ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
    AAML
ArXivPDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 384 papers shown
Title
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
33
11
0
21 Jun 2023
Adversarial Clean Label Backdoor Attacks and Defenses on Text
  Classification Systems
Adversarial Clean Label Backdoor Attacks and Defenses on Text Classification Systems
Ashim Gupta
Amrith Krishna
AAML
22
16
0
31 May 2023
Don't Retrain, Just Rewrite: Countering Adversarial Perturbations by
  Rewriting Text
Don't Retrain, Just Rewrite: Countering Adversarial Perturbations by Rewriting Text
Ashim Gupta
Carter Blum
Temma Choji
Yingjie Fei
Shalin S Shah
Alakananda Vempala
Vivek Srikumar
AAML
39
9
0
25 May 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for
  Machine Learning Models: A Systematization of Watermarking, Fingerprinting,
  Model Access, and Attacks
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
34
19
0
22 Apr 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
54
18
0
20 Apr 2023
Understanding the Robustness of 3D Object Detection with Bird's-Eye-View
  Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bird's-Eye-View Representations in Autonomous Driving
Zijian Zhu
Yichi Zhang
Hai Chen
Yinpeng Dong
Shu Zhao
Wenbo Ding
Jiachen Zhong
Shibao Zheng
AAML
3DPC
40
38
0
30 Mar 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
Ulugbek S. Kamilov
AAML
38
14
0
25 Mar 2023
An Extended Study of Human-like Behavior under Adversarial Training
An Extended Study of Human-like Behavior under Adversarial Training
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
34
9
0
22 Mar 2023
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Huanran Chen
Yichi Zhang
Yinpeng Dong
Xiao Yang
Hang Su
Junyi Zhu
AAML
33
56
0
16 Mar 2023
Boosting Adversarial Attacks by Leveraging Decision Boundary Information
Boosting Adversarial Attacks by Leveraging Decision Boundary Information
Boheng Zeng
LianLi Gao
Qilong Zhang
Chaoqun Li
JingKuan Song
Shuaiqi Jing
AAML
25
2
0
10 Mar 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the
  Generation of Adversarial Examples
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
Jinwei Wang
Hao Wu
Haihua Wang
Jiawei Zhang
X. Luo
Bin Ma
AAML
31
0
0
08 Mar 2023
A Comprehensive Study on Robustness of Image Classification Models:
  Benchmarking and Rethinking
A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking
Chang-Shu Liu
Yinpeng Dong
Wenzhao Xiang
Xiaohu Yang
Hang Su
Junyi Zhu
YueFeng Chen
Yuan He
H. Xue
Shibao Zheng
OOD
VLM
AAML
40
75
0
28 Feb 2023
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign
  Recognition: A Feasibility Study
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign Recognition: A Feasibility Study
Fabian Woitschek
G. Schneider
AAML
40
9
0
27 Feb 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILM
AAML
40
20
0
14 Feb 2023
Making Substitute Models More Bayesian Can Enhance Transferability of
  Adversarial Examples
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
43
36
0
10 Feb 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual
  Example
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
37
3
0
30 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based
  Systems: A Survey and Taxonomy
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
29
4
0
18 Jan 2023
Phase-shifted Adversarial Training
Phase-shifted Adversarial Training
Yeachan Kim
Seongyeon Kim
Ihyeok Seo
Bonggun Shin
AAML
OOD
29
0
0
12 Jan 2023
Explainability and Robustness of Deep Visual Classification Models
Explainability and Robustness of Deep Visual Classification Models
Jindong Gu
AAML
52
2
0
03 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
39
27
0
01 Jan 2023
Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted
  Attacks
Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks
Anqi Zhao
Tong Chu
Yahao Liu
Wen Li
Jingjing Li
Lixin Duan
AAML
28
16
0
18 Dec 2022
Carpet-bombing patch: attacking a deep network without usual
  requirements
Carpet-bombing patch: attacking a deep network without usual requirements
Pol Labarbarie
Adrien Chan-Hon-Tong
Stéphane Herbin
Milad Leyli-Abadi
AAML
32
1
0
12 Dec 2022
General Adversarial Defense Against Black-box Attacks via Pixel Level
  and Feature Level Distribution Alignments
