2022
DOI: 10.1016/j.cose.2022.102847
|View full text |Cite
|
Sign up to set email alerts
|

A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(6 citation statements)
references
References 35 publications
0
4
0
1
Order By: Relevance
“…Sadeghi et al [34] summarizes the basic concepts, analyzes datasets and ML architectures, providing awareness of the adversary strategies and the defense responses to them, and proposes a comprehensive system-drive taxonomy for the latter. Long et al [22] discusses a set of preliminary concepts of Computer Vision and adversarial context, providing a set of adversarial attacks grouped by adversary goals and capabilities, and propose a set of research directions that readers can use to continue the development of robust networks. Liang et al [23] discuss the most significant attacks and defenses in the literature, with the latter being grouped by the underlying technique, finishing with the presentation of existing challenges in the adversarial context.…”
Section: Background For Adversarial Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Sadeghi et al [34] summarizes the basic concepts, analyzes datasets and ML architectures, providing awareness of the adversary strategies and the defense responses to them, and proposes a comprehensive system-drive taxonomy for the latter. Long et al [22] discusses a set of preliminary concepts of Computer Vision and adversarial context, providing a set of adversarial attacks grouped by adversary goals and capabilities, and propose a set of research directions that readers can use to continue the development of robust networks. Liang et al [23] discuss the most significant attacks and defenses in the literature, with the latter being grouped by the underlying technique, finishing with the presentation of existing challenges in the adversarial context.…”
Section: Background For Adversarial Attacksmentioning
confidence: 99%
“…Previous surveys [22]- [24] do not provide a state-of-theart comparison, area-specific metrics, and architectures commonly used, hindering the initiation among new researchers. This survey provides a comprehensive review of the legacy and recent advances, such as Adversarial Purification and Adversarial Attacks in Vision Transformers (ViTs), presents datasets and metrics in this context, provides results for multiple datasets, using the de facto standard attack (Auto-Attack [25]), and summarizes approaches that have official or unofficial implementations (duly identified) to stimulate the research of new mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…И в некоторых ситуациях, когда человек легко находит решение, нейронная сеть ошибается, как бы сложно написана она ни была. Более того, большинство нейронных сетей очень легко обмануть [6].…”
Section: Introductionunclassified
“…Many attack algorithms have been developed so far [2] and applied to various types of data, such as images, speech signals, and texts. Especially for images, we can find various attack algorithms [1,12,8,5,6]. In a recent survey [6], major image attack algorithms are classified into gradient-based, transfer/score-based, decision-based, and approximation-based algorithms.…”
Section: Introductionmentioning
confidence: 99%