ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
    AAML
ArXivPDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 384 papers shown
Title
Data Poisoning Won't Save You From Facial Recognition
Data Poisoning Won't Save You From Facial Recognition
Evani Radiya-Dixit
Sanghyun Hong
Nicholas Carlini
Florian Tramèr
AAML
PICV
22
57
0
28 Jun 2021
Towards Consistent Predictive Confidence through Fitted Ensembles
Towards Consistent Predictive Confidence through Fitted Ensembles
Navid Kardan
Ankit Sharma
Kenneth O. Stanley
FedML
OODD
21
8
0
22 Jun 2021
RDA: Robust Domain Adaptation via Fourier Adversarial Attacking
RDA: Robust Domain Adaptation via Fourier Adversarial Attacking
Jiaxing Huang
Dayan Guan
Aoran Xiao
Shijian Lu
AAML
43
76
0
05 Jun 2021
A Little Robustness Goes a Long Way: Leveraging Robust Features for
  Targeted Transfer Attacks
A Little Robustness Goes a Long Way: Leveraging Robust Features for Targeted Transfer Attacks
Jacob Mitchell Springer
Melanie Mitchell
Garrett Kenyon
AAML
36
43
0
03 Jun 2021
Transferable Sparse Adversarial Attack
Transferable Sparse Adversarial Attack
Ziwen He
Wei Wang
Jing Dong
Tieniu Tan
AAML
19
20
0
31 May 2021
Improving Adversarial Transferability with Gradient Refining
Improving Adversarial Transferability with Gradient Refining
Guoqiu Wang
Huanqian Yan
Yingjie Guo
Xingxing Wei
AAML
19
8
0
11 May 2021
Adv-Makeup: A New Imperceptible and Transferable Attack on Face
  Recognition
Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
Bangjie Yin
Wenxuan Wang
Taiping Yao
Junfeng Guo
Zelun Kong
Shouhong Ding
Jilin Li
Cong Liu
AAML
39
129
0
07 May 2021
Who's Afraid of Adversarial Transferability?
Who's Afraid of Adversarial Transferability?
Ziv Katzir
Yuval Elovici
SILM
AAML
27
9
0
02 May 2021
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models
  against Adversarial Attacks
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Jun-Ho Choi
Huan Zhang
Jun-Hyuk Kim
Cho-Jui Hsieh
Jong-Seok Lee
VLM
29
7
0
30 Apr 2021
Staircase Sign Method for Boosting Adversarial Attacks
Staircase Sign Method for Boosting Adversarial Attacks
Qilong Zhang
Xiaosu Zhu
Jingkuan Song
Lianli Gao
Heng Tao Shen
AAML
43
13
0
20 Apr 2021
Removing Adversarial Noise in Class Activation Feature Space
Removing Adversarial Noise in Class Activation Feature Space
Dawei Zhou
N. Wang
Chunlei Peng
Xinbo Gao
Xiaoyu Wang
Jun Yu
Tongliang Liu
AAML
30
28
0
19 Apr 2021
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure
  DNN Accelerators
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
AAML
MQ
26
18
0
16 Apr 2021
Mitigating Adversarial Attack for Compute-in-Memory Accelerator
  Utilizing On-chip Finetune
Mitigating Adversarial Attack for Compute-in-Memory Accelerator Utilizing On-chip Finetune
Shanshi Huang
Hongwu Jiang
Shimeng Yu
AAML
26
3
0
13 Apr 2021
FACESEC: A Fine-grained Robustness Evaluation Framework for Face
  Recognition Systems
FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems
Liang Tong
Zhengzhang Chen
Jingchao Ni
Wei Cheng
Dongjin Song
Haifeng Chen
Yevgeniy Vorobeychik
CVBM
AAML
32
19
0
08 Apr 2021
On the Robustness of Vision Transformers to Adversarial Examples
On the Robustness of Vision Transformers to Adversarial Examples
Kaleel Mahmood
Rigel Mahmood
Marten van Dijk
ViT
33
219
0
31 Mar 2021
IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for
  Visual Object Tracking
IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking
Shuai Jia
Yibing Song
Chao Ma
Xiaokang Yang
AAML
50
48
0
27 Mar 2021
On Generating Transferable Targeted Perturbations
On Generating Transferable Targeted Perturbations
Muzammal Naseer
Salman Khan
Munawar Hayat
Fahad Shahbaz Khan
Fatih Porikli
AAML
34
72
0
26 Mar 2021
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison
  Linear Classifiers?
