ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.06325
  4. Cited By
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
v1v2v3 (latest)

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2020
16 January 2020
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie Yang
Xiaolin Huang
    AAML
ArXiv (abs)PDFHTML

Papers citing "Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet"

45 / 45 papers shown
MMT-ARD: Multimodal Multi-Teacher Adversarial Distillation for Robust Vision-Language Models
MMT-ARD: Multimodal Multi-Teacher Adversarial Distillation for Robust Vision-Language Models
Yuqi Li
Junhao Dong
Chuanguang Yang
Shiping Wen
Piotr Koniusz
Tingwen Huang
Yingli Tian
Yew-Soon Ong
VLM
213
6
0
21 Nov 2025
Human-Imperceptible Physical Adversarial Attack for NIR Face Recognition Models
Human-Imperceptible Physical Adversarial Attack for NIR Face Recognition Models
Songyan Xie
Jinghang Wen
Encheng Su
Qiucheng Yu
AAMLPICV
299
0
0
22 Apr 2025
Enabling Heterogeneous Adversarial Transferability via Feature Permutation Attacks
Enabling Heterogeneous Adversarial Transferability via Feature Permutation AttacksPacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2025
Tao Wu
Tie Luo
AAML
396
0
0
26 Mar 2025
EasyRobust: A Comprehensive and Easy-to-use Toolkit for Robust and Generalized Vision
EasyRobust: A Comprehensive and Easy-to-use Toolkit for Robust and Generalized Vision
Xiaofeng Mao
YueFeng Chen
Rong Zhang
Hui Xue
Zhao Li
Hang Su
AAMLVLM
366
0
0
21 Mar 2025
Web Artifact Attacks Disrupt Vision Language Models
Web Artifact Attacks Disrupt Vision Language Models
Maan Qraitem
Piotr Teterwak
Kate Saenko
Bryan A. Plummer
AAML
359
3
0
17 Mar 2025
Adversarial Attacks on LiDAR-Based Tracking Across Road Users: Robustness Evaluation and Target-Aware Black-Box Method
Adversarial Attacks on LiDAR-Based Tracking Across Road Users: Robustness Evaluation and Target-Aware Black-Box Method
Shengjing Tian
Xiantong Zhao
Xiantong Zhao
Yinan Han
Xiuping Liu
AAML
443
0
0
28 Oct 2024
S$^4$ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
S4^44ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
842
0
0
13 Oct 2024
TA3: Testing Against Adversarial Attacks on Machine Learning Models
TA3: Testing Against Adversarial Attacks on Machine Learning Models
Yuanzhe Jin
Min Chen
210
2
0
06 Oct 2024
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Haoyang Liu
Aditya Singh
Yijiang Li
Haohan Wang
AAMLViT
463
1
0
15 Mar 2024
Hierarchical Invariance for Robust and Interpretable Vision Tasks at
  Larger Scales
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales
Shuren Qi
Yushu Zhang
Chao Wang
Zhihua Xia
Xiaochun Cao
Jian Weng
327
2
0
23 Feb 2024
Test-Time Backdoor Attacks on Multimodal Large Language Models
Test-Time Backdoor Attacks on Multimodal Large Language Models
Dong Lu
Tianyu Pang
Chao Du
Qian Liu
Xianjun Yang
Min Lin
AAML
492
43
0
13 Feb 2024
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
Meixi Zheng
Xuanchen Yan
Zihao Zhu
Hongrui Chen
Baoyuan Wu
ELMMLAUAAML
485
23
0
28 Dec 2023
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized
  Surrogate
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate
Tao Wu
Tie Luo
D. C. Wunsch
304
9
0
20 Dec 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and BenchmarkingJournal of remote sensing (JRS), 2023
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
407
15
0
21 Jun 2023
Robust Natural Language Understanding with Residual Attention Debiasing
Robust Natural Language Understanding with Residual Attention DebiasingAnnual Meeting of the Association for Computational Linguistics (ACL), 2023
Fei Wang
James Y. Huang
