ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
    AAML
ArXivPDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 384 papers shown
Title
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
32
73
0
07 Aug 2020
Anti-Bandit Neural Architecture Search for Model Defense
Anti-Bandit Neural Architecture Search for Model Defense
Hanlin Chen
Baochang Zhang
Shenjun Xue
Xuan Gong
Hong Liu
Rongrong Ji
David Doermann
AAML
22
34
0
03 Aug 2020
Membership Leakage in Label-Only Exposures
Membership Leakage in Label-Only Exposures
Zheng Li
Yang Zhang
34
237
0
30 Jul 2020
Adversarial Privacy-preserving Filter
Adversarial Privacy-preserving Filter
Jiaming Zhang
Jitao Sang
Xian Zhao
Xiaowen Huang
Yanfeng Sun
Yongli Hu
PICV
39
41
0
25 Jul 2020
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
Yuzhen Ding
Nupur Thakur
Baoxin Li
AAML
24
3
0
20 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Patch-wise Attack for Fooling Deep Neural Network
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
32
138
0
14 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
32
128
0
13 Jul 2020
Generating Adversarial Examples with Controllable Non-transferability
Generating Adversarial Examples with Controllable Non-transferability
Renzhi Wang
Tianwei Zhang
Xiaofei Xie
Lei Ma
Cong Tian
Felix Juefei Xu
Yang Liu
SILM
AAML
17
3
0
02 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
38
51
0
01 Jul 2020
Backdoor Attacks Against Deep Learning Systems in the Physical World
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger
Josephine Passananti
A. Bhagoji
Yuanshun Yao
Haitao Zheng
Ben Y. Zhao
AAML
31
200
0
25 Jun 2020
Uncovering the Connections Between Adversarial Transferability and
  Knowledge Transferability
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
38
25
0
25 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to
  Adversarial Examples
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
25
22
0
18 Jun 2020
AdvMind: Inferring Adversary Intent of Black-Box Attacks
AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
MLAU
AAML
11
29
0
16 Jun 2020
Boosting Black-Box Attack with Partially Transferred Conditional
  Adversarial Distribution
Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng
Baoyuan Wu
Yanbo Fan
Li Liu
Zhifeng Li
Shutao Xia
AAML
32
6
0
15 Jun 2020
GAP++: Learning to generate target-conditioned adversarial examples
GAP++: Learning to generate target-conditioned adversarial examples
Xiaofeng Mao
YueFeng Chen
Yuhong Li
Yuan He
Hui Xue
AAML
18
8
0
09 Jun 2020
Exploring the role of Input and Output Layers of a Deep Neural Network
  in Adversarial Defense
Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense
Jay N. Paranjape
R. Dubey
Vijendran V. Gopalan
AAML
31
2
0
02 Jun 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
35
12
0
11 May 2020
Blind Backdoors in Deep Learning Models
Blind Backdoors in Deep Learning Models
Eugene Bagdasaryan
Vitaly Shmatikov
AAML
FedML
SILM
46
298
0
08 May 2020
Defending Hardware-based Malware Detectors against Adversarial Attacks
Defending Hardware-based Malware Detectors against Adversarial Attacks
Abraham Peedikayil Kuruvila
Shamik Kundu
K. Basu
AAML
8
16
0
07 May 2020
Imitation Attacks and Defenses for Black-box Machine Translation Systems
Imitation Attacks and Defenses for Black-box Machine Translation Systems
Eric Wallace
Mitchell Stern
D. Song
AAML
27
120
0
30 Apr 2020
Transferable Perturbations of Deep Feature Distributions
Transferable Perturbations of Deep Feature Distributions
Nathan Inkawhich
Kevin J. Liang
Lawrence Carin
Yiran Chen
AAML
30
84
0
27 Apr 2020
Single-step Adversarial training with Dropout Scheduling
Single-step Adversarial training with Dropout Scheduling
S. VivekB.
R. Venkatesh Babu
OOD
AAML
18
71
0
18 Apr 2020
PatchAttack: A Black-box Texture-based Attack with Reinforcement
  Learning
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning
Chenglin Yang
Adam Kortylewski
Cihang Xie
Yinzhi Cao
Alan Yuille
AAML
45
109
0
12 Apr 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial Attacks
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
25
142
0
28 Mar 2020
Quantum noise protects quantum classifiers against adversaries
Quantum noise protects quantum classifiers against adversaries
Yuxuan Du
Min-hsiu Hsieh
Tongliang Liu
Dacheng Tao
Nana Liu
AAML
22
110
0
20 Mar 2020
Face-Off: Adversarial Face Obfuscation
Face-Off: Adversarial Face Obfuscation
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
PICV
27
44
0
19 Mar 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face
  Recognition
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
23
52
0
16 Mar 2020
Diversity can be Transferred: Output Diversification for White- and
  Black-box Attacks
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks
Y. Tashiro
Yang Song
Stefano Ermon
AAML
19
13
0
15 Mar 2020
When are Non-Parametric Methods Robust?
