ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information

Black-box Adversarial Attacks with Limited Queries and Information

23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 651 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
44
0
0
08 May 2025
Attention-aggregated Attack for Boosting the Transferability of Facial Adversarial Examples
Attention-aggregated Attack for Boosting the Transferability of Facial Adversarial Examples
Jian-Wei Li
Wen-Ze Shao
AAML
31
0
0
06 May 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
142
0
0
20 Apr 2025
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
Jialei Song
Xingquan Zuo
Feiyang Wang
Hai Huang
Tianle Zhang
AAML
74
0
0
16 Apr 2025
R-TPT: Improving Adversarial Robustness of Vision-Language Models through Test-Time Prompt Tuning
R-TPT: Improving Adversarial Robustness of Vision-Language Models through Test-Time Prompt Tuning
Lijun Sheng
Jian Liang
Z. Wang
Ran He
AAML
VLM
36
0
0
15 Apr 2025
Bregman Linearized Augmented Lagrangian Method for Nonconvex Constrained Stochastic Zeroth-order Optimization
Bregman Linearized Augmented Lagrangian Method for Nonconvex Constrained Stochastic Zeroth-order Optimization
Qiankun Shi
Xiao Wang
Hao Wang
30
0
0
13 Apr 2025
Adversarial Examples in Environment Perception for Automated Driving (Review)
Adversarial Examples in Environment Perception for Automated Driving (Review)
Jun Yan
Huilin Yin
AAML
34
0
0
11 Apr 2025
Bitstream Collisions in Neural Image Compression via Adversarial Perturbations
Bitstream Collisions in Neural Image Compression via Adversarial Perturbations
Jordan Madden
Lhamo Dorje
Xiaohua Li
AAML
40
0
0
25 Mar 2025
TarPro: Targeted Protection against Malicious Image Editing
TarPro: Targeted Protection against Malicious Image Editing
Kaixin Shen
Ruijie Quan
Jiaxu Miao
Jun Xiao
Yi Yang
62
1
0
18 Mar 2025
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
42
0
0
17 Mar 2025
A Frustratingly Simple Yet Highly Effective Attack Baseline: Over 90% Success Rate Against the Strong Black-box Models of GPT-4.5/4o/o1
Zhaoyi Li
Xiaohan Zhao
Dong-Dong Wu
Jiacheng Cui
Zhiqiang Shen
AAML
VLM
69
0
0
13 Mar 2025
Enhancing Adversarial Example Detection Through Model Explanation
Qian Ma
Ziping Ye
AAML
67
0
0
12 Mar 2025
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal
Haonan An
Guang Hua
Zhengru Fang
Guowen Xu
Susanto Rahardja
Yuguang Fang
AAML
51
0
0
28 Feb 2025
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
135
0
0
21 Feb 2025
Wasserstein distributional adversarial training for deep neural networks
Wasserstein distributional adversarial training for deep neural networks
Xingjian Bai
Guangyi He
Yifan Jiang
Jan Obloj
OOD
56
0
0
13 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedIm
AAML
56
0
0
04 Feb 2025
With Great Backbones Comes Great Adversarial Transferability
With Great Backbones Comes Great Adversarial Transferability
Erik Arakelyan
Karen Hambardzumyan
Davit Papikyan
Pasquale Minervini
Albert Gordo
Isabelle Augenstein
Aram H. Markosyan
AAML
65
0
0
21 Jan 2025
An Enhanced Zeroth-Order Stochastic Frank-Wolfe Framework for Constrained Finite-Sum Optimization
An Enhanced Zeroth-Order Stochastic Frank-Wolfe Framework for Constrained Finite-Sum Optimization
Haishan Ye
Yinghui Huang
Hao Di
Xiangyu Chang
38
0
0
13 Jan 2025
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
43
0
0
31 Dec 2024
Sonar-based Deep Learning in Underwater Robotics: Overview, Robustness
  and Challenges
Sonar-based Deep Learning in Underwater Robotics: Overview, Robustness and Challenges
Martin Aubard
Ana Madureira
Luis F. Teixeira
José Pinto
AAML
73
2
0
16 Dec 2024
Transferable Adversarial Face Attack with Text Controlled Attribute
Transferable Adversarial Face Attack with Text Controlled Attribute
Wenyun Li
Zheng Zhang
X. Lan
D. Jiang
AAML
75
1
0
16 Dec 2024
Robust and Transferable Backdoor Attacks Against Deep Image Compression
  With Selective Frequency Prior
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Yi Yu
Yufei Wang
Wenhan Yang
Lanqing Guo
Shijian Lu
Ling-yu Duan
Yap-Peng Tan
Alex C. Kot
AAML
83
4
0
02 Dec 2024
Hard-Label Black-Box Attacks on 3D Point Clouds
Hard-Label Black-Box Attacks on 3D Point Clouds
Daizong Liu
Yunbo Tao
Pan Zhou
Wei Hu
3DPC
64
0
0
30 Nov 2024
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
Zhi-Yi Chin
Kuan-Chen Mu
Mario Fritz
Pin-Yu Chen
DiffM
85
0
0
25 Nov 2024
Chain of Attack: On the Robustness of Vision-Language Models Against
  Transfer-Based Adversarial Attacks
Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks
Peng Xie
Yequan Bie
Jianda Mao
Yangqiu Song
Yang Wang
Hao Chen
Kani Chen
AAML
69
1
0
24 Nov 2024
AI-generated Image Detection: Passive or Watermark?
AI-generated Image Detection: Passive or Watermark?
