ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2002.05990
  4. Cited By
Skip Connections Matter: On the Transferability of Adversarial Examples
  Generated with ResNets

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

14 February 2020
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
    AAML
    SILM
ArXivPDFHTML

Papers citing "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"

48 / 48 papers shown
Title
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
36
0
0
08 May 2025
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
129
0
0
21 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedIm
AAML
51
0
0
04 Feb 2025
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
32
0
0
31 Dec 2024
Improving Transferable Targeted Attacks with Feature Tuning Mixup
Improving Transferable Targeted Attacks with Feature Tuning Mixup
K. Liang
Xuelong Dai
Yanjie Li
Dong Wang
Bin Xiao
AAML
134
0
0
23 Nov 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAML
SILM
51
6
0
26 Oct 2024
AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models
AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models
Boming Miao
Chunxiao Li
Yao Zhu
Weixiang Sun
Zizhe Wang
Xiaoyi Wang
Chuanlong Xie
DiffM
AAML
32
1
0
11 Sep 2024
T1-contrast Enhanced MRI Generation from Multi-parametric MRI for Glioma
  Patients with Latent Tumor Conditioning
T1-contrast Enhanced MRI Generation from Multi-parametric MRI for Glioma Patients with Latent Tumor Conditioning
Zach Eidex
Mojtaba Safari
Richard L. J. Qiu
D. Yu
Hui-Kuo Shu
H. Mao
Xiaofeng Yang
MedIm
45
1
0
03 Sep 2024
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial
  Contrastive Prompt Tuning
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning
Xin Wang
Kai-xiang Chen
Xingjun Ma
Zhineng Chen
Jingjing Chen
Yu-Gang Jiang
AAML
34
3
0
04 Aug 2024
CNN-based Compressor Mass Flow Estimator in Industrial Aircraft Vapor
  Cycle System
CNN-based Compressor Mass Flow Estimator in Industrial Aircraft Vapor Cycle System
Justin Reverdi
Sixin Zhang
Said Aoues
Fabrice Gamboa
Serge Gratton
Thomas Pellegrini
34
0
0
27 May 2024
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise
  Regression Tasks
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks
Zhiyuan Cheng
Zhaoyi Liu
Tengda Guo
Shiwei Feng
Dongfang Liu
Mingjie Tang
Xiangyu Zhang
AAML
27
3
0
01 Apr 2024
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
55
3
0
20 Nov 2023
Backpropagation Path Search On Adversarial Transferability
Backpropagation Path Search On Adversarial Transferability
Zhuoer Xu
Zhangxuan Gu
Jianping Zhang
Shiwen Cui
Changhua Meng
Weiqiang Wang
AAML
30
5
0
15 Aug 2023
Why Does Little Robustness Help? Understanding and Improving Adversarial
  Transferability from Surrogate Training
Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate Training
Yechao Zhang
Shengshan Hu
Leo Yu Zhang
Junyu Shi
Minghui Li
Xiaogeng Liu
Wei Wan
Hai Jin
AAML
22
20
0
15 Jul 2023
Random Position Adversarial Patch for Vision Transformers
Random Position Adversarial Patch for Vision Transformers
Mingzhen Shao
ViT
AAML
16
2
0
09 Jul 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
37
18
0
20 Apr 2023
Global Prompt Cell: A Portable Control Module for Effective Prompt
  Tuning
Global Prompt Cell: A Portable Control Module for Effective Prompt Tuning
Chi-Liang Liu
Hao Wang
Nuwa Xi
Sendong Zhao
Bing Qin
VLM
13
1
0
12 Apr 2023
Transferable Adversarial Attacks on Vision Transformers with Token
  Gradient Regularization
Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization
Jianping Zhang
Yizhan Huang
Weibin Wu
Michael R. Lyu
AAML
ViT
18
48
0
28 Mar 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Explainability and Robustness of Deep Visual Classification Models
Explainability and Robustness of Deep Visual Classification Models
Jindong Gu
AAML
29
2
0
03 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
21
27
0
01 Jan 2023
Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted
  Attacks
Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks
Anqi Zhao
Tong Chu
Yahao Liu
Wen Li
Jingjing Li
Lixin Duan
AAML
13
16
0
18 Dec 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
14
20
0
17 Nov 2022