When are Non-Parametric Methods Robust?
Robi Bhattacharjee
Kamalika Chaudhuri
AAML
44
27
0
13 Mar 2020
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical
  Systems
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Jin Young Lee
AAML
31
53
0
12 Mar 2020
MAB-Malware: A Reinforcement Learning Framework for Attacking Static
  Malware Classifiers
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers
Wei Song
Xuezixiang Li
Sadia Afroz
D. Garg
Dmitry Kuznetsov
Heng Yin
AAML
55
27
0
06 Mar 2020
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Bai Li
Shiqi Wang
Yunhan Jia
Yantao Lu
Zhenyu Zhong
Lawrence Carin
Suman Jana
AAML
31
14
0
06 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
  Adversarial Robustness
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OOD
AAML
72
63
0
02 Mar 2020
Adversarial Ranking Attack and Defense
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
36
38
0
26 Feb 2020
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Ziwen He
Wei Wang
Jing Dong
Tieniu Tan
AAML
22
23
0
22 Feb 2020
Skip Connections Matter: On the Transferability of Adversarial Examples
  Generated with ResNets
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
AAML
SILM
25
310
0
14 Feb 2020
Attacking Optical Character Recognition (OCR) Systems with Adversarial
  Watermarks
Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks
Lu Chen
Wenyuan Xu
AAML
24
21
0
08 Feb 2020
Defending Adversarial Attacks via Semantic Feature Manipulation
Defending Adversarial Attacks via Semantic Feature Manipulation
Shuo Wang
Tianle Chen
Surya Nepal
Carsten Rudolph
M. Grobler
Shangyu Chen
AAML
24
5
0
03 Feb 2020
Zeroth-Order Algorithms for Nonconvex Minimax Problems with Improved
  Complexities
Zeroth-Order Algorithms for Nonconvex Minimax Problems with Improved Complexities
Zhongruo Wang
Krishnakumar Balasubramanian
Shiqian Ma
Meisam Razaviyayn
21
25
0
22 Jan 2020
GhostImage: Remote Perception Attacks against Camera-based Image
  Classification Systems
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems
Yanmao Man
Ming Li
Ryan M. Gerdes
AAML
22
8
0
21 Jan 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie Yang
Xiaolin Huang
AAML
31
104
0
16 Jan 2020
Generating Semantic Adversarial Examples via Feature Manipulation
Generating Semantic Adversarial Examples via Feature Manipulation
Shuo Wang
Surya Nepal
Carsten Rudolph
M. Grobler
Shangyu Chen
Tianle Chen
AAML
31
12
0
06 Jan 2020
Efficient Adversarial Training with Transferable Adversarial Examples
Efficient Adversarial Training with Transferable Adversarial Examples
Haizhong Zheng
Ziqi Zhang
Juncheng Gu
Honglak Lee
A. Prakash
AAML
24
108
0
27 Dec 2019
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas
Yuxuan Zhang
Florian Kerschbaum
MLAU
FedML
AAML
39
145
0
02 Dec 2019
SpoC: Spoofing Camera Fingerprints
SpoC: Spoofing Camera Fingerprints
D. Cozzolino
Justus Thies
Andreas Rossler
Matthias Nießner
L. Verdoliva
33
38
0
27 Nov 2019
Enhancing Cross-task Black-Box Transferability of Adversarial Examples
  with Dispersion Reduction
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Yantao Lu
Yunhan Jia
Jianyu Wang
Bai Li
Weiheng Chai
Lawrence Carin
Senem Velipasalar
AAML
24
81
0
22 Nov 2019
Defective Convolutional Networks
Defective Convolutional Networks
Tiange Luo
Tianle Cai
Mengxiao Zhang
Siyu Chen
Di He
Liwei Wang
AAML
35
3
0
19 Nov 2019
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories
Zhaohui Che
Ali Borji
Guangtao Zhai
Suiyi Ling
Jing Li
P. Le Callet
AAML
FedML
22
30
0
18 Nov 2019
Adversarial Embedding: A robust and elusive Steganography and
  Watermarking technique
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Salah Ghamizi
Maxime Cordy
Mike Papadakis
Yves Le Traon
WIGM
AAML
23
7
0
14 Nov 2019
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
21
104
0
13 Nov 2019
Previous
12345678
Next