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Philip Torr
Jiaya Jia
AAML
42
2
0
11 Dec 2022
Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial
  Perturbations against Interpretable Deep Learning
Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Eldor Abdukhamidov
Mohammed Abuhamad
Simon S. Woo
Eric Chan-Tin
Tamer Abuhmed
AAML
36
9
0
29 Nov 2022
Game Theoretic Mixed Experts for Combinational Adversarial Machine
  Learning
Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning
Ethan Rathbun
Kaleel Mahmood
Sohaib Ahmad
Caiwen Ding
Marten van Dijk
AAML
24
4
0
26 Nov 2022
Boosting the Transferability of Adversarial Attacks with Global Momentum
  Initialization
Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Jiafeng Wang
Zhaoyu Chen
Kaixun Jiang
Dingkang Yang
Lingyi Hong
Pinxue Guo
Yan Wang
Wenqiang Zhang
AAML
38
27
0
21 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
32
20
0
17 Nov 2022
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for
  Object Detection
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for Object Detection
N. Doan
Arda Yüksel
Chih-Hong Cheng
AAML
23
1
0
14 Nov 2022
Emerging Threats in Deep Learning-Based Autonomous Driving: A
  Comprehensive Survey
Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Huiyun Cao
Wenlong Zou
Yinkun Wang
Ting Song
Mengjun Liu
AAML
56
5
0
19 Oct 2022
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Khoa D. Doan
Yingjie Lao
Ping Li
39
40
0
17 Oct 2022
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face
  Recognition
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Shuai Jia
Bangjie Yin
Taiping Yao
Shouhong Ding
Chunhua Shen
Xiaokang Yang
Chao Ma
AAML
CVBM
34
49
0
13 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a
  Distribution Perspective
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
33
58
0
09 Oct 2022
Decompiling x86 Deep Neural Network Executables
Decompiling x86 Deep Neural Network Executables
Zhibo Liu
Yuanyuan Yuan
Shuai Wang
Xiaofei Xie
Lei Ma
AAML
45
13
0
03 Oct 2022
Robust Empirical Risk Minimization with Tolerance
Robust Empirical Risk Minimization with Tolerance
Robi Bhattacharjee
Max Hopkins
Akash Kumar
Hantao Yu
Kamalika Chaudhuri
OOD
33
8
0
02 Oct 2022
DeltaBound Attack: Efficient decision-based attack in low queries regime
DeltaBound Attack: Efficient decision-based attack in low queries regime
L. Rossi
AAML
22
0
0
01 Oct 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via
  Attention-based Network in Face Recognition
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
77
9
0
11 Sep 2022
Attacking the Spike: On the Transferability and Security of Spiking
  Neural Networks to Adversarial Examples
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples
Nuo Xu
Kaleel Mahmood
Haowen Fang
Ethan Rathbun
Caiwen Ding
Wujie Wen
AAML
39
13
0
07 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
39
4
0
07 Sep 2022
Demystifying Arch-hints for Model Extraction: An Attack in Unified
  Memory System
Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System
Zhendong Wang
Xiaoming Zeng
Xulong Tang
Danfeng Zhang
Xingbo Hu
Yang Hu
AAML
MIACV
FedML
32
6
0
29 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
37
2
0
18 Aug 2022
Rank-based Decomposable Losses in Machine Learning: A Survey
Rank-based Decomposable Losses in Machine Learning: A Survey
Shu Hu
Xin Wang
Siwei Lyu
40
32
0
18 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
37
156
0
12 Jul 2022
Transferable Graph Backdoor Attack
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
49
36
0
21 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
36
5
0
16 Jun 2022
Meet You Halfway: Explaining Deep Learning Mysteries
Meet You Halfway: Explaining Deep Learning Mysteries
Oriel BenShmuel
AAML
FedML
FAtt
OOD
30
0
0
09 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
42
18
0
07 Jun 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness
  Trade-Off in Adversarial Training
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training
Guodong Cao
Peng Kuang
Xiaowei Dong
Zhifei Zhang
Hengchang Guo
Zhan Qin
Kui Ren
AAML
30
1
0
05 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
40
50
0
26 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
28
55
0
12 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
27
7
0
05 May 2022
Previous
12345678
Next