Real-World Adversarial Attack
11 papers with code • 0 benchmarks • 0 datasets
Adversarial attacks that are presented in the real world
Benchmarks
These leaderboards are used to track progress in Real-World Adversarial Attack
Most implemented papers
Real-world adversarial attack on MTCNN face detection system
Recent studies proved that deep learning approaches achieve remarkable results on face detection task.
AdvHat: Real-world adversarial attack on ArcFace Face ID system
In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions.
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders
In this study, we present a realistic scenario in which an attacker influences algorithmic trading systems by using adversarial learning techniques to manipulate the input data stream in real time.
Enhancing Real-World Adversarial Patches through 3D Modeling of Complex Target Scenes
We use the framework to create a patch for an everyday scene and evaluate its performance using a novel evaluation process that ensures that our results are reproducible in both the digital space and the real world.
Attack on practical speaker verification system using universal adversarial perturbations
In authentication scenarios, applications of practical speaker verification systems usually require a person to read a dynamic authentication text.
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model
In our experiments, we examined the transferability of our adversarial mask to a wide range of FR model architectures and datasets.
Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection
In addition, we design a robust shape completion algorithm, which is guaranteed to remove the entire patch from the images if the outputs of the patch segmenter are within a certain Hamming distance of the ground-truth patch masks.
Ignore Previous Prompt: Attack Techniques For Language Models
Transformer-based large language models (LLMs) provide a powerful foundation for natural language tasks in large-scale customer-facing applications.
Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks
Extensive experiments are conducted on the Face Recognition (FR) task, and results on four representative FR models show that our method can significantly improve the attack success rate and query efficiency.
Kidnapping Deep Learning-based Multirotors using Optimized Flying Adversarial Patches
We introduce flying adversarial patches, where multiple images are mounted on at least one other flying robot and therefore can be placed anywhere in the field of view of a victim multirotor.