Moyang Guo
Yuepeng Hu
Zhengyuan Jiang
Zeyu Li
Amir Sadovnik
Arka Daw
Neil Zhenqiang Gong
75
1
0
20 Nov 2024
Keep on Swimming: Real Attackers Only Need Partial Knowledge of a
  Multi-Model System
Keep on Swimming: Real Attackers Only Need Partial Knowledge of a Multi-Model System
Julian Collado
Kevin Stangl
AAML
26
0
0
30 Oct 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAML
SILM
58
6
0
26 Oct 2024
Detecting Adversarial Examples
Detecting Adversarial Examples
Furkan Mumcu
Yasin Yilmaz
AAML
18
1
0
22 Oct 2024
Model Mimic Attack: Knowledge Distillation for Provably Transferable
  Adversarial Examples
Model Mimic Attack: Knowledge Distillation for Provably Transferable Adversarial Examples
Kirill Lukyanov
Andrew Perminov
D. Turdakov
Mikhail Pautov
AAML
29
0
0
21 Oct 2024
Sharpness-Aware Black-Box Optimization
Sharpness-Aware Black-Box Optimization
Feiyang Ye
Yueming Lyu
Xuehao Wang
Masashi Sugiyama
Yu-Jie Zhang
Ivor W. Tsang
AAML
42
0
0
16 Oct 2024
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in
  Frequency Domain
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency Domain
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
31
1
0
16 Oct 2024
Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML
  Through the Lens of Evasion Attacks
Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML Through the Lens of Evasion Attacks
Kevin Eykholt
Farhan Ahmed
Pratik Vaishnavi
Amir Rahmati
AAML
29
0
0
15 Oct 2024
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object
  Detectors
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object Detectors
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
AAML
30
1
0
14 Oct 2024
From Transparency to Accountability and Back: A Discussion of Access and
  Evidence in AI Auditing
From Transparency to Accountability and Back: A Discussion of Access and Evidence in AI Auditing
Sarah H. Cen
Rohan Alur
29
1
0
07 Oct 2024
On the Adversarial Risk of Test Time Adaptation: An Investigation into Realistic Test-Time Data Poisoning
On the Adversarial Risk of Test Time Adaptation: An Investigation into Realistic Test-Time Data Poisoning
Yongyi Su
Yushu Li
Nanqing Liu
Kui Jia
Xulei Yang
Chuan-Sheng Foo
Xun Xu
TTA
AAML
56
0
0
07 Oct 2024
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
32
0
0
27 Sep 2024
A Survey on Offensive AI Within Cybersecurity
A Survey on Offensive AI Within Cybersecurity
Sahil Girhepuje
Aviral Verma
Gaurav Raina
AAML
19
2
0
26 Sep 2024
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers
  via Feature Substitution
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers via Feature Substitution
Kiana Vu
Phung Lai
Truc D. T. Nguyen
AAML
31
0
0
13 Sep 2024
Adversarial Attacks on Data Attribution
Adversarial Attacks on Data Attribution
Xinhe Wang
Pingbang Hu
Junwei Deng
Jiaqi W. Ma
TDI
53
0
0
09 Sep 2024
Robust off-policy Reinforcement Learning via Soft Constrained Adversary
Robust off-policy Reinforcement Learning via Soft Constrained Adversary
Kosuke Nakanishi
Akihiro Kubo
Yuji Yasui
Shin Ishii
40
0
0
31 Aug 2024
On the Robustness of Kolmogorov-Arnold Networks: An Adversarial Perspective
On the Robustness of Kolmogorov-Arnold Networks: An Adversarial Perspective
Tal Alter
Raz Lapid
Moshe Sipper
AAML
54
6
0
25 Aug 2024
Segment-Anything Models Achieve Zero-shot Robustness in Autonomous
  Driving
Segment-Anything Models Achieve Zero-shot Robustness in Autonomous Driving
Jun Yan
Pengyu Wang
Danni Wang
Weiquan Huang
Daniel Watzenig
Huilin Yin
AAML
VLM
28
3
0
19 Aug 2024
Constructing Adversarial Examples for Vertical Federated Learning:
  Optimal Client Corruption through Multi-Armed Bandit
Constructing Adversarial Examples for Vertical Federated Learning: Optimal Client Corruption through Multi-Armed Bandit
Duanyi Yao
Songze Li
Ye Xue
Jin Liu
FedML
AAML
27
1
0
08 Aug 2024
SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on
  Physically-Unclonable Identifiers of Paper Surface
SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on Physically-Unclonable Identifiers of Paper Surface
Anirudh Nakra
Min Wu
Chau-Wai Wong
29
0
0
05 Aug 2024
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial
  Contrastive Prompt Tuning
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning
Xin Wang
Kai-xiang Chen
Xingjun Ma
Zhineng Chen
Jingjing Chen
Yu-Gang Jiang
AAML
36
3
0
04 Aug 2024
Guardians of Image Quality: Benchmarking Defenses Against Adversarial
  Attacks on Image Quality Metrics
Guardians of Image Quality: Benchmarking Defenses Against Adversarial Attacks on Image Quality Metrics
Alexander Gushchin
Khaled Abud
Georgii Bychkov
E. Shumitskaya
Anna Chistyakova
Sergey Lavrushkin
Bader Rasheed
Kirill Malyshev
D. Vatolin
Anastasia Antsiferova
AAML
46
2
0
02 Aug 2024
Resilience and Security of Deep Neural Networks Against Intentional and
  Unintentional Perturbations: Survey and Research Challenges
Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges
Sazzad Sayyed
Milin Zhang
Shahriar Rifat
A. Swami
Michael De Lucia
Francesco Restuccia
28
1
0
31 Jul 2024
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
Camilo A. Mart´ınez-Mej´ıa
Jesus Solano
J. Breier
Dominik Bucko
Xiaolu Hou
AAML
34
0
0
30 Jul 2024
1234...121314
Next