ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2308.07026
  4. Cited By
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal
  Contrastive Learning

AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning

ACM Multimedia (ACM MM), 2023
14 August 2023
Ziqi Zhou
Shengshan Hu
Minghui Li
Hangtao Zhang
Yechao Zhang
Hai Jin
    AAML
ArXiv (abs)PDFHTML

Papers citing "AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning"

29 / 29 papers shown
Title
From Pretrain to Pain: Adversarial Vulnerability of Video Foundation Models Without Task Knowledge
From Pretrain to Pain: Adversarial Vulnerability of Video Foundation Models Without Task Knowledge
H. Lu
Yi Yu
Song Xia
Yiming Yang
Deepu Rajan
Boon Poh Ng
Alex Chichung Kot
Xudong Jiang
AAML
64
0
0
10 Nov 2025
ToxicTextCLIP: Text-Based Poisoning and Backdoor Attacks on CLIP Pre-training
ToxicTextCLIP: Text-Based Poisoning and Backdoor Attacks on CLIP Pre-training
Xin Yao
Haiyang Zhao
Yimin Chen
Jiawei Guo
Kecheng Huang
Ming Zhao
CLIPSILMVLM
140
0
0
01 Nov 2025
Vanish into Thin Air: Cross-prompt Universal Adversarial Attacks for SAM2
Vanish into Thin Air: Cross-prompt Universal Adversarial Attacks for SAM2
Ziqi Zhou
Yifan Hu
Yufei Song
Zijing Li
Shengshan Hu
Leo Yu Zhang
Dezhong Yao
Long Zheng
Hai Jin
AAML
48
4
0
28 Oct 2025
SegTrans: Transferable Adversarial Examples for Segmentation Models
SegTrans: Transferable Adversarial Examples for Segmentation Models
Yufei Song
Ziqi Zhou
Qi Lu
Hangtao Zhang
Yifan Hu
Lulu Xue
Shengshan Hu
Minghui Li
Leo Yu Zhang
84
4
0
10 Oct 2025
DarkHash: A Data-Free Backdoor Attack Against Deep Hashing
DarkHash: A Data-Free Backdoor Attack Against Deep HashingIEEE Transactions on Information Forensics and Security (TIFS), 2025
Ziqi Zhou
Menghao Deng
Yufei Song
Hangtao Zhang
Wei Wan
Shengshan Hu
Minghui Li
Leo Yu Zhang
Dezhong Yao
148
4
0
09 Oct 2025
Vision Transformers: the threat of realistic adversarial patches
Vision Transformers: the threat of realistic adversarial patches
Kasper Cools
Clara Maathuis
Alexander M. van Oers
Claudia S. Hübner
Nikos Deligiannis
Marijke Vandewal
Geert De Cubber
AAML
96
0
0
25 Sep 2025
ADVEDM:Fine-grained Adversarial Attack against VLM-based Embodied Agents
ADVEDM:Fine-grained Adversarial Attack against VLM-based Embodied Agents
Yichen Wang
Hangtao Zhang
Hewen Pan
Ziqi Zhou
Xianlong Wang
Peijin Guo
Lulu Xue
Shengshan Hu
Minghui Li
Leo Yu Zhang
AAML
84
1
0
20 Sep 2025
Model Science: getting serious about verification, explanation and control of AI systems
Model Science: getting serious about verification, explanation and control of AI systems
Przemyslaw Biecek
Wojciech Samek
64
0
0
27 Aug 2025
Towards Reliable Forgetting: A Survey on Machine Unlearning Verification
Towards Reliable Forgetting: A Survey on Machine Unlearning Verification
Lulu Xue
Shengshan Hu
Wei Lu
Yan Shen
Dongxu Li
Peijin Guo
Ziqi Zhou
Minghui Li
Yanjun Zhang
Leo Yu Zhang
MUAAML
254
0
0
18 Jun 2025
Lorica: A Synergistic Fine-Tuning Framework for Advancing Personalized Adversarial Robustness
Lorica: A Synergistic Fine-Tuning Framework for Advancing Personalized Adversarial Robustness
Tianyu Qi
Lei Xue
Yufeng Zhan
Xiaobo Ma
AAML
244
0
0
04 Jun 2025
Few-Shot Adversarial Low-Rank Fine-Tuning of Vision-Language Models
Few-Shot Adversarial Low-Rank Fine-Tuning of Vision-Language Models
Sajjad Ghiasvand
Haniyeh Ehsani Oskouie
Mahnoosh Alizadeh
Ramtin Pedarsani
AAMLVLM
195
7
0
21 May 2025
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Jiabo He
James Bailey
AAML
351
6
0
08 May 2025
Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection
Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection
Liqin Wang
Qianyue Hu
Wei Lu
Xiangyang Luo
DiffMAAMLPICV
253
2
0
30 Apr 2025
Improving Generalization of Universal Adversarial Perturbation via Dynamic Maximin Optimization
Improving Generalization of Universal Adversarial Perturbation via Dynamic Maximin OptimizationAAAI Conference on Artificial Intelligence (AAAI), 2025
