ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 684 papers shown
Adversarial collision attacks on image hashing functions
Adversarial collision attacks on image hashing functions
Brian Dolhansky
Cristian Canton Ferrer
AAML
243
22
0
18 Nov 2020
Gradient Starvation: A Learning Proclivity in Neural Networks
Gradient Starvation: A Learning Proclivity in Neural NetworksNeural Information Processing Systems (NeurIPS), 2020
Mohammad Pezeshki
Sekouba Kaba
Yoshua Bengio
Aaron Courville
Doina Precup
Guillaume Lajoie
MLT
532
308
0
18 Nov 2020
Adversarial Turing Patterns from Cellular Automata
Adversarial Turing Patterns from Cellular AutomataAAAI Conference on Artificial Intelligence (AAAI), 2020
Nurislam Tursynbek
I. Vilkoviskiy
Maria Sindeeva
Ivan Oseledets
AAML
190
4
0
18 Nov 2020
Self-Gradient Networks
Self-Gradient Networks
Hossein Aboutalebi
M. Shafiee
AAML
168
0
0
18 Nov 2020
Do Fine-tuned Commonsense Language Models Really Generalize?
Do Fine-tuned Commonsense Language Models Really Generalize?
Mayank Kejriwal
Ke Shen
ELMLRM
136
10
0
18 Nov 2020
Ensemble of Models Trained by Key-based Transformed Images for
  Adversarially Robust Defense Against Black-box Attacks
Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Maungmaung Aprilpyone
Hitoshi Kiya
FedML
149
1
0
16 Nov 2020
Fooling the primate brain with minimal, targeted image manipulation
Fooling the primate brain with minimal, targeted image manipulation
Li-xin Yuan
Will Xiao
Giorgia Dellaferrera
Gabriel Kreiman
Francis E. H. Tay
Jiashi Feng
Margaret Livingstone
AAML
319
1
0
11 Nov 2020
A survey on practical adversarial examples for malware classifiers
A survey on practical adversarial examples for malware classifiers
Daniel Park
B. Yener
AAML
226
17
0
06 Nov 2020
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush
  Deep Neural Network in Multi-Tenant FPGA
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA
Adnan Siraj Rakin
Yukui Luo
Xiaolin Xu
Deliang Fan
AAML
259
56
0
05 Nov 2020
A Black-Box Attack Model for Visually-Aware Recommender Systems
A Black-Box Attack Model for Visually-Aware Recommender Systems
Rami Cohen
Oren Sar Shalom
Dietmar Jannach
A. Amir
153
31
0
05 Nov 2020
Adversarial Examples in Constrained Domains
Adversarial Examples in Constrained Domains
Ryan Sheatsley
Nicolas Papernot
Mike Weisman
Gunjan Verma
Patrick McDaniel
AAML
272
26
0
02 Nov 2020
The Vulnerability of the Neural Networks Against Adversarial Examples in
  Deep Learning Algorithms
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Rui Zhao
AAML
142
1
0
02 Nov 2020
Integer Programming-based Error-Correcting Output Code Design for Robust
  Classification
Integer Programming-based Error-Correcting Output Code Design for Robust ClassificationConference on Uncertainty in Artificial Intelligence (UAI), 2020
Samarth Gupta
Saurabh Amin
98
4
0
30 Oct 2020
Deep Neural Mobile Networking
Deep Neural Mobile Networking
Chaoyun Zhang
205
2
0
23 Oct 2020
Adversarial Attacks on Binary Image Recognition Systems
Adversarial Attacks on Binary Image Recognition Systems
Eric Balkanski
Harrison W. Chase
Kojin Oshiba
Alexander Rilee
Yaron Singer
Richard Wang
AAML
172
4
0
22 Oct 2020
An Efficient Adversarial Attack for Tree Ensembles
An Efficient Adversarial Attack for Tree Ensembles
Chong Zhang
Huan Zhang
Cho-Jui Hsieh
AAML
154
26
0
22 Oct 2020
Defense-guided Transferable Adversarial Attacks
Defense-guided Transferable Adversarial Attacks
Zifei Zhang
Kai Qiao
Jian Chen
Ningning Liang
AAML
126
0
0
22 Oct 2020
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Learning Black-Box Attackers with Transferable Priors and Query FeedbackNeural Information Processing Systems (NeurIPS), 2020
Jiancheng Yang
Yangzhou Jiang
Xiaoyang Huang
Bingbing Ni
Chenglong Zhao
AAML
220
88
0
21 Oct 2020
