Poster "adversarial examples" Papers

28 papers found

$\sigma$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

Antonio Emanuele Cinà, Francesco Villani, Maura Pintor et al.

ICLR 2025

ADBM: Adversarial Diffusion Bridge Model for Reliable Adversarial Purification

Xiao Li, Wenxuan Sun, Huanran Chen et al.

ICLR 2025arXiv:2408.00315
25
citations

Attention! Your Vision Language Model Could Be Maliciously Manipulated

Xiaosen Wang, Shaokang Wang, Zhijin Ge et al.

NEURIPS 2025arXiv:2505.19911
3
citations

Boosting Adversarial Transferability via Residual Perturbation Attack

Jinjia Peng, Zeze Tao, Huibing Wang et al.

ICCV 2025arXiv:2508.05689
3
citations

Boosting Adversarial Transferability with Spatial Adversarial Alignment

Zhaoyu Chen, HaiJing Guo, Kaixun Jiang et al.

NEURIPS 2025arXiv:2501.01015
1
citations

Certified Human Trajectory Prediction

Mohammadhossein Bahari, Saeed Saadatnejad, Amirhossein Askari Farsangi et al.

CVPR 2025arXiv:2403.13778
2
citations

Consensus-Robust Transfer Attacks via Parameter and Representation Perturbations

Shixin Li, Zewei Li, Xiaojing Ma et al.

NEURIPS 2025

DiffBreak: Is Diffusion-Based Purification Robust?

Andre Kassis, Urs Hengartner, Yaoliang Yu

NEURIPS 2025arXiv:2411.16598
1
citations

E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis

Zhisheng Zhang, Derui Wang, Yifan Mi et al.

NEURIPS 2025arXiv:2511.07099

Generating Less Certain Adversarial Examples Improves Robust Generalization

Minxing Zhang, Michael Backes, Xiao Zhang

ICLR 2025arXiv:2310.04539
1
citations

Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement

Yuchen Ren, Zhengyu Zhao, Chenhao Lin et al.

CVPR 2025arXiv:2503.15404
5
citations

Improving Transferable Targeted Attacks with Feature Tuning Mixup

Kaisheng Liang, Xuelong Dai, Yanjie Li et al.

CVPR 2025arXiv:2411.15553
5
citations

MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework

Ping Guo, Cheng Gong, Fei Liu et al.

CVPR 2025arXiv:2501.07251

Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation

Yuan Gan, Jiaxu Miao, Yunze Wang et al.

CVPR 2025arXiv:2506.01591
3
citations

Towards a 3D Transfer-based Black-box Attack via Critical Feature Guidance

Shuchao Pang, Zhenghan Chen, Shen Zhang et al.

ICCV 2025arXiv:2508.15650
2
citations

Training Robust Ensembles Requires Rethinking Lipschitz Continuity

Ali Ebrahimpour Boroojeny, Hari Sundaram, Varun Chandrasekaran

ICLR 2025
1
citations

TransferBench: Benchmarking Ensemble-based Black-box Transfer Attacks

Fabio Brau, Maura Pintor, Antonio Cinà et al.

NEURIPS 2025

ViT-EnsembleAttack: Augmenting Ensemble Models for Stronger Adversarial Transferability in Vision Transformers

Hanwen Cao, Haobo Lu, Xiaosen Wang et al.

ICCV 2025arXiv:2508.12384
1
citations

Boosting Adversarial Transferability by Block Shuffle and Rotation

Kunyu Wang, he xuanran, Wenxuan Wang et al.

CVPR 2024arXiv:2308.10299
97
citations

Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval

Qiwei Tian, Chenhao Lin, Zhengyu Zhao et al.

ICML 2024arXiv:2312.07364
3
citations

Deep Networks Always Grok and Here is Why

Ahmed Imtiaz Humayun, Randall Balestriero, Richard Baraniuk

ICML 2024arXiv:2402.15555
47
citations

Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing

Youwei Shu, Xi Xiao, Derui Wang et al.

ICML 2024arXiv:2406.02309
2
citations

Et Tu Certifications: Robustness Certificates Yield Better Adversarial Examples

Andrew C. Cullen, Shijie Liu, Paul Montague et al.

ICML 2024arXiv:2302.04379
3
citations

Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions

Jon Vadillo, Roberto Santana, Jose A Lozano

ICML 2024arXiv:2004.06383
1
citations

One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language Models

Lin Li, Haoyan Guan, Jianing Qiu et al.

CVPR 2024arXiv:2403.01849
45
citations

PeerAiD: Improving Adversarial Distillation from a Specialized Peer Tutor

Jaewon Jung, Hongsun Jang, Jaeyong Song et al.

CVPR 2024arXiv:2403.06668
11
citations

Preventing Catastrophic Overfitting in Fast Adversarial Training: A Bi-level Optimization Perspective

Zhaoxin Wang, Handing Wang, Cong Tian et al.

ECCV 2024arXiv:2407.12443
9
citations

Watermark-embedded Adversarial Examples for Copyright Protection against Diffusion Models

Peifei Zhu, Tsubasa Takahashi, Hirokatsu Kataoka

CVPR 2024arXiv:2404.09401
34
citations