ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.08757
  4. Cited By
Adversarial Camouflage: Hiding Physical-World Attacks with Natural
  Styles
v1v2 (latest)

Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles

Computer Vision and Pattern Recognition (CVPR), 2020
8 March 2020
Ranjie Duan
Jiabo He
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles"

50 / 121 papers shown
Targeted Physical Evasion Attacks in the Near-Infrared Domain
Targeted Physical Evasion Attacks in the Near-Infrared Domain
Pascal Zimmer
Simon Lachnit
Alexander Jan Zielinski
Ghassan O. Karame
AAML
136
0
0
02 Sep 2025
3D Gaussian Splatting Driven Multi-View Robust Physical Adversarial Camouflage Generation
3D Gaussian Splatting Driven Multi-View Robust Physical Adversarial Camouflage Generation
Tianrui Lou
Xiaojun Jia
Yaning Tan
Jiawei Liang
Ming Zhang
Yanjun Xiao
Xiaochun Cao
3DGSAAML
279
1
0
02 Jul 2025
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Jinsheng Yuan
Yuhang Hao
Weisi Guo
Yun Wu
Chongyan Gu
AAMLFedML
161
0
0
09 May 2025
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Yuqiu Liu
Huanqian Yan
Xiaopei Zhu
Xiaolin Hu
L. Tang
Hang Su
Chen Lv
277
0
0
07 May 2025
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Adversarial Attacks in Multimodal Systems: A Practitioner's SurveyAnnual International Computer Software and Applications Conference (COMPSAC), 2025
Shashank Kapoor
Sanjay Surendranath Girija
Lakshit Arora
Dipen Pradhan
Ankit Shetgaonkar
Aman Raj
AAML
600
2
0
06 May 2025
Adversarial Examples in Environment Perception for Automated Driving (Review)
Adversarial Examples in Environment Perception for Automated Driving (Review)
Jun Yan
Huilin Yin
AAML
370
1
0
11 Apr 2025
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Samra Irshad
Seungkyu Lee
Nassir Navab
Hong Joo Lee
S. T. Kim
GANAAML
325
0
0
27 Mar 2025
A Survey of Adversarial Defenses in Vision-based Systems: Categorization, Methods and Challenges
A Survey of Adversarial Defenses in Vision-based Systems: Categorization, Methods and Challenges
Nandish Chattopadhyay
Abdul Basit
B. Ouni
Muhammad Shafique
AAML
286
1
0
01 Mar 2025
Texture- and Shape-based Adversarial Attacks for Overhead Image Vehicle Detection
Texture- and Shape-based Adversarial Attacks for Overhead Image Vehicle DetectionInternational Conference on Information Photonics (ICIP), 2024
Mikael Yeghiazaryan
Sai Abhishek Siddhartha Namburu
Emily Kim
Stanislav Panev
Celso de Melo
Brent Lance
Fernando de la Torre
AAML
457
0
0
20 Dec 2024
Physics-Based Adversarial Attack on Near-Infrared Human Detector for
  Nighttime Surveillance Camera Systems
Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera SystemsACM Multimedia (MM), 2023
Muyao Niu
Hao Sun
Yifan Zhan
H. Nguyen
Isao Echizen
Yinqiang Zheng
AAML
352
5
0
18 Dec 2024
Hijacking Vision-and-Language Navigation Agents with Adversarial
  Environmental Attacks
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental AttacksIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2024
Zijiao Yang
Xiangxi Shi
Eric Slyman
Stefan Lee
AAML
350
5
0
03 Dec 2024
CausAdv: A Causal-based Framework for Detecting Adversarial Examples
CausAdv: A Causal-based Framework for Detecting Adversarial Examples
Hichem Debbi
CMLAAML
366
1
0
29 Oct 2024
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object
  Detectors
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object DetectorsEuropean Conference on Computer Vision (ECCV), 2024
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
AAML
285
2
0
14 Oct 2024
Unsupervised Model Diagnosis
Unsupervised Model Diagnosis
Yinong Wang
Eileen Li
Jinqi Luo
Zhaoning Wang
Fernando de la Torre
AAML
365
4
0
08 Oct 2024
PADetBench: Towards Benchmarking Physical Attacks against Object Detection
PADetBench: Towards Benchmarking Physical Attacks against Object Detection
Jiawei Lian
Jianhong Pan
L. Wang
Yi Wang
Lap-Pui Chau
Shaohui Mei
AAML
425
3
0
17 Aug 2024
A Survey and Evaluation of Adversarial Attacks for Object Detection
A Survey and Evaluation of Adversarial Attacks for Object DetectionIEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2024
Khoi Nguyen Tiet Nguyen
Wenyu Zhang
Kangkang Lu
Yuhuan Wu
Xingjian Zheng
Hui Li Tan
