{"id":"https://openalex.org/W7131436142","doi":"https://doi.org/10.48550/arxiv.2602.19418","title":"PA-Attack: Guiding Gray-Box Attacks on LVLM Vision Encoders with Prototypes and Attention","display_name":"PA-Attack: Guiding Gray-Box Attacks on LVLM Vision Encoders with Prototypes and Attention","publication_year":2026,"publication_date":"2026-02-23","ids":{"openalex":"https://openalex.org/W7131436142","doi":"https://doi.org/10.48550/arxiv.2602.19418"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.19418","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19418","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.19418","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126781244","display_name":"Hefei Mei","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mei, Hefei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105989076","display_name":"Zirui Wang","orcid":"https://orcid.org/0009-0006-6976-9522"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Zirui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126782475","display_name":"Chang Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu, Chang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126793195","display_name":"Jianyuan Guo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guo, Jianyuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126822993","display_name":"Minjing Dong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dong, Minjing","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5126781244"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.0020000000949949026,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7218999862670898},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6707000136375427},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6625999808311462},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5343999862670898},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5062000155448914}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7218999862670898},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7098000049591064},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6707000136375427},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6625999808311462},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5393999814987183},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5343999862670898},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5062000155448914},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38109999895095825},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.37279999256134033},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.30390000343322754},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.27059999108314514},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2549000084400177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.19418","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19418","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.19418","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19418","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Large":[0],"Vision-Language":[1],"Models":[2],"(LVLMs)":[3],"are":[4],"foundational":[5],"to":[6,13,109,122],"modern":[7],"multimodal":[8],"applications,":[9],"yet":[10],"their":[11],"susceptibility":[12],"adversarial":[14,129],"attacks":[15,22],"remains":[16],"a":[17,47,68,73,78,99],"critical":[18,113],"concern.":[19],"Prior":[20],"white-box":[21],"rarely":[23],"generalize":[24],"across":[25,44,133],"tasks,":[26],"and":[27,41,80,87,116,137,156],"black-box":[28],"methods":[29],"depend":[30],"on":[31,56,95,112],"expensive":[32],"transfer,":[33],"which":[34],"limits":[35],"efficiency.":[36],"The":[37],"vision":[38],"encoder,":[39],"standardized":[40],"often":[42],"shared":[43],"LVLMs,":[45],"provides":[46,72],"stable":[48,74],"gray-box":[49],"pivot":[50],"with":[51,67],"strong":[52,152],"cross-model":[53],"transfer.":[54],"Building":[55,94],"this":[57],"premise,":[58],"we":[59,97],"introduce":[60],"PA-Attack":[61,65,142],"(Prototype-Anchored":[62],"Attentive":[63],"Attack).":[64],"begins":[66],"prototype-anchored":[69],"guidance":[70],"that":[71,141],"attack":[75,153],"direction":[76],"towards":[77],"general":[79],"dissimilar":[81],"prototype,":[82],"tackling":[83],"the":[84,124,128],"attribute-restricted":[85],"issue":[86],"limited":[88],"task":[89,157],"generalization":[90,158],"of":[91],"vanilla":[92],"attacks.":[93],"this,":[96],"propose":[98],"two-stage":[100],"attention":[101,107,120,126],"enhancement":[102],"mechanism:":[103],"(i)":[104],"leverage":[105],"token-level":[106],"scores":[108],"concentrate":[110],"perturbations":[111],"visual":[114],"tokens,":[115],"(ii)":[117],"adaptively":[118],"recalibrate":[119],"weights":[121],"track":[123],"evolving":[125],"during":[127],"process.":[130],"Extensive":[131],"experiments":[132],"diverse":[134],"downstream":[135],"tasks":[136],"LVLM":[138],"architectures":[139],"show":[140],"achieves":[143],"an":[144],"average":[145],"75.1%":[146],"score":[147],"reduction":[148],"rate":[149],"(SRR),":[150],"demonstrating":[151],"effectiveness,":[154],"efficiency,":[155],"in":[159],"LVLMs.":[160],"Code":[161],"is":[162],"available":[163],"at":[164],"https://github.com/hefeimei06/PA-Attack.":[165]},"counts_by_year":[],"updated_date":"2026-02-26T06:34:08.959763","created_date":"2026-02-26T00:00:00"}
