ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
    AAML
ArXivPDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

34 / 384 papers shown
Title
Protecting JPEG Images Against Adversarial Attacks
Protecting JPEG Images Against Adversarial Attacks
Aaditya (Adi) Prakash
N. Moran
Solomon Garber
Antonella DiLillo
J. Storer
AAML
28
34
0
02 Mar 2018
Understanding and Enhancing the Transferability of Adversarial Examples
Understanding and Enhancing the Transferability of Adversarial Examples
Lei Wu
Zhanxing Zhu
Cheng Tai
E. Weinan
AAML
SILM
30
97
0
27 Feb 2018
Adversarial vulnerability for any classifier
Adversarial vulnerability for any classifier
Alhussein Fawzi
Hamza Fawzi
Omar Fawzi
AAML
33
248
0
23 Feb 2018
DARTS: Deceiving Autonomous Cars with Toxic Signs
DARTS: Deceiving Autonomous Cars with Toxic Signs
Chawin Sitawarin
A. Bhagoji
Arsalan Mosenia
M. Chiang
Prateek Mittal
AAML
37
233
0
18 Feb 2018
Stealing Hyperparameters in Machine Learning
Stealing Hyperparameters in Machine Learning
Binghui Wang
Neil Zhenqiang Gong
AAML
63
458
0
14 Feb 2018
Evaluating the Robustness of Neural Networks: An Extreme Value Theory
  Approach
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach
Tsui-Wei Weng
Huan Zhang
Pin-Yu Chen
Jinfeng Yi
D. Su
Yupeng Gao
Cho-Jui Hsieh
Luca Daniel
AAML
25
464
0
31 Jan 2018
Characterizing Adversarial Subspaces Using Local Intrinsic
  Dimensionality
Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality
Xingjun Ma
Bo Li
Yisen Wang
S. Erfani
S. Wijewickrema
Grant Schoenebeck
D. Song
Michael E. Houle
James Bailey
AAML
43
730
0
08 Jan 2018
Generating Adversarial Examples with Adversarial Networks
Generating Adversarial Examples with Adversarial Networks
Chaowei Xiao
Bo Li
Jun-Yan Zhu
Warren He
M. Liu
D. Song
GAN
AAML
42
890
0
08 Jan 2018
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini
D. Wagner
AAML
38
1,074
0
05 Jan 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Bo Li
Kimberly Lu
D. Song
AAML
SILM
44
1,808
0
15 Dec 2017
NAG: Network for Adversary Generation
NAG: Network for Adversary Generation
Konda Reddy Mopuri
Utkarsh Ojha
Utsav Garg
R. Venkatesh Babu
AAML
27
144
0
09 Dec 2017
Generative Adversarial Perturbations
Generative Adversarial Perturbations
Omid Poursaeed
Isay Katsman
Bicheng Gao
Serge J. Belongie
AAML
GAN
WIGM
31
351
0
06 Dec 2017
Attacking Visual Language Grounding with Adversarial Examples: A Case
  Study on Neural Image Captioning
Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning
Hongge Chen
Huan Zhang
Pin-Yu Chen
Jinfeng Yi
Cho-Jui Hsieh
GAN
AAML
35
49
0
06 Dec 2017
Towards Robust Neural Networks via Random Self-ensemble
Towards Robust Neural Networks via Random Self-ensemble
Xuanqing Liu
Minhao Cheng
Huan Zhang
Cho-Jui Hsieh
FedML
AAML
58
419
0
02 Dec 2017
Adversarial Attacks Beyond the Image Space
Adversarial Attacks Beyond the Image Space
Fangyin Wei
Chenxi Liu
Yu-Siang Wang
Weichao Qiu
Lingxi Xie
Yu-Wing Tai
Chi-Keung Tang
Alan Yuille
AAML
41
145
0
20 Nov 2017
Towards Reverse-Engineering Black-Box Neural Networks
Towards Reverse-Engineering Black-Box Neural Networks
Seong Joon Oh
Maximilian Augustin
Bernt Schiele
Mario Fritz
AAML
292
3
0
06 Nov 2017
Boosting Adversarial Attacks with Momentum
Boosting Adversarial Attacks with Momentum
Yinpeng Dong
Fangzhou Liao
Tianyu Pang
Hang Su
Jun Zhu
Xiaolin Hu
Jianguo Li
AAML
26
83
0
17 Oct 2017