Tianyi Yan
Wenxuan Zhou
Muhao Chen
200
13
0
28 May 2023
Hamming Similarity and Graph Laplacians for Class Partitioning and
  Adversarial Image Detection
Hamming Similarity and Graph Laplacians for Class Partitioning and Adversarial Image Detection
Huma Jamil
Yajing Liu
T. Caglar
Christina Cole
Nathaniel Blanchard
Christopher Peterson
Michael Kirby
255
7
0
02 May 2023
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
  Contemporary Survey
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Yulong Wang
Tong Sun
Shenghong Li
Xinnan Yuan
W. Ni
Ekram Hossain
H. Vincent Poor
AAML
351
33
0
11 Mar 2023
Investigating Catastrophic Overfitting in Fast Adversarial Training: A
  Self-fitting Perspective
Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Zhengbao He
Tao Li
Sizhe Chen
Xiaolin Huang
AAML
280
5
0
23 Feb 2023
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Linkun Fan
Fazhi He
Qingchen Guo
Wei Tang
Xiaolin Hong
Bing Li
AAML3DPC
391
10
0
28 Nov 2022
Dual Graphs of Polyhedral Decompositions for the Detection of
  Adversarial Attacks
Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Huma Jamil
Yajing Liu
Christina Cole
Nathaniel Blanchard
E. King
Michael Kirby
C. Peterson
AAML
252
2
0
23 Nov 2022
Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Self-Ensemble Protection: Training Checkpoints Are Good Data ProtectorsInternational Conference on Learning Representations (ICLR), 2022
Sizhe Chen
Geng Yuan
Xinwen Cheng
Yifan Gong
Minghai Qin
Yanzhi Wang
Xiaolin Huang
AAML
281
24
0
22 Nov 2022
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
FG-UAP: Feature-Gathering Universal Adversarial PerturbationIEEE International Joint Conference on Neural Network (IJCNN), 2022
Zhixing Ye
Xinwen Cheng
Xiaolin Huang
AAML
298
16
0
27 Sep 2022
Enhance the Visual Representation via Discrete Adversarial Training
Enhance the Visual Representation via Discrete Adversarial TrainingNeural Information Processing Systems (NeurIPS), 2022
Xiaofeng Mao
YueFeng Chen
Ranjie Duan
Yao Zhu
Gege Qi
Shaokai Ye
Xiaodan Li
Rong Zhang
Hui Xue
323
43
0
16 Sep 2022
Unifying Gradients to Improve Real-world Robustness for Deep Networks
Unifying Gradients to Improve Real-world Robustness for Deep NetworksACM Transactions on Intelligent Systems and Technology (ACM TIST), 2022
Yingwen Wu
Sizhe Chen
Kun Fang
Xiaolin Huang
AAML
246
4
0
12 Aug 2022
Visual correspondence-based explanations improve AI robustness and
  human-AI team accuracy
Visual correspondence-based explanations improve AI robustness and human-AI team accuracyNeural Information Processing Systems (NeurIPS), 2022
Giang Nguyen
Mohammad Reza Taesiri
Anh Totti Nguyen
706
49
0
26 Jul 2022
Improving the Robustness and Generalization of Deep Neural Network with
  Confidence Threshold Reduction
Improving the Robustness and Generalization of Deep Neural Network with Confidence Threshold Reduction
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAMLOOD
311
1
0
02 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated GradientsInternational Conference on Learning Representations (ICLR), 2022
Yunpeng Huang
A. Kong
AAML
296
75
0
26 May 2022
One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
One-Pixel Shortcut: on the Learning Preference of Deep Neural NetworksInternational Conference on Learning Representations (ICLR), 2022
Shutong Wu
Sizhe Chen
Cihang Xie
Xiaolin Huang
AAML
298
40
0
24 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query AttacksNeural Information Processing Systems (NeurIPS), 2022
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
500
34
0
24 May 2022
Transferable Physical Attack against Object Detection with Separable