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Antonio Emanuele Cinà
Sebastiano Vascon
Ambra Demontis
Battista Biggio
Fabio Roli
Marcello Pelillo
AAML
32
9
0
23 Mar 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial
  Attack
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Ajmal Mian
AAML
40
2
0
19 Mar 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
44
15
0
19 Mar 2021
Boosting Adversarial Transferability through Enhanced Momentum
Boosting Adversarial Transferability through Enhanced Momentum
Xiaosen Wang
Jiadong Lin
Han Hu
Jingdong Wang
Kun He
AAML
14
76
0
19 Mar 2021
Model Extraction and Adversarial Transferability, Your BERT is
  Vulnerable!
Model Extraction and Adversarial Transferability, Your BERT is Vulnerable!
Xuanli He
Lingjuan Lyu
Qiongkai Xu
Lichao Sun
MIACV
SILM
36
91
0
18 Mar 2021
A Unified Game-Theoretic Interpretation of Adversarial Robustness
A Unified Game-Theoretic Interpretation of Adversarial Robustness
Jie Ren
Die Zhang
Yisen Wang
Lu Chen
Zhanpeng Zhou
...
Xu Cheng
Xin Eric Wang
Meng Zhou
Jie Shi
Quanshi Zhang
AAML
72
22
0
12 Mar 2021
Nonlinear Projection Based Gradient Estimation for Query Efficient
  Blackbox Attacks
Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Huichen Li
Linyi Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo Li
AAML
33
17
0
25 Feb 2021
CAP-GAN: Towards Adversarial Robustness with Cycle-consistent
  Attentional Purification
CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification
Mingu Kang
T. Tran
Seungju Cho
Daeyoung Kim
AAML
27
3
0
15 Feb 2021
Resilient Machine Learning for Networked Cyber Physical Systems: A
  Survey for Machine Learning Security to Securing Machine Learning for CPS
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Felix O. Olowononi
D. Rawat
Chunmei Liu
38
134
0
14 Feb 2021
"What's in the box?!": Deflecting Adversarial Attacks by Randomly
  Deploying Adversarially-Disjoint Models
"What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models
Sahar Abdelnabi
Mario Fritz
AAML
32
7
0
09 Feb 2021
Black-box Adversarial Attacks in Autonomous Vehicle Technology
Black-box Adversarial Attacks in Autonomous Vehicle Technology
K. N. Kumar
Vishnu Chalavadi
Reshmi Mitra
C.Krishna Mohan
AAML
23
70
0
15 Jan 2021
Exploring Adversarial Fake Images on Face Manifold
Exploring Adversarial Fake Images on Face Manifold
Dongze Li
Wei Wang
Hongxing Fan
Jing Dong
AAML
45
42
0
09 Jan 2021
Local Black-box Adversarial Attacks: A Query Efficient Approach
Local Black-box Adversarial Attacks: A Query Efficient Approach
Tao Xiang
Hangcheng Liu
Shangwei Guo
Tianwei Zhang
X. Liao
AAML
MLAU
26
15
0
04 Jan 2021
On Success and Simplicity: A Second Look at Transferable Targeted
  Attacks
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
46
122
0
21 Dec 2020
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
  and Defenses
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Micah Goldblum
Dimitris Tsipras
Chulin Xie
Xinyun Chen
Avi Schwarzschild
D. Song
Aleksander Madry
Bo Li
Tom Goldstein
SILM
34
271
0
18 Dec 2020
Boosting Adversarial Attacks on Neural Networks with Better Optimizer
Boosting Adversarial Attacks on Neural Networks with Better Optimizer
