Skip to the content.

CN doc EN doc

Table of Contents

List of Papers

1. Survey

  1. Backdoor Learning: A Survey.
    • Yiming Li, Yong Jiang, Zhifeng Li, Shu-Tao Xia. TNNLS, 2024. backdoor attack
  2. Physical Adversarial Attack Meets Computer Vision: A Decade Survey.
    • Hui Wei, Hao Tang, Xuemei Jia, Zhixiang Wang, Hanxun Yu, Zhubo Li, Shin’ichi Satoh, Luc Van Gool, Zheng Wang. TPAMI, 2024. physical adversarial attack
  3. Physical Adversarial Attacks for Surveillance: A survey.
    • Kien Nguyen , Tharindu Fernando , Clinton Fookes , Sridha Sridharan. TNNLS, 2023. physical adversarial attack
  4. A Survey on Physical Adversarial Attack in Computer Vision.
    • Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen. Arxiv, 2023. Physical adversarial attack
  5. Visually adversarial attacks and defenses in the physical world: A survey.
    • Xingxing Wei, Bangzheng Pu, Jiefan Lu, Baoyuan Wu. Arxiv, 2022. adversarial attack
  6. A survey of practical adversarial example attacks.
    • Lu Sun, Mingtian Tan, Zhe Zhou. Cybersecurity, 2018. adversarial attack

2. Poison and Backdoor

2.1. Image Classification

  1. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain.
    • Tianyu Gu, Brendan Dolan-Gavitt, Siddharth Garg. Arxiv, 2017. BadNets.
  2. Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain.
    • Linkun Fan, Fazhi He, Tongzhen Si, Wei Tang, Bing Li. AAAI, 2024. 3D Point Cloud.

2.2. Object Detection

  1. Untargeted backdoor attack against object detection.
    • Chengxiao Luo,Yiming Li, Yong Jiang, Shu-Tao Xia. ICASSP, 2023.
  2. Mask-based Invisible Backdoor Attacks on Object Detection.
    • Jeongjin Shin. Arxiv, 2023.
  3. Attacking by Aligning: Clean-Label Backdoor Attacks on Object Detection.
    • Yize Cheng, Wenbin Hu, Minhao Cheng. Arxiv, 2023.
  4. BadDet: Backdoor Attacks on Object Detection.
    • Shih-Han Chan, Yinpeng Dong, Jun Zhu, Xiaolu Zhang, Jun Zhou. ECCV workshops, 2022.

3.2. Image Segmentation

1.3. Diffusion Model

1.4. Reinforcement Learning

1.5. Recommendation Systems

1.6. Few-shot Learning

1.7. Federated Learning

1.X. Defense

1.XX. Others

3. Adversarial Examples

Acknowledgement