  Attention
Transferable Physical Attack against Object Detection with Separable Attention
Yu Zhang
Z. Gong
Yichuang Zhang
Yongqiang Li
Kangcheng Bin
Jiahao Qi
Wei Xue
Ping Zhong
AAML
266
8
0
19 May 2022
Adversarial Fine-tune with Dynamically Regulated Adversary
Adversarial Fine-tune with Dynamically Regulated AdversaryIEEE International Joint Conference on Neural Network (IJCNN), 2022
Peng-Fei Hou
Ming Zhou
Jie Han
Petr Musílek
Xingyu Li
AAML
177
4
0
28 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision SettingsIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
Jiliang Li
Ting Wang
AAML
252
23
0
07 Apr 2022
Universal Adversarial Examples in Remote Sensing: Methodology and
  Benchmark
Universal Adversarial Examples in Remote Sensing: Methodology and BenchmarkIEEE Transactions on Geoscience and Remote Sensing (IEEE TGRS), 2022
Yonghao Xu
Pedram Ghamisi
AAML
323
101
0
14 Feb 2022
Boosting 3D Adversarial Attacks with Attacking On Frequency
Boosting 3D Adversarial Attacks with Attacking On FrequencyIEEE Access (IEEE Access), 2022
Binbin Liu
Jinlai Zhang
Lyujie Chen
Jihong Zhu
3DPC
214
53
0
26 Jan 2022
Towards Understanding and Harnessing the Effect of Image Transformation
  in Adversarial Detection
Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection
Hui Liu
Bo Zhao
Yuefeng Peng
Weidong Li
Peng Liu
AAML
450
1
0
04 Jan 2022
Revisiting Knowledge Distillation: An Inheritance and Exploration
  Framework
Revisiting Knowledge Distillation: An Inheritance and Exploration FrameworkComputer Vision and Pattern Recognition (CVPR), 2021
Zhen Huang
Xu Shen
Jun Xing
Tongliang Liu
Xinmei Tian
Houqiang Li
Bing Deng
Jianqiang Huang
Xiansheng Hua
178
37
0
01 Jul 2021
Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Zhixing Ye
S. Qin
Sizhe Chen
Xiaolin Huang
AAML
178
4
0
31 May 2021
Query Attack by Multi-Identity Surrogates
Query Attack by Multi-Identity SurrogatesIEEE Transactions on Artificial Intelligence (IEEE TAI), 2021
Sizhe Chen
Zhehao Huang
Qinghua Tao
Xiaolin Huang
AAML
443
6
0
31 May 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Delving into Data: Effectively Substitute Training for Black-box AttackComputer Vision and Pattern Recognition (CVPR), 2021
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
262
71
0
26 Apr 2021
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Adversarial Sticker: A Stealthy Attack Method in the Physical WorldIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2021
Xingxing Wei
Yingjie Guo
Jie Yu
AAML
358
168
0
14 Apr 2021
Measuring the Transferability of $\ell_\infty$ Attacks by the $\ell_2$
  Norm
Measuring the Transferability of ℓ∞\ell_\inftyℓ∞​ Attacks by the ℓ2\ell_2ℓ2​ Norm
Sizhe Chen
Qinghua Tao
Zhixing Ye
Xiaolin Huang
484
0
0
20 Feb 2021
Robustness, Privacy, and Generalization of Adversarial Training
Robustness, Privacy, and Generalization of Adversarial Training
Fengxiang He
Shaopeng Fu
Bohan Wang
Dacheng Tao
328
13
0
25 Dec 2020
Towards Robust Neural Networks via Orthogonal Diversity
Towards Robust Neural Networks via Orthogonal DiversityPattern Recognition (Pattern Recognit.), 2020
Kun Fang
Qinghua Tao
Yingwen Wu
Tao Li
Jia Cai
Feipeng Cai
Xiaolin Huang
Jie Yang
AAML
331
14
0
23 Oct 2020
Relevance Attack on Detectors
Relevance Attack on Detectors
Sizhe Chen
Fan He
Xiaolin Huang
Kun Zhang
AAML
284
18
0
16 Aug 2020
AN-GCN: An Anonymous Graph Convolutional Network Defense Against
  Edge-Perturbing Attack
AN-GCN: An Anonymous Graph Convolutional Network Defense Against Edge-Perturbing Attack
Ao Liu
Beibei Li
Tao Li
Pan Zhou
Rui Wang
AAML
527
0
0
06 May 2020
1
Page 1 of 1