Please use this identifier to cite or link to this item:
Volltext verfügbar? / Dokumentlieferung
doi:10.22028/D291-47192 | Title: | Revisiting Transferable Adversarial Images: Systemization, Evaluation, and New Insights |
| Author(s): | Zhao, Zhengyu Zhang, Hanwei Li, Renjue Sicre, Ronan Amsaleg, Laurent Backes, Michael Li, Qi Wang, Jiianqiang Shen, Chao |
| Language: | English |
| Title: | IEEE transactions on pattern analysis and machine intelligence |
| Volume: | 48 |
| Issue: | 1 |
| Pages: | 765-780 |
| Publisher/Platform: | IEEE |
| Year of Publication: | 2026 |
| DDC notations: | 004 Computer science, internet |
| Publikation type: | Journal Article |
| Abstract: | Transferable adversarial images raise critical security concerns for computer vision systems in real-world, black-box attack scenarios. Although many transfer attacks have been proposed, existing research lacks a systematic and comprehensive evaluation. In this paper, we systemize transfer attacks into five categories around the general machine learning pipeline and provide the first comprehensive evaluation, with 23 representative attacks against 11 representative defenses, including the recent, transfer-oriented defense and the real-world Google Cloud Vision. In particular, we identify two main problems of existing evaluations: (1) for attack transferability, lack of intra-category analyses with fair hyperparameter settings, and (2) for attack stealthiness, lack of diverse measures. Our evaluation results validate that these problems have indeed caused misleading conclusions and missing points, and addressing them leads to new, consensus-challenging insights, such as (1) an early attack, DI, even outperforms all similar follow-up ones, (2) the state-of-the-art (white-box) defense, DiffPure, is even vulnerable to (black-box) transfer attacks, and (3) even under the same $L_{p}$Lp constraint, different attacks yield dramatically different stealthiness results regarding diverse imperceptibility metrics, finer-grained measures, and a user study. We hope that our analyses will serve as guidance on properly evaluating transferable adversarial images and advance the design of attacks and defenses. |
| DOI of the first publication: | 10.1109/TPAMI.2025.3610085 |
| Link to this record: | urn:nbn:de:bsz:291--ds-471924 hdl:20.500.11880/41308 http://dx.doi.org/10.22028/D291-47192 |
| ISSN: | 0162-8828 |
| Date of registration: | 12-Mar-2026 |
| Faculty: | MI - Fakultät für Mathematik und Informatik |
| Department: | MI - Informatik |
| Professorship: | MI - Prof. Dr. Michael Backes |
| Collections: | SciDok - Der Wissenschaftsserver der Universität des Saarlandes |
Files for this record:
There are no files associated with this item.
Items in SciDok are protected by copyright, with all rights reserved, unless otherwise indicated.