Heng Yin
Hengwei Zhang
Jin-dong Wang
Ruiyu Dou
AAML
35
8
0
01 Dec 2020
A Study on the Uncertainty of Convolutional Layers in Deep Neural
  Networks
A Study on the Uncertainty of Convolutional Layers in Deep Neural Networks
Hao Shen
Sihong Chen
Ran Wang
30
5
0
27 Nov 2020
Learnable Boundary Guided Adversarial Training
Learnable Boundary Guided Adversarial Training
Jiequan Cui
Shu Liu
Liwei Wang
Jiaya Jia
OOD
AAML
30
124
0
23 Nov 2020
Adversarial Threats to DeepFake Detection: A Practical Perspective
Adversarial Threats to DeepFake Detection: A Practical Perspective
Paarth Neekhara
Brian Dolhansky
Joanna Bitton
Cristian Canton Ferrer
AAML
13
79
0
19 Nov 2020
Fooling the primate brain with minimal, targeted image manipulation
Fooling the primate brain with minimal, targeted image manipulation
Li-xin Yuan
Will Xiao
Giorgia Dellaferrera
Gabriel Kreiman
Francis E. H. Tay
Jiashi Feng
Margaret Livingstone
AAML
36
1
0
11 Nov 2020
The Vulnerability of the Neural Networks Against Adversarial Examples in
  Deep Learning Algorithms
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Rui Zhao
AAML
34
1
0
02 Nov 2020
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine
  Learning
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning
Ibrahim Yilmaz
Ambareen Siraj
AAML
20
21
0
23 Oct 2020
Towards Robust Neural Networks via Orthogonal Diversity
Towards Robust Neural Networks via Orthogonal Diversity
Kun Fang
Qinghua Tao
Yingwen Wu
Tao Li
Jia Cai
Feipeng Cai
Xiaolin Huang
Jie Yang
AAML
41
8
0
23 Oct 2020
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Jiancheng Yang
Yangzhou Jiang
Xiaoyang Huang
Bingbing Ni
Chenglong Zhao
AAML
18
81
0
21 Oct 2020
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack
  and Learning
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning
Hongjun Wang
Guanbin Li
Xiaobai Liu
Liang Lin
GAN
AAML
21
22
0
15 Oct 2020
GreedyFool: Multi-Factor Imperceptibility and Its Application to
  Designing a Black-box Adversarial Attack
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial Attack
Hui Liu
Bo Zhao
Minzhi Ji
Peng Liu
AAML
29
6
0
14 Oct 2020
A Unified Approach to Interpreting and Boosting Adversarial
  Transferability
A Unified Approach to Interpreting and Boosting Adversarial Transferability
Xin Eric Wang
Jie Ren
Shuyu Lin
Xiangming Zhu
Yisen Wang
Quanshi Zhang
AAML
29
94
0
08 Oct 2020
Uncovering the Limits of Adversarial Training against Norm-Bounded
  Adversarial Examples
Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples
Sven Gowal
Chongli Qin
J. Uesato
Timothy A. Mann
Pushmeet Kohli
AAML
22
325
0
07 Oct 2020
Query complexity of adversarial attacks
Query complexity of adversarial attacks
Grzegorz Gluch
R. Urbanke
AAML
27
5
0
02 Oct 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
33
157
0
08 Sep 2020
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Jonas Geiping
Liam H. Fowl
Wenjie Huang
W. Czaja
Gavin Taylor
Michael Moeller
Tom Goldstein
AAML
21
215
0
04 Sep 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
L. Chen
Junhai Yong
MLAU
OOD
41
17
0
02 Sep 2020
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
24
51
0
20 Aug 2020
Previous
12345678
Next