Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2210.02041
Cited By
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
5 October 2022
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks"
29 / 29 papers shown
Title
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
Jin Li
Ziqiang He
Anwei Luo
Jian-Fang Hu
Zhong Wang
Xiangui Kang
DiffM
61
0
0
12 Mar 2025
Enhancing Adversarial Transferability via Component-Wise Transformation
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
Donglin Wang
AAML
44
0
0
21 Jan 2025
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation
Fengfan Zhou
Bangjie Yin
Hefei Ling
Qianyu Zhou
Wenxuan Wang
AAML
60
0
0
23 Nov 2024
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
Zihao Pan
Weibin Wu
Yuhang Cao
Zibin Zheng
DiffM
AAML
55
1
0
03 Oct 2024
Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors
Fahad Shamshad
Muzammal Naseer
Karthik Nandakumar
AAML
PICV
29
1
0
20 Aug 2024
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack
Ziyi Gao
Kai-xiang Chen
Zhipeng Wei
Tingshu Mou
Jingjing Chen
Zhiyu Tan
Hao Li
Yu-Gang Jiang
VGen
AAML
21
2
0
10 Aug 2024
ADBM: Adversarial diffusion bridge model for reliable adversarial purification
Xiao-Li Li
Wenxuan Sun
Huanran Chen
Qiongxiu Li
Yining Liu
Yingzhe He
Jie Shi
Xiaolin Hu
AAML
48
7
0
01 Aug 2024
Transferable Adversarial Facial Images for Privacy Protection
Minghui Li
Jiangxiong Wang
Hao Zhang
Ziqi Zhou
Sheng-shou Hu
Xiaobing Pei
PICV
AAML
21
8
0
18 Jul 2024
Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection
Youheng Sun
Shengming Yuan
Xuanhan Wang
Lianli Gao
Jingkuan Song
AAML
12
2
0
17 Jul 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Yuxin Cao
Yumeng Zhu
Derui Wang
Sheng Wen
Minhui Xue
Jin Lu
Hao Ge
AAML
40
0
0
11 Jul 2024
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Fengfan Zhou
Qianyu Zhou
Xiangtai Li
Xuequan Lu
Lizhuang Ma
Hefei Ling
AAML
39
3
0
27 May 2024
Alleviating Hallucinations in Large Vision-Language Models through Hallucination-Induced Optimization
Beitao Chen
Xinyu Lyu
Lianli Gao
Jingkuan Song
Hengtao Shen
MLLM
54
10
0
24 May 2024
ASAM: Boosting Segment Anything Model with Adversarial Tuning
Bo Li
Haoke Xiao
Lv Tang
17
9
0
01 May 2024
Boosting the Transferability of Adversarial Examples via Local Mixup and Adaptive Step Size
Junlin Liu
Xinchen Lyu
AAML
4
3
0
24 Jan 2024
Rethinking Impersonation and Dodging Attacks on Face Recognition Systems
Fengfan Zhou
Qianyu Zhou
Bangjie Yin
Hui Zheng
Xuequan Lu
Lizhuang Ma
Heifei Ling
AAML
36
3
0
17 Jan 2024
Practical Deep Dispersed Watermarking with Synchronization and Fusion
Hengchang Guo
Qilong Zhang
Junwei Luo
Feng Guo
Wenbin Zhang
Xiaodong Su
Minglei Li
WIGM
14
10
0
23 Oct 2023
Structure Invariant Transformation for better Adversarial Transferability
Xiaosen Wang
Zeliang Zhang
Jianping Zhang
AAML
14
59
0
26 Sep 2023
Latent Code Augmentation Based on Stable Diffusion for Data-free Substitute Attacks
Mingwen Shao
Lingzhuang Meng
Yuanjian Qiao
Lixu Zhang
W. Zuo
DiffM
19
0
0
24 Jul 2023
CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent Search
Fahad Shamshad
Muzammal Naseer
Karthik Nandakumar
AAML
PICV
28
27
0
16 Jun 2023
Content-based Unrestricted Adversarial Attack
Zhaoyu Chen
Bo-wen Li
Shuang Wu
Kaixun Jiang
Shouhong Ding
Wenqiang Zhang
DiffM
24
61
0
18 May 2023
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen
H. Chen
Keyan Chen
Yilan Zhang
Zhengxia Zou
Z. Shi
DiffM
19
56
0
14 May 2023
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
30
0
0
19 May 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
17
21
0
09 Mar 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
62
64
0
27 Jan 2022
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
151
224
0
08 Mar 2020
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
H. Foroosh
AAML
50
264
0
30 Nov 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GAN
AAML
174
302
0
21 May 2018
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications
Andrew G. Howard
Menglong Zhu
Bo Chen
Dmitry Kalenichenko
Weijun Wang
Tobias Weyand
M. Andreetto
Hartwig Adam
3DH
948
20,471
0
17 Apr 2017
Densely Connected Convolutional Networks
Gao Huang
Zhuang Liu
L. V. D. van der Maaten
Kilian Q. Weinberger
PINN
3DV
247
36,237
0
25 Aug 2016
1