Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1611.02770
Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Delving into Transferable Adversarial Examples and Black-box Attacks"
50 / 384 papers shown
Title
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
32
73
0
07 Aug 2020
Anti-Bandit Neural Architecture Search for Model Defense
Hanlin Chen
Baochang Zhang
Shenjun Xue
Xuan Gong
Hong Liu
Rongrong Ji
David Doermann
AAML
22
34
0
03 Aug 2020
Membership Leakage in Label-Only Exposures
Zheng Li
Yang Zhang
34
237
0
30 Jul 2020
Adversarial Privacy-preserving Filter
Jiaming Zhang
Jitao Sang
Xian Zhao
Xiaowen Huang
Yanfeng Sun
Yongli Hu
PICV
39
41
0
25 Jul 2020
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
Yuzhen Ding
Nupur Thakur
Baoxin Li
AAML
24
3
0
20 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
32
138
0
14 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
32
128
0
13 Jul 2020
Generating Adversarial Examples with Controllable Non-transferability
Renzhi Wang
Tianwei Zhang
Xiaofei Xie
Lei Ma
Cong Tian
Felix Juefei Xu
Yang Liu
SILM
AAML
17
3
0
02 Jul 2020
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
38
51
0
01 Jul 2020
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger
Josephine Passananti
A. Bhagoji
Yuanshun Yao
Haitao Zheng
Ben Y. Zhao
AAML
31
200
0
25 Jun 2020
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
38
25
0
25 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
25
22
0
18 Jun 2020
AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
MLAU
AAML
11
29
0
16 Jun 2020
Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng
Baoyuan Wu
Yanbo Fan
Li Liu
Zhifeng Li
Shutao Xia
AAML
32
6
0
15 Jun 2020
GAP++: Learning to generate target-conditioned adversarial examples
Xiaofeng Mao
YueFeng Chen
Yuhong Li
Yuan He
Hui Xue
AAML
18
8
0
09 Jun 2020
Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense
Jay N. Paranjape
R. Dubey
Vijendran V. Gopalan
AAML
31
2
0
02 Jun 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
35
12
0
11 May 2020
Blind Backdoors in Deep Learning Models
Eugene Bagdasaryan
Vitaly Shmatikov
AAML
FedML
SILM
46
298
0
08 May 2020
Defending Hardware-based Malware Detectors against Adversarial Attacks
Abraham Peedikayil Kuruvila
Shamik Kundu
K. Basu
AAML
8
16
0
07 May 2020
Imitation Attacks and Defenses for Black-box Machine Translation Systems
Eric Wallace
Mitchell Stern
D. Song
AAML
27
120
0
30 Apr 2020
Transferable Perturbations of Deep Feature Distributions
Nathan Inkawhich
Kevin J. Liang
Lawrence Carin
Yiran Chen
AAML
30
84
0
27 Apr 2020
Single-step Adversarial training with Dropout Scheduling
S. VivekB.
R. Venkatesh Babu
OOD
AAML
18
71
0
18 Apr 2020
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning
Chenglin Yang
Adam Kortylewski
Cihang Xie
Yinzhi Cao
Alan Yuille
AAML
45
109
0
12 Apr 2020
DaST: Data-free Substitute Training for Adversarial Attacks
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
25
142
0
28 Mar 2020
Quantum noise protects quantum classifiers against adversaries
Yuxuan Du
Min-hsiu Hsieh
Tongliang Liu
Dacheng Tao
Nana Liu
AAML
22
110
0
20 Mar 2020
Face-Off: Adversarial Face Obfuscation
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
PICV
27
44
0
19 Mar 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
23
52
0
16 Mar 2020
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks
Y. Tashiro
Yang Song
Stefano Ermon
AAML
19
13
0
15 Mar 2020
When are Non-Parametric Methods Robust?
Robi Bhattacharjee
Kamalika Chaudhuri
AAML
44
27
0
13 Mar 2020
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Jin Young Lee
AAML
31
53
0
12 Mar 2020
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers
Wei Song
Xuezixiang Li
Sadia Afroz
D. Garg
Dmitry Kuznetsov
Heng Yin
AAML
55
27
0
06 Mar 2020
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Bai Li
Shiqi Wang
Yunhan Jia
Yantao Lu
Zhenyu Zhong
Lawrence Carin
Suman Jana
AAML
31
14
0
06 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OOD
AAML
72
63
0
02 Mar 2020
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
36
38
0
26 Feb 2020
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Ziwen He
Wei Wang
Jing Dong
Tieniu Tan
AAML
22
23
0
22 Feb 2020
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
AAML
SILM
25
310
0
14 Feb 2020
Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks
Lu Chen
Wenyuan Xu
AAML
24
21
0
08 Feb 2020
Defending Adversarial Attacks via Semantic Feature Manipulation
Shuo Wang
Tianle Chen
Surya Nepal
Carsten Rudolph
M. Grobler
Shangyu Chen
AAML
24
5
0
03 Feb 2020
Zeroth-Order Algorithms for Nonconvex Minimax Problems with Improved Complexities
Zhongruo Wang
Krishnakumar Balasubramanian
Shiqian Ma
Meisam Razaviyayn
21
25
0
22 Jan 2020
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems
Yanmao Man
Ming Li
Ryan M. Gerdes
AAML
22
8
0
21 Jan 2020
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie Yang
Xiaolin Huang
AAML
31
104
0
16 Jan 2020
Generating Semantic Adversarial Examples via Feature Manipulation
Shuo Wang
Surya Nepal
Carsten Rudolph
M. Grobler
Shangyu Chen
Tianle Chen
AAML
31
12
0
06 Jan 2020
Efficient Adversarial Training with Transferable Adversarial Examples
Haizhong Zheng
Ziqi Zhang
Juncheng Gu
Honglak Lee
A. Prakash
AAML
24
108
0
27 Dec 2019
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas
Yuxuan Zhang
Florian Kerschbaum
MLAU
FedML
AAML
39
145
0
02 Dec 2019
SpoC: Spoofing Camera Fingerprints
D. Cozzolino
Justus Thies
Andreas Rossler
Matthias Nießner
L. Verdoliva
33
38
0
27 Nov 2019
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Yantao Lu
Yunhan Jia
Jianyu Wang
Bai Li
Weiheng Chai
Lawrence Carin
Senem Velipasalar
AAML
24
81
0
22 Nov 2019
Defective Convolutional Networks
Tiange Luo
Tianle Cai
Mengxiao Zhang
Siyu Chen
Di He
Liwei Wang
AAML
35
3
0
19 Nov 2019
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories
Zhaohui Che
Ali Borji
Guangtao Zhai
Suiyi Ling
Jing Li
P. Le Callet
AAML
FedML
22
30
0
18 Nov 2019
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Salah Ghamizi
Maxime Cordy
Mike Papadakis
Yves Le Traon
WIGM
AAML
23
7
0
14 Nov 2019
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
21
104
0
13 Nov 2019
Previous
1
2
3
4
5
6
7
8
Next