| [1]Cheng M, Le T, Chen P Y, et al. Queryefficient hardlabel blackbox attack[C] Proc of Int Conf on Learning Representations (ICLR 2019). New York: OpenReview, 2019: 69[2]Cheng M, Singh S, Chen P H, et al. SignOPT: A queryefficient hardlabel adversarial attack[C] Proc of Int Conf on Learning Representations (ICLR 2020). New York: OpenReview, 2020: 2630[3]Chen J, Jordan M I, Wainwright M J. HopSkipJump Attack: A queryefficient decisionbased attack[C] Proc of the 2020 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2020: 12771294[4]Guo Chuan, Gardner J, You Yurong, et al. Simple blackbox adversarial attacks[C] Proc of the 36th Int Conf on Machine Learning. New York: PMLR, 2019: 24842493[5]Andriushchenko M, Croce F, Flammarion N, et al. Square attack: A queryefficient blackbox adversarial attack via random search[C] Proc of Computer Vision—ECCV 2020: 16th European Conference. Berlin: Springer, 2020: 2328[6]Maho T, Furon T, Le Merrer E. SurFree: A fast surrogatefree blackbox attack[C] Proc of the 2021 IEEECVF Conf on Computer Vision and Pattern Recognition (CVPR). Piscataway, NJ: IEEE, 2021: 1042510434[7]Chen J, Gu Q. RayS: A ray searching method for hardlabel adversarial attack[C] Proc of ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining. New York: ACM, 2020: 17391747[8]Liu Y, MoosaviDezfooli S M, Frossard P. A geometryinspired decisionbased attack[C] Proc of IEEE Int Conf on Computer Vision. Piscataway, NJ: IEEE, 2019: 48904898[9]Shi Y, Han Y, Hu Q, et al. Queryefficient blackbox adversarial attack with customized iteration and sampling[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 2023: 45(2): 22262245[10]Zhou B, Khosla A, Lapedriza A, et al. Learning deep features for discriminative localization[C] Proc of 2016 IEEE Conf on Computer Vision and Pattern Recognition (CVPR). Piscataway, NJ: IEEE, 2016: 29212929[11]Selvaraju R R, Cogswell M, Das A, et al. GradCAM: Visual explanations from deep networks via gradientbased localization[J]. International Journal of Computer Vision, 2020: 128(2): 336359[12]Zhao T, Wu X. Pyramid feature attention network for saliency detection[C] Proc of the 2019 IEEECVF Conf on Computer Vision and Pattern Recognition (CVPR). Piscataway, NJ: IEEE, 2019: 30803089[13]Wang F Y, Zuo X Q, Huang H, et al. ADBA: Approximation decision boundary approach for blackbox adversarial attacks[C] Proc of the 39th AAAI Conf on Artificial Intelligence (AAAI25). Menlo Park, CA: AAAI, 2025: 76287636[14]Simonyan K, Zisserman A. Very deep convolutional networks for largescale image recognition[C] Proc of the 3rd Int Conf on Learning Representations(ICLR 2015). New York: OpenReview, 2015[15]He K, Zhang X, Ren S, et al. Deep residual learning for image recognition[C] Proc of IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2016: 770778[16]Szegedy C, Vanhoucke V, Ioffe S, et al. Rethinking the inception architecture for computer vision[C] Proc of IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2016: 28182826[17]Tan M, Le Q. EfficientNet: Rethinking model scaling for convolutional neural networks[C] Proc of the 36th Int Conf on Machine Learning. New York: ACM, 2019: 61056114[18]Huang G, Liu Z, Van Der Maaten L, et al. Densely connected convolutional networks[C] Proc of IEEE Conf on Computer Vision and Pattern Recognition. NJ: IEEE, 2017: 47004708[19]Dosovitskiy A, Beyer L, Kolesnikov A, et al. An image is worth 16×16 words: Transformers for image recognition at scale[C] Proc of the 9th Int Conf on Learning Representations (ICLR 2021). New York: OpenReview, 2021: 37[20]Brendel W, Rauber J, Bethge M. Decisionbased adversarial attacks: Reliable attacks against blackbox machine learning models[C] Proc of Int Conf on Learning Representations (ICLR 2018). New York: OpenReview, 2018: 112[21]Dai Z, Liu S, Li Q, et al. Saliency attack: Towards imperceptible blackbox adversarial attack[J]. ACM Trans on Intelligent Systems and Technology, 2023, 14(3): 120 |