Liangli Zhen
AAML
448
0
0
04 Aug 2024
Understanding Impacts of Electromagnetic Signal Injection Attacks on
  Object Detection
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Youqian Zhang
Chunxi Yang
Eugene Y. Fu
Qinhong Jiang
Chen Yan
Sze-Yiu Chau
Grace Ngai
Hong-va Leong
Xiapu Luo
Wei Dong
AAML
210
5
0
23 Jul 2024
CCSRP: Robust Pruning of Spiking Neural Networks through Cooperative
  Coevolution
CCSRP: Robust Pruning of Spiking Neural Networks through Cooperative Coevolution
J. Reif
Jiakang Li
Bowen Tian
Alexander Fay
AAML
223
0
0
18 Jul 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against
  Face Recognition Systems
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Yuxin Cao
Yumeng Zhu
Derui Wang
Sheng Wen
Minhui Xue
Jin Lu
Hao Ge
AAML
278
3
0
11 Jul 2024
Diffusion Policy Attacker: Crafting Adversarial Attacks for
  Diffusion-based Policies
Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies
Yipu Chen
Haotian Xue
Yongxin Chen
AAML
301
9
0
29 May 2024
Test-Time Backdoor Attacks on Multimodal Large Language Models
Test-Time Backdoor Attacks on Multimodal Large Language Models
Dong Lu
Tianyu Pang
Chao Du
Qian Liu
Xianjun Yang
Min Lin
AAML
492
43
0
13 Feb 2024
Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Spy-Watermark: Robust Invisible Watermarking for Backdoor AttackIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2024
Ruofei Wang
Renjie Wan
Zongyu Guo
Qing Guo
Rui Huang
431
11
0
04 Jan 2024
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object
  Detectors in the Physical World
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World
Zheng Zhou
Hong Zhao
Ju Liu
Qiaosheng Zhang
Liwei Geng
Shuchang Lyu
W. Feng
AAML
469
5
0
29 Dec 2023
Natural Adversarial Patch Generation Method Based on Latent Diffusion
  Model
Natural Adversarial Patch Generation Method Based on Latent Diffusion Model
Xianyi Chen
Fazhan Liu
Dong Jiang
Kai Yan
AAMLDiffM
282
3
0
27 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
319
1
0
12 Dec 2023
Generating Visually Realistic Adversarial Patch
Generating Visually Realistic Adversarial Patch
Xiaosen Wang
Kunyu Wang
AAML
222
1
0
05 Dec 2023
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute TriggerIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
460
7
0
03 Dec 2023
Adversarial Doodles: Interpretable and Human-drawable Attacks Provide
  Describable Insights
Adversarial Doodles: Interpretable and Human-drawable Attacks Provide Describable Insights
Ryoya Nara
Yusuke Matsui
AAML
350
0
0
27 Nov 2023
Physical Adversarial Examples for Multi-Camera Systems
Physical Adversarial Examples for Multi-Camera Systems
Ana Ruaductoiu
Jan-Philipp Schulze
Philip Sperl
Konstantin Böttinger
AAML
285
2
0
14 Nov 2023
Adversarial Examples in the Physical World: A Survey
Adversarial Examples in the Physical World: A Survey
Jinyang Guo
Xianglong Liu
Jin Hu
Donghua Wang
Siyang Wu
Tingsong Jiang
Wenbiao Yao
Aishan Liu
Aishan Liu
Jiantao Zhou
AAML
439
9
0
01 Nov 2023
AFLOW: Developing Adversarial Examples under Extremely Noise-limited
  Settings
AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings
Renyang Liu
Jinhong Zhang
Haoran Li
Jin Zhang
Yuanyu Wang
Wei Zhou
AAML
217
7
0
15 Oct 2023
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model
  Extraction Attack
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack
Renyang Liu
Jinhong Zhang
Kwok-Yan Lam
Jun Zhao
Wei Zhou
229
1
0
15 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial AttacksACM Computing Surveys (ACM Comput. Surv.), 2023
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
364
42
0
01 Oct 2023
Stealthy Physical Masked Face Recognition Attack via Adversarial Style
  Optimization
Stealthy Physical Masked Face Recognition Attack via Adversarial Style OptimizationIEEE transactions on multimedia (IEEE TMM), 2023
Huihui Gong
Minjing Dong
Siqi Ma
S. Çamtepe
Surya Nepal
Chang Xu
AAML
224
6
0
18 Sep 2023
Explainable and Trustworthy Traffic Sign Detection for Safe Autonomous
  Driving: An Inductive Logic Programming Approach
Explainable and Trustworthy Traffic Sign Detection for Safe Autonomous Driving: An Inductive Logic Programming ApproachInternational Conference on Logic Programming (ICLP), 2023