Yujiao Shi
Yingzhe Xu
Junyu Shi
L. Zhang
Shengshan Hu
Minghui Li
Yanjun Zhang
AAML
284
4
0
17 Mar 2025
Distraction is All You Need for Multimodal Large Language Model Jailbreaking
Distraction is All You Need for Multimodal Large Language Model JailbreakingComputer Vision and Pattern Recognition (CVPR), 2025
Zuopeng Yang
Jiluan Fan
Anli Yan
Erdun Gao
Xin Lin
Tao Li
Kanghua mo
Changyu Dong
AAML
458
12
0
15 Feb 2025
Topological Signatures of Adversaries in Multimodal Alignments
Topological Signatures of Adversaries in Multimodal Alignments
Minh Vu
Geigh Zollicoffer
Huy Mai
B. Nebgen
Boian S. Alexandrov
Manish Bhattarai
AAML
221
2
0
29 Jan 2025
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
NumbOD: A Spatial-Frequency Fusion Attack Against Object DetectorsAAAI Conference on Artificial Intelligence (AAAI), 2024
Ziqi Zhou
Bowen Li
Yufei Song
Zhifei Yu
Shengshan Hu
Wei Wan
L. Zhang
Dezhong Yao
Hai Jin
AAML
276
11
0
22 Dec 2024
PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation
PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation
Yufei Song
Ziqi Zhou
Minghui Li
Xiaobei Wang
Hangtao Zhang
Menghao Deng
Wei Wan
Shengshan Hu
L. Zhang
AAML
464
11
0
21 Dec 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream ModelsNeural Information Processing Systems (NeurIPS), 2024
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAMLSILM
313
11
0
26 Oct 2024
Downstream Transfer Attack: Adversarial Attacks on Downstream Models
  with Pre-trained Vision Transformers
Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Weijie Zheng
Jiabo He
Hanxun Huang
Zuxuan Wu
Yu-Gang Jiang
AAML
199
0
0
03 Aug 2024
JailbreakZoo: Survey, Landscapes, and Horizons in Jailbreaking Large Language and Vision-Language Models
JailbreakZoo: Survey, Landscapes, and Horizons in Jailbreaking Large Language and Vision-Language Models
Haibo Jin
Leyang Hu
Xinuo Li
Peiyan Zhang
Chonghan Chen
Jun Zhuang
Haohan Wang
PILM
296
54
0
26 Jun 2024
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Fengfan Zhou
Qianyu Zhou
Hefei Ling
Xuequan Lu
AAML
299
3
0
27 May 2024
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Ziqi Zhou
Minghui Li
Wei Liu
Shengshan Hu
Yechao Zhang
Wei Wan
Lulu Xue
Leo Yu Zhang
Dezhong Yao
Hai Jin
SILMAAML
244
17
0
16 Mar 2024
Spurious Feature Eraser: Stabilizing Test-Time Adaptation for Vision-Language Foundation Model
Spurious Feature Eraser: Stabilizing Test-Time Adaptation for Vision-Language Foundation Model
Huan Ma
Yan Zhu
Changqing Zhang
Peilin Zhao
Baoyuan Wu
Long-Kai Huang
Qinghua Hu
Bing Wu
VLM
374
3
0
01 Mar 2024
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object
  Detectors in the Physical World
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World
Zheng Zhou
Hong Zhao
Ju Liu
Qiaosheng Zhang
Liwei Geng
Shuchang Lyu
W. Feng
AAML
249
4
0
29 Dec 2023
SA-Attack: Improving Adversarial Transferability of Vision-Language
  Pre-training Models via Self-Augmentation
SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation
Bangyan He
Yang Liu
Yaning Tan
Tianrui Lou
Yang Liu
Simeng Qin
AAMLVLM
217
32
0
08 Dec 2023
Adversarial Prompt Tuning for Vision-Language Models
Adversarial Prompt Tuning for Vision-Language Models
Jiaming Zhang
Jiabo He
Xin Wang
Lingyu Qiu
Yuan Liu
Yu-Gang Jiang
Jitao Sang
AAMLVPVLMVLM
218
29
0
19 Nov 2023
Why Does Little Robustness Help? Understanding and Improving Adversarial
  Transferability from Surrogate Training
Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate TrainingIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Yechao Zhang
Shengshan Hu
Leo Yu Zhang
Junyu Shi
Minghui Li
Xiaogeng Liu
Wei Wan
Hai Jin
AAML
262
30
0
15 Jul 2023
Iterative Adversarial Attack on Image-guided Story Ending Generation
Iterative Adversarial Attack on Image-guided Story Ending GenerationIEEE transactions on multimedia (IEEE TMM), 2023
Youze Wang
Wenbo Hu
Richang Hong
185
7
0
16 May 2023
1