Optimism in the Face of Adversity: Understanding and Improving Deep
  Learning through Adversarial Robustness
Optimism in the Face of Adversity: Understanding and Improving Deep Learning through Adversarial RobustnessProceedings of the IEEE (Proc. IEEE), 2020
Guillermo Ortiz-Jiménez
Apostolos Modas
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
AAML
368
50
0
19 Oct 2020
Targeted Physical-World Attention Attack on Deep Learning Models in Road
  Sign Recognition
Targeted Physical-World Attention Attack on Deep Learning Models in Road Sign RecognitionIEEE Internet of Things Journal (IEEE IoT J.), 2020
Xinghao Yang
Weifeng Liu
Shengli Zhang
Wei Liu
Dacheng Tao
AAML
213
39
0
09 Oct 2020
Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial
  Attacks
Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks
Anit Kumar Sahu
Satya Narayan Shukla
J. Zico Kolter
AAML
149
1
0
08 Oct 2020
A Unified Approach to Interpreting and Boosting Adversarial
  Transferability
A Unified Approach to Interpreting and Boosting Adversarial Transferability
Xin Eric Wang
Jie Ren
Shuyu Lin
Xiangming Zhu
Yisen Wang
Quanshi Zhang
AAML
396
108
0
08 Oct 2020
A survey of algorithmic recourse: definitions, formulations, solutions,
  and prospects
A survey of algorithmic recourse: definitions, formulations, solutions, and prospects
Amir-Hossein Karimi
Gilles Barthe
Bernhard Schölkopf
Isabel Valera
FaML
358
185
0
08 Oct 2020
Do Wider Neural Networks Really Help Adversarial Robustness?
Do Wider Neural Networks Really Help Adversarial Robustness?Neural Information Processing Systems (NeurIPS), 2020
Boxi Wu
Jinghui Chen
Deng Cai
Xiaofei He
Quanquan Gu
AAML
408
105
0
03 Oct 2020
Efficient Robust Training via Backward Smoothing
Efficient Robust Training via Backward SmoothingAAAI Conference on Artificial Intelligence (AAAI), 2020
Jinghui Chen
Yu Cheng
Zhe Gan
Quanquan Gu
Jingjing Liu
AAML
198
44
0
03 Oct 2020
CorrAttack: Black-box Adversarial Attack with Structured Search
CorrAttack: Black-box Adversarial Attack with Structured Search
Zhichao Huang
Yaowei Huang
Tong Zhang
AAML
161
8
0
03 Oct 2020
Query complexity of adversarial attacks
Query complexity of adversarial attacksInternational Conference on Machine Learning (ICML), 2020
Grzegorz Gluch
R. Urbanke
AAML
210
8
0
02 Oct 2020
Block-wise Image Transformation with Secret Key for Adversarially Robust
  Defense
Block-wise Image Transformation with Secret Key for Adversarially Robust DefenseIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2020
Maungmaung Aprilpyone
Hitoshi Kiya
144
58
0
02 Oct 2020
Bag of Tricks for Adversarial Training
Bag of Tricks for Adversarial TrainingInternational Conference on Learning Representations (ICLR), 2020
Tianyu Pang
Xiao Yang
Yinpeng Dong
Hang Su
Jun Zhu
AAML
369
274
0
01 Oct 2020
Generating End-to-End Adversarial Examples for Malware Classifiers Using
  Explainability
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability
Ishai Rosenberg
Shai Meir
J. Berrebi
I. Gordon
Guillaume Sicard
Eli David
AAMLSILM
159
30
0
28 Sep 2020
Where Does the Robustness Come from? A Study of the Transformation-based
  Ensemble Defence
Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Chang Liao
Yao Cheng
Chengfang Fang
Jie Shi
158
1
0
28 Sep 2020
VATLD: A Visual Analytics System to Assess, Understand and Improve
  Traffic Light Detection
VATLD: A Visual Analytics System to Assess, Understand and Improve Traffic Light DetectionIEEE Transactions on Visualization and Computer Graphics (TVCG), 2020
Liang Gou
Lincan Zou
Nanxiang Li
M. Hofmann
A. Shekar
A. Wendt
Liu Ren
301
66
0
27 Sep 2020
Improving Query Efficiency of Black-box Adversarial Attack
Improving Query Efficiency of Black-box Adversarial AttackEuropean Conference on Computer Vision (ECCV), 2020
Yang Bai
Yuyuan Zeng
Yong Jiang
Yisen Wang
Shutao Xia