Zahra Chaghazardi
Saber Fallah
Alireza Tamaddoni-Nezhad
AAML
177
4
0
30 Aug 2023
Revisiting and Exploring Efficient Fast Adversarial Training via LAW:
  Lipschitz Regularization and Auto Weight Averaging
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight AveragingIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Yang Liu
YueFeng Chen
Xiaofeng Mao
Ranjie Duan
Jindong Gu
Rong Zhang
H. Xue
Xiaochun Cao
AAML
294
16
0
22 Aug 2023
Physical Adversarial Attacks For Camera-based Smart Systems: Current
  Trends, Categorization, Applications, Research Challenges, and Future Outlook
Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future OutlookIEEE Access (IEEE Access), 2023
Amira Guesmi
Muhammad Abdullah Hanif
B. Ouni
Muhammed Shafique
AAML
362
44
0
11 Aug 2023
Exploring the Physical World Adversarial Robustness of Vehicle Detection
Exploring the Physical World Adversarial Robustness of Vehicle Detection
Wei Jiang
Tianyuan Zhang
Shuang Liu
Weiyu Ji
Zichao Zhang
Gang Xiao
AAML
200
8
0
07 Aug 2023
Diffusion to Confusion: Naturalistic Adversarial Patch Generation Based
  on Diffusion Model for Object Detector
Diffusion to Confusion: Naturalistic Adversarial Patch Generation Based on Diffusion Model for Object DetectorInternational Conference on Information Photonics (ICIP), 2023
Shuohao Lin
Ernie Chu
Che-Hsien Lin
Jun-Cheng Chen
Jia-Ching Wang
DiffM
258
16
0
16 Jul 2023
Joint Salient Object Detection and Camouflaged Object Detection via
  Uncertainty-aware Learning
Joint Salient Object Detection and Camouflaged Object Detection via Uncertainty-aware Learning
Aixuan Li
Jing Zhang
Yun-Qiu Lv
Tong Zhang
Yiran Zhong
Mingyi He
Yuchao Dai
272
7
0
10 Jul 2023
Physically Realizable Natural-Looking Clothing Textures Evade Person
  Detectors via 3D Modeling
Physically Realizable Natural-Looking Clothing Textures Evade Person Detectors via 3D ModelingComputer Vision and Pattern Recognition (CVPR), 2023
Zhan Hu
Wen-Sheng Chu
Xiaopei Zhu
Hui Zhang
Bo Zhang
Xiaolin Hu
299
56
0
04 Jul 2023
Brightness-Restricted Adversarial Attack Patch
Brightness-Restricted Adversarial Attack Patch
Mingzhen Shao
AAML
244
1
0
01 Jul 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and BenchmarkingJournal of remote sensing (JRS), 2023
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
405
15
0
21 Jun 2023
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness
  and Controllability
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and ControllabilityNeural Information Processing Systems (NeurIPS), 2023
Haotian Xue
Alexandre Araujo
Bin Hu
Yongxin Chen
DiffM
575
85
0
25 May 2023
Towards Benchmarking and Assessing Visual Naturalness of Physical World
  Adversarial Attacks
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2023
Simin Li
Shuing Zhang
Gujun Chen
Dong Wang
Pu Feng
Jinyang Guo
Aishan Liu
Xin Yi
Xianglong Liu
AAML
221
28
0
22 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & DefensesIEEE Access (IEEE Access), 2023
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
426
127
0
18 May 2023
Fusion is Not Enough: Single Modal Attacks on Fusion Models for 3D
  Object Detection
Fusion is Not Enough: Single Modal Attacks on Fusion Models for 3D Object DetectionInternational Conference on Learning Representations (ICLR), 2023
Zhiyuan Cheng
Hongjun Choi
James Liang
Shiwei Feng
Guanhong Tao
Dongfang Liu
Michael Zuzak
Xiangyu Zhang
AAML
217
30
0
28 Apr 2023
StyLess: Boosting the Transferability of Adversarial Examples
StyLess: Boosting the Transferability of Adversarial ExamplesComputer Vision and Pattern Recognition (CVPR), 2023
Kaisheng Liang
Bin Xiao
AAML
255
27
0
23 Apr 2023
Adversarial Infrared Blocks: A Multi-view Black-box Attack to Thermal
  Infrared Detectors in Physical World
Adversarial Infrared Blocks: A Multi-view Black-box Attack to Thermal Infrared Detectors in Physical World
Chen-Hao Hu
Weiwen Shi
Tingsong Jiang
Wen Yao
Ling Tian
Xiaoqian Chen
AAML
622
14
0
21 Apr 2023
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
  Contemporary Survey
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Yulong Wang
Tong Sun
Shenghong Li
Xinnan Yuan
W. Ni
Ekram Hossain
H. Vincent Poor
AAML
344
33
0
11 Mar 2023
123
Next
Page 1 of 3