial Perturbation Generation from the Perspective of Network Hierarchy
Ruikui Wang
Yuanfang Guo
Ruijie Yang
Yunhong Wang
AAML
95
3
0
16 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
283
260
0
01 Aug 2021
Feature Importance-aware Transferable Adversarial Attacks
Feature Importance-aware Transferable Adversarial Attacks
Peng Kuang
Hengchang Guo
Zhifei Zhang
Wenxin Liu
Zhan Qin
K. Ren
AAML
167
233
0
29 Jul 2021
Can Targeted Adversarial Examples Transfer When the Source and Target
  Models Have No Label Space Overlap?
Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Nathan Inkawhich
Kevin J. Liang
Jingyang Zhang
Huanrui Yang
Xue Yang
Yiran Chen
AAML
70
5
0
17 Mar 2021
Black-box Adversarial Attacks in Autonomous Vehicle Technology
Black-box Adversarial Attacks in Autonomous Vehicle TechnologyInternational Conference on Artificial Intelligence and Pattern Recognition (AIPR), 2023
K. N. Kumar
Vishnu Chalavadi
Reshmi Mitra
C.Krishna Mohan
AAML
94
72
0
15 Jan 2021
Adversarial collision attacks on image hashing functions
Adversarial collision attacks on image hashing functions
Brian Dolhansky
Cristian Canton Ferrer
AAML
148
21
0
18 Nov 2020
Perturbing Across the Feature Hierarchy to Improve Standard and Strict
  Blackbox Attack Transferability
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack TransferabilityNeural Information Processing Systems (NeurIPS), 2025
Nathan Inkawhich
Kevin J. Liang
Binghui Wang
Matthew J. Inkawhich
Lawrence Carin
Yiran Chen
AAML
122
96
0
29 Apr 2020
Mission-Aware Spatio-Temporal Deep Learning Model for UAS Instantaneous
  Density Prediction
Mission-Aware Spatio-Temporal Deep Learning Model for UAS Instantaneous Density Prediction
Ziyi Zhao
Zhao Jin
Wentian Bai
Wentan Bai
Carlos Caicedo
M. C. Gursoy
Qinru Qiu
66
0
0
22 Mar 2020
Weighted Average Precision: Adversarial Example Detection in the Visual
  Perception of Autonomous Vehicles
Weighted Average Precision: Adversarial Example Detection in the Visual Perception of Autonomous Vehicles
Yilan Li
Senem Velipasalar
AAML
93
8
0
25 Jan 2020
1