Weiwei Guo
AAMLMLAU
231
57
0
24 Sep 2020
Adversarial Rain Attack and Defensive Deraining for DNN Perception
Adversarial Rain Attack and Defensive Deraining for DNN Perception
Liming Zhai
Felix Juefei Xu
Qing Guo
Xiaofei Xie
Lei Ma
Weiiia Feng
Shengchao Qin
Yang Liu
AAML
233
18
0
19 Sep 2020
EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial
  Attacks
EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial AttacksACM Transactions on Privacy and Security (TOPS), 2020
Yaguan Qian
Qiqi Shao
Jiamin Wang
Xiangyuan Lin
Yankai Guo
Zhaoquan Gu
Bin Wang
Chunming Wu
AAML
310
27
0
19 Sep 2020
Multimodal Safety-Critical Scenarios Generation for Decision-Making
  Algorithms Evaluation
Multimodal Safety-Critical Scenarios Generation for Decision-Making Algorithms EvaluationIEEE Robotics and Automation Letters (RA-L), 2020
Wenhao Ding
Baiming Chen
Yue Liu
Kim Ji Eun
Ding Zhao
AAML
287
120
0
16 Sep 2020
Switching Transferable Gradient Directions for Query-Efficient Black-Box
  Adversarial Attacks
Switching Transferable Gradient Directions for Query-Efficient Black-Box Adversarial Attacks
Chen Ma
Shuyu Cheng
Li Chen
Jun Zhu
Junhai Yong
AAML
130
7
0
15 Sep 2020
Decision-based Universal Adversarial Attack
Decision-based Universal Adversarial Attack
Jing Wu
Mingyi Zhou
Shuaicheng Liu
Yipeng Liu
Ce Zhu
AAML
184
13
0
15 Sep 2020
A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses
A Game Theoretic Analysis of Additive Adversarial Attacks and DefensesNeural Information Processing Systems (NeurIPS), 2020
Ambar Pal
René Vidal
AAML
208
30
0
14 Sep 2020
Towards the Quantification of Safety Risks in Deep Neural Networks
Towards the Quantification of Safety Risks in Deep Neural Networks
Peipei Xu
Wenjie Ruan
Xiaowei Huang
166
7
0
13 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's PerspectiveACM Computing Surveys (ACM CSUR), 2020
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
256
183
0
08 Sep 2020
Perceptual Deep Neural Networks: Adversarial Robustness through Input
  Recreation
Perceptual Deep Neural Networks: Adversarial Robustness through Input Recreation
Danilo Vasconcellos Vargas
Bingli Liao
Takahiro Kanzaki
AAML
153
3
0
02 Sep 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
Lixing Chen
Junhai Yong
MLAUOOD
159
17
0
02 Sep 2020
Adversarial Eigen Attack on Black-Box Models
Adversarial Eigen Attack on Black-Box ModelsComputer Vision and Pattern Recognition (CVPR), 2020
Linjun Zhou
Peng Cui
Yinan Jiang
Shiqiang Yang
AAML
131
17
0
27 Aug 2020
Adversarially Training for Audio Classifiers
Adversarially Training for Audio ClassifiersInternational Conference on Pattern Recognition (ICPR), 2020
Raymel Alfonso Sallo
Mohammad Esmaeilpour
P. Cardinal
AAML
108
8
0
26 Aug 2020
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
214
57
0
20 Aug 2020
CCA: Exploring the Possibility of Contextual Camouflage Attack on Object
  Detection
CCA: Exploring the Possibility of Contextual Camouflage Attack on Object Detection
Shengnan Hu
Yang Zhang
Sumit Laha
A. Sharma
H. Foroosh
AAML
86
8
0
19 Aug 2020
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical
  Attacks on Machine Learning for Windows Malware Detection
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Christian Scano
Scott E. Coull
Battista Biggio
Giovanni Lagorio
A. Armando
Fabio Roli
AAML
256
66
0
17 Aug 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive SurveyACM Computing Surveys (ACM CSUR), 2020
A. Serban
E. Poll
Joost Visser
AAML
420
80
0
07 Aug 2020
Black-box Adversarial Sample Generation Based on Differential Evolution
Black-box Adversarial Sample Generation Based on Differential EvolutionJournal of Systems and Software (JSS), 2020
Junyu Lin
Lei Xu
Yingqi Liu
Xinming Zhang
AAML
128
36
0
30 Jul 2020
Previous
123...10111213149
Next
Page 10 of 14
Pageof 14