ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2210.02041
  4. Cited By
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks

Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks

5 October 2022
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
    AAML
ArXivPDFHTML

Papers citing "Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks"

29 / 29 papers shown
Title
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
Jin Li
Ziqiang He
Anwei Luo
Jian-Fang Hu
Zhong Wang
Xiangui Kang
DiffM
61
0
0
12 Mar 2025
Enhancing Adversarial Transferability via Component-Wise Transformation
Enhancing Adversarial Transferability via Component-Wise Transformation
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
Donglin Wang
AAML
44
0
0
21 Jan 2025
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation
Fengfan Zhou
Bangjie Yin
Hefei Ling
Qianyu Zhou
Wenxuan Wang
AAML
60
0
0
23 Nov 2024
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
Zihao Pan
Weibin Wu
Yuhang Cao
Zibin Zheng
DiffM
AAML
55
1
0
03 Oct 2024
Makeup-Guided Facial Privacy Protection via Untrained Neural Network
  Priors
Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors
Fahad Shamshad
Muzammal Naseer
Karthik Nandakumar
AAML
PICV
29
1
0
20 Aug 2024
ReToMe-VA: Recursive Token Merging for Video Diffusion-based
  Unrestricted Adversarial Attack
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack
Ziyi Gao
Kai-xiang Chen
Zhipeng Wei
Tingshu Mou
Jingjing Chen
Zhiyu Tan
Hao Li
Yu-Gang Jiang
VGen
AAML
21
2
0
10 Aug 2024
ADBM: Adversarial diffusion bridge model for reliable adversarial purification
ADBM: Adversarial diffusion bridge model for reliable adversarial purification
Xiao-Li Li
Wenxuan Sun
Huanran Chen
Qiongxiu Li
Yining Liu
Yingzhe He
Jie Shi
Xiaolin Hu
AAML
48
7
0
01 Aug 2024
Transferable Adversarial Facial Images for Privacy Protection
Transferable Adversarial Facial Images for Privacy Protection
Minghui Li
Jiangxiong Wang
Hao Zhang
Ziqi Zhou
Sheng-shou Hu
Xiaobing Pei
PICV
AAML
21
8
0
18 Jul 2024
Any Target Can be Offense: Adversarial Example Generation via
  Generalized Latent Infection
Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection
Youheng Sun
Shengming Yuan
Xuanhan Wang
Lianli Gao
Jingkuan Song
AAML
12
2
0
17 Jul 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against
  Face Recognition Systems
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Yuxin Cao
Yumeng Zhu
Derui Wang
Sheng Wen
Minhui Xue
Jin Lu
Hao Ge
AAML
40
0
0
11 Jul 2024
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing
  Models
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Fengfan Zhou
Qianyu Zhou
Xiangtai Li
Xuequan Lu
Lizhuang Ma
Hefei Ling
AAML
39
3
0
27 May 2024
Alleviating Hallucinations in Large Vision-Language Models through Hallucination-Induced Optimization
Alleviating Hallucinations in Large Vision-Language Models through Hallucination-Induced Optimization
Beitao Chen
Xinyu Lyu
Lianli Gao
Jingkuan Song
Hengtao Shen
MLLM
54
10
0
24 May 2024
ASAM: Boosting Segment Anything Model with Adversarial Tuning
ASAM: Boosting Segment Anything Model with Adversarial Tuning
Bo Li
Haoke Xiao
Lv Tang
17
9
0
01 May 2024
Boosting the Transferability of Adversarial Examples via Local Mixup and
  Adaptive Step Size
Boosting the Transferability of Adversarial Examples via Local Mixup and Adaptive Step Size
Junlin Liu
Xinchen Lyu
AAML
4
3
0
24 Jan 2024
Rethinking Impersonation and Dodging Attacks on Face Recognition Systems
Rethinking Impersonation and Dodging Attacks on Face Recognition Systems
Fengfan Zhou
Qianyu Zhou
Bangjie Yin
Hui Zheng
Xuequan Lu
Lizhuang Ma
Heifei Ling
AAML
36
3
0
17 Jan 2024
Practical Deep Dispersed Watermarking with Synchronization and Fusion
Practical Deep Dispersed Watermarking with Synchronization and Fusion
Hengchang Guo
Qilong Zhang
Junwei Luo
Feng Guo
Wenbin Zhang
Xiaodong Su
Minglei Li
WIGM
14
10
0
23 Oct 2023
Structure Invariant Transformation for better Adversarial
  Transferability
Structure Invariant Transformation for better Adversarial Transferability
Xiaosen Wang
Zeliang Zhang
Jianping Zhang
AAML
14
59
0
26 Sep 2023
Latent Code Augmentation Based on Stable Diffusion for Data-free
  Substitute Attacks
Latent Code Augmentation Based on Stable Diffusion for Data-free Substitute Attacks
Mingwen Shao
Lingzhuang Meng
Yuanjian Qiao
Lixu Zhang
W. Zuo
DiffM
19
0
0
24 Jul 2023
CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via
  Adversarial Latent Search
CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent Search
Fahad Shamshad
Muzammal Naseer
Karthik Nandakumar
AAML
PICV
28
27
0
16 Jun 2023
Content-based Unrestricted Adversarial Attack
Content-based Unrestricted Adversarial Attack
Zhaoyu Chen
Bo-wen Li
Shuang Wu
Kaixun Jiang
Shouhong Ding
Wenqiang Zhang
DiffM
24
61
0
18 May 2023
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen
H. Chen
Keyan Chen
Yilan Zhang
Zhengxia Zou
Z. Shi
DiffM
19
56
0
14 May 2023
Gradient Aligned Attacks via a Few Queries
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
30
0
0
19 May 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
17
21
0
09 Mar 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for
  Black-box Domains
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
62
64
0
27 Jan 2022
Adversarial Camouflage: Hiding Physical-World Attacks with Natural
  Styles
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
151
224
0
08 Mar 2020
ComDefend: An Efficient Image Compression Model to Defend Adversarial
  Examples
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
H. Foroosh
AAML
50
264
0
30 Nov 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GAN
AAML
174
302
0
21 May 2018
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision
  Applications
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications
Andrew G. Howard
Menglong Zhu
Bo Chen
Dmitry Kalenichenko
Weijun Wang
Tobias Weyand
M. Andreetto
Hartwig Adam
3DH
948
20,471
0
17 Apr 2017
Densely Connected Convolutional Networks
Densely Connected Convolutional Networks
Gao Huang
Zhuang Liu
L. V. D. van der Maaten
Kilian Q. Weinberger
PINN
3DV
247
36,237
0
25 Aug 2016
1