LGV: Boosting Adversarial Example Transferability from Large Geometric
  Vicinity
LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity
Martin Gubri
Maxime Cordy
Mike Papadakis
Yves Le Traon
Koushik Sen
AAML
22
51
0
26 Jul 2022
Jigsaw-ViT: Learning Jigsaw Puzzles in Vision Transformer
Jigsaw-ViT: Learning Jigsaw Puzzles in Vision Transformer
Yingyi Chen
Xiaoke Shen
Yahui Liu
Qinghua Tao
Johan A. K. Suykens
AAML
ViT
21
22
0
25 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
14
154
0
12 Jul 2022
Residual-Concatenate Neural Network with Deep Regularization Layers for
  Binary Classification
Residual-Concatenate Neural Network with Deep Regularization Layers for Binary Classification
Abhishek Gupta
Sruthi Nair
Raunak Joshi
V. Chitre
21
5
0
25 May 2022
UNet#: A UNet-like Redesigning Skip Connections for Medical Image
  Segmentation
UNet#: A UNet-like Redesigning Skip Connections for Medical Image Segmentation
Ledan Qian
Xiao Zhou
Yi Li
Zhongyi Hu
29
5
0
24 May 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
21
42
0
30 Mar 2022
Enhancing Adversarial Training with Second-Order Statistics of Weights
Enhancing Adversarial Training with Second-Order Statistics of Weights
Gao Jin
Xinping Yi
Wei Huang
S. Schewe
Xiaowei Huang
AAML
12
46
0
11 Mar 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
25
21
0
09 Mar 2022
On the Convergence and Robustness of Adversarial Training
On the Convergence and Robustness of Adversarial Training
Yisen Wang
Xingjun Ma
James Bailey
Jinfeng Yi
Bowen Zhou
Quanquan Gu
AAML
192
345
0
15 Dec 2021
Cross-Modal Transferable Adversarial Attacks from Images to Videos
Cross-Modal Transferable Adversarial Attacks from Images to Videos
Zhipeng Wei
Jingjing Chen
Zuxuan Wu
Yu-Gang Jiang
AAML
16
38
0
10 Dec 2021
Adaptive Perturbation for Adversarial Attack
Adaptive Perturbation for Adversarial Attack
Zheng Yuan
Jie M. Zhang
Zhaoyan Jiang
Liangliang Li
Shiguang Shan
AAML
19
3
0
27 Nov 2021
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to
  CNNs
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
29
78
0
06 Oct 2021
Training Meta-Surrogate Model for Transferable Adversarial Attack
Training Meta-Surrogate Model for Transferable Adversarial Attack
Yunxiao Qin
Yuanhao Xiong
Jinfeng Yi
Cho-Jui Hsieh
AAML
12
18
0
05 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Boosting Transferability of Targeted Adversarial Examples via
  Hierarchical Generative Networks
Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks
Xiao Yang
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
AAML
31
38
0
05 Jul 2021
Analysis and Applications of Class-wise Robustness in Adversarial
  Training
Analysis and Applications of Class-wise Robustness in Adversarial Training
Qi Tian
Kun Kuang
Ke Jiang
Fei Wu
Yisen Wang
AAML
16
46
0
29 May 2021
A Unified Game-Theoretic Interpretation of Adversarial Robustness
A Unified Game-Theoretic Interpretation of Adversarial Robustness
Jie Ren
Die Zhang
Yisen Wang
Lu Chen
Zhanpeng Zhou
...
Xu Cheng
Xin Eric Wang
Meng Zhou
Jie Shi
Quanshi Zhang
AAML
64
22
0
12 Mar 2021
Unlearnable Examples: Making Personal Data Unexploitable
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
136
190
0
13 Jan 2021
On Success and Simplicity: A Second Look at Transferable Targeted
  Attacks
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
24
121
0
21 Dec 2020
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural
  Backdoors
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors
Ren Pang
Zheng-Wei Zhang
Xiangshan Gao
Zhaohan Xi
S. Ji
Peng Cheng
Xiapu Luo
Ting Wang
AAML
27
31
0
16 Dec 2020
A Unified Approach to Interpreting and Boosting Adversarial
  Transferability
A Unified Approach to Interpreting and Boosting Adversarial Transferability
Xin Eric Wang
Jie Ren
Shuyu Lin
Xiangming Zhu
Yisen Wang
Quanshi Zhang
AAML
18
94
0
08 Oct 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Xingjun Ma
James Bailey
Feng Lu
AAML
11
501
0
05 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
33
51
0
01 Jul 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie-jin Yang
Xiaolin Huang
AAML
21
103
0
16 Jan 2020
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
252
5,833
0
08 Jul 2016
1