"adversarial examples" Papers

36 papers found

$\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

Antonio Emanuele Cinà, Francesco Villani, Maura Pintor et al.

ICLR 2025

ADBM: Adversarial Diffusion Bridge Model for Reliable Adversarial Purification

Xiao Li, Wenxuan Sun, Huanran Chen et al.

ICLR 2025arXiv:2408.00315
25
citations

Attention! Your Vision Language Model Could Be Maliciously Manipulated

Xiaosen Wang, Shaokang Wang, Zhijin Ge et al.

NEURIPS 2025arXiv:2505.19911
3
citations

Boosting Adversarial Transferability via Residual Perturbation Attack

Jinjia Peng, Zeze Tao, Huibing Wang et al.

ICCV 2025arXiv:2508.05689
3
citations

Boosting Adversarial Transferability with Spatial Adversarial Alignment

Zhaoyu Chen, HaiJing Guo, Kaixun Jiang et al.

NEURIPS 2025arXiv:2501.01015
1
citations

Certified Human Trajectory Prediction

Mohammadhossein Bahari, Saeed Saadatnejad, Amirhossein Askari Farsangi et al.

CVPR 2025arXiv:2403.13778
2
citations

Consensus-Robust Transfer Attacks via Parameter and Representation Perturbations

Shixin Li, Zewei Li, Xiaojing Ma et al.

NEURIPS 2025

DiffBreak: Is Diffusion-Based Purification Robust?

Andre Kassis, Urs Hengartner, Yaoliang Yu

NEURIPS 2025arXiv:2411.16598
1
citations

E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis

Zhisheng Zhang, Derui Wang, Yifan Mi et al.

NEURIPS 2025arXiv:2511.07099

Everywhere Attack: Attacking Locally and Globally to Boost Targeted Transferability

Hui Zeng, Sanshuai Cui, Biwei Chen et al.

AAAI 2025paperarXiv:2501.00707
3
citations

Generating Less Certain Adversarial Examples Improves Robust Generalization

Minxing Zhang, Michael Backes, Xiao Zhang

ICLR 2025arXiv:2310.04539
1
citations

Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement

Yuchen Ren, Zhengyu Zhao, Chenhao Lin et al.

CVPR 2025arXiv:2503.15404
5
citations

Improving Transferable Targeted Attacks with Feature Tuning Mixup

Kaisheng Liang, Xuelong Dai, Yanjie Li et al.

CVPR 2025arXiv:2411.15553
5
citations

Mind the Trojan Horse: Image Prompt Adapter Enabling Scalable and Deceptive Jailbreaking

Junxi Chen, Junhao Dong, Xiaohua Xie

CVPR 2025highlightarXiv:2504.05838
5
citations

MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework

Ping Guo, Cheng Gong, Fei Liu et al.

CVPR 2025arXiv:2501.07251

Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation

Yuan Gan, Jiaxu Miao, Yunze Wang et al.

CVPR 2025arXiv:2506.01591
3
citations

Towards a 3D Transfer-based Black-box Attack via Critical Feature Guidance

Shuchao Pang, Zhenghan Chen, Shen Zhang et al.

ICCV 2025arXiv:2508.15650
2
citations

Training Robust Ensembles Requires Rethinking Lipschitz Continuity

Ali Ebrahimpour Boroojeny, Hari Sundaram, Varun Chandrasekaran

ICLR 2025
1
citations

TransferBench: Benchmarking Ensemble-based Black-box Transfer Attacks

Fabio Brau, Maura Pintor, Antonio Cinà et al.

NEURIPS 2025

ViT-EnsembleAttack: Augmenting Ensemble Models for Stronger Adversarial Transferability in Vision Transformers

Hanwen Cao, Haobo Lu, Xiaosen Wang et al.

ICCV 2025arXiv:2508.12384
1
citations

Accelerating the Global Aggregation of Local Explanations

Alon Mor, Yonatan Belinkov, Benny Kimelfeld

AAAI 2024paperarXiv:2312.07991
7
citations

Boosting Adversarial Transferability across Model Genus by Deformation-Constrained Warping

Qinliang Lin, Cheng Luo, Zenghao Niu et al.

AAAI 2024paperarXiv:2402.03951
30
citations

Boosting Adversarial Transferability by Block Shuffle and Rotation

Kunyu Wang, he xuanran, Wenxuan Wang et al.

CVPR 2024arXiv:2308.10299
97
citations

Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval

Qiwei Tian, Chenhao Lin, Zhengyu Zhao et al.

ICML 2024arXiv:2312.07364
3
citations

Deep Networks Always Grok and Here is Why

Ahmed Imtiaz Humayun, Randall Balestriero, Richard Baraniuk

ICML 2024arXiv:2402.15555
47
citations

Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing

Youwei Shu, Xi Xiao, Derui Wang et al.

ICML 2024arXiv:2406.02309
2
citations

Et Tu Certifications: Robustness Certificates Yield Better Adversarial Examples

Andrew C. Cullen, Shijie Liu, Paul Montague et al.

ICML 2024arXiv:2302.04379
3
citations

Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions

Jon Vadillo, Roberto Santana, Jose A Lozano

ICML 2024arXiv:2004.06383
1
citations

LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate

Tao Wu, Tie Luo, D. C. Wunsch

AAAI 2024paperarXiv:2312.13118
7
citations

One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language Models

Lin Li, Haoyan Guan, Jianing Qiu et al.

CVPR 2024arXiv:2403.01849
45
citations

PeerAiD: Improving Adversarial Distillation from a Specialized Peer Tutor

Jaewon Jung, Hongsun Jang, Jaeyong Song et al.

CVPR 2024arXiv:2403.06668
11
citations

Perturbation-Invariant Adversarial Training for Neural Ranking Models: Improving the Effectiveness-Robustness Trade-Off

Yuansan Liu, Ruqing Zhang, Mingkun Zhang et al.

AAAI 2024paperarXiv:2312.10329
14
citations

Preventing Catastrophic Overfitting in Fast Adversarial Training: A Bi-level Optimization Perspective

Zhaoxin Wang, Handing Wang, Cong Tian et al.

ECCV 2024arXiv:2407.12443
9
citations

SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples

Chen Ma, Ningfei Wang, Qi Alfred Chen et al.

AAAI 2024paperarXiv:2312.09520
38
citations

Watermark-embedded Adversarial Examples for Copyright Protection against Diffusion Models

Peifei Zhu, Tsubasa Takahashi, Hirokatsu Kataoka

CVPR 2024arXiv:2404.09401
34
citations

Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual

Ruichu Cai, Yuxuan Zhu, Jie Qiao et al.

AAAI 2024paperarXiv:2312.13628
5
citations