Transferable adversarial attacks on SAM and its downstream models

The utilization of large foundational models has a dilemma: while fine-tuning downstream tasks from them holds promise for making use of the well-generalized knowledge in practical applications, their open accessibility also poses threats of adverse usage. This paper, for the first time, explores th...

Full description

Bibliographic Details
Main Authors: Xia, Song, Yang, Wenhan, Yu, Yi, Lin, Xun, Ding, Henghui, Duan, Lingyu, Jiang, Xudong
Other Authors: School of Electrical and Electronic Engineering
Format: Conference Paper
Language:English
Published: 2025
Subjects:
Online Access:https://hdl.handle.net/10356/182745