Detecting Adversarial Attacks on Neural Network Policies with Visual
  Foresight
Detecting Adversarial Attacks on Neural Network Policies with Visual Foresight
Yen-Chen Lin
Ming Liu
Min Sun
Jia-Bin Huang
AAML
29
48
0
02 Oct 2017
Improving image generative models with human interactions
Improving image generative models with human interactions
Andrew Kyle Lampinen
David R. So
Douglas Eck
Fred Bertsch
GAN
30
3
0
29 Sep 2017
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial
  Examples
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Pin-Yu Chen
Yash Sharma
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
AAML
24
637
0
13 Sep 2017
PassGAN: A Deep Learning Approach for Password Guessing
PassGAN: A Deep Learning Approach for Password Guessing
Briland Hitaj
Paolo Gasti
G. Ateniese
Fernando Perez-Cruz
GAN
30
246
0
01 Sep 2017
Towards Interpretable Deep Neural Networks by Leveraging Adversarial
  Examples
Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples
Yinpeng Dong
Hang Su
Jun Zhu
Fan Bao
AAML
39
128
0
18 Aug 2017
UPSET and ANGRI : Breaking High Performance Image Classifiers
UPSET and ANGRI : Breaking High Performance Image Classifiers
Sayantan Sarkar
Ankan Bansal
U. Mahbub
Rama Chellappa
AAML
30
108
0
04 Jul 2017
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong
Warren He
James Wei
Xinyun Chen
Nicholas Carlini
D. Song
AAML
43
242
0
15 Jun 2017
Towards Robust Detection of Adversarial Examples
Towards Robust Detection of Adversarial Examples
Tianyu Pang
Chao Du
Yinpeng Dong
Jun Zhu
AAML
39
18
0
02 Jun 2017
MagNet: a Two-Pronged Defense against Adversarial Examples
MagNet: a Two-Pronged Defense against Adversarial Examples
Dongyu Meng
Hao Chen
AAML
13
1,199
0
25 May 2017
Formal Guarantees on the Robustness of a Classifier against Adversarial
  Manipulation
Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation
Matthias Hein
Maksym Andriushchenko
AAML
45
506
0
23 May 2017
Black-Box Attacks against RNN based Malware Detection Algorithms
Black-Box Attacks against RNN based Malware Detection Algorithms
Weiwei Hu
Ying Tan
10
149
0
23 May 2017
Ensemble Adversarial Training: Attacks and Defenses
Ensemble Adversarial Training: Attacks and Defenses
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
79
2,701
0
19 May 2017
Parseval Networks: Improving Robustness to Adversarial Examples
Parseval Networks: Improving Robustness to Adversarial Examples
Moustapha Cissé
Piotr Bojanowski
Edouard Grave
Yann N. Dauphin
Nicolas Usunier
AAML
86
798
0
28 Apr 2017
The Space of Transferable Adversarial Examples
The Space of Transferable Adversarial Examples
Florian Tramèr
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
SILM
41
555
0
11 Apr 2017
Adversarial Image Perturbation for Privacy Protection -- A Game Theory
  Perspective
Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective
Seong Joon Oh
Mario Fritz
Bernt Schiele
CVBM
AAML
339
160
0
28 Mar 2017
Blocking Transferability of Adversarial Examples in Black-Box Learning
  Systems
Blocking Transferability of Adversarial Examples in Black-Box Learning Systems
Hossein Hosseini
Yize Chen
Sreeram Kannan
Baosen Zhang
Radha Poovendran
AAML
30
106
0
13 Mar 2017
Learning Adversary-Resistant Deep Neural Networks
Learning Adversary-Resistant Deep Neural Networks
Qinglong Wang
Wenbo Guo
Kaixuan Zhang
Alexander Ororbia
Masashi Sugiyama
Xue Liu
C. Lee Giles
AAML
23
43
0
05 Dec 2016
Previous
12345678