ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 684 papers shown
Adversarial Attacks against Face Recognition: A Comprehensive Study
Adversarial Attacks against Face Recognition: A Comprehensive Study
Fatemeh Vakhshiteh
A. Nickabadi
Raghavendra Ramachandra
AAML
227
16
0
22 Jul 2020
Robust Tracking against Adversarial Attacks
Robust Tracking against Adversarial Attacks
Shuai Jia
Chao Ma
Yibing Song
Xiaokang Yang
AAML
193
59
0
20 Jul 2020
Transfer Learning without Knowing: Reprogramming Black-box Machine
  Learning Models with Scarce Data and Limited Resources
Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited ResourcesInternational Conference on Machine Learning (ICML), 2020
Yun-Yun Tsai
Pin-Yu Chen
Tsung-Yi Ho
AAMLMLAUBDL
328
108
0
17 Jul 2020
Do Adversarially Robust ImageNet Models Transfer Better?
Do Adversarially Robust ImageNet Models Transfer Better?Neural Information Processing Systems (NeurIPS), 2020
Hadi Salman
Andrew Ilyas
Logan Engstrom
Ashish Kapoor
Aleksander Madry
333
467
0
16 Jul 2020
Accelerating Robustness Verification of Deep Neural Networks Guided by
  Target Labels
Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Wenjie Wan
Zhaodi Zhang
Yiwei Zhu
Min Zhang
Fu Song
AAML
157
9
0
16 Jul 2020
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing FlowsNeural Information Processing Systems (NeurIPS), 2020
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
306
69
0
15 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Patch-wise Attack for Fooling Deep Neural NetworkEuropean Conference on Computer Vision (ECCV), 2020
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
274
174
0
14 Jul 2020
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low
  Query Budget Regimes
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget RegimesKnowledge Discovery and Data Mining (KDD), 2020
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAML
126
36
0
13 Jul 2020
Generating Adversarial Inputs Using A Black-box Differential Technique
Generating Adversarial Inputs Using A Black-box Differential Technique
J. Matos
Lucas C. Cordeiro
Marcelo d’Amorim
Xiaowei Huang
AAML
94
0
0
10 Jul 2020
Black-box Adversarial Example Generation with Normalizing Flows
Black-box Adversarial Example Generation with Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
139
3
0
06 Jul 2020
Query-Free Adversarial Transfer via Undertrained Surrogates
Query-Free Adversarial Transfer via Undertrained Surrogates
Chris Miller
Soroush Vosoughi
AAML
120
0
0
01 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Damien Scieur
William L. Hamilton
AAMLGAN
329
56
0
01 Jul 2020
Orthogonal Deep Models As Defense Against Black-Box Attacks
Orthogonal Deep Models As Defense Against Black-Box Attacks
M. Jalwana
Naveed Akhtar
Bennamoun
Lin Wang
AAML
189
11
0
26 Jun 2020
Uncovering the Connections Between Adversarial Transferability and
  Knowledge Transferability
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
553
31
0
25 Jun 2020
Blacklight: Scalable Defense for Neural Networks against Query-Based
  Black-Box Attacks
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box AttacksUSENIX Security Symposium (USENIX Security), 2020
Huiying Li
Shawn Shan
Emily Wenger
Jiayun Zhang
Haitao Zheng
Ben Y. Zhao
AAML
268
51
0
24 Jun 2020
Bit Error Robustness for Energy-Efficient DNN Accelerators
Bit Error Robustness for Energy-Efficient DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
MQ
263
1
0
24 Jun 2020
Sparse-RS: a versatile framework for query-efficient sparse black-box
  adversarial attacks
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacksAAAI Conference on Artificial Intelligence (AAAI), 2020
Francesco Croce
Maksym Andriushchenko
Naman D. Singh
Nicolas Flammarion
Matthias Hein
340
123
0
23 Jun 2020
RayS: A Ray Searching Method for Hard-label Adversarial Attack
RayS: A Ray Searching Method for Hard-label Adversarial AttackKnowledge Discovery and Data Mining (KDD), 2020
Jinghui Chen
Quanquan Gu
AAML
257
155
0
23 Jun 2020
Adversarial Attacks for Multi-view Deep Models
Adversarial Attacks for Multi-view Deep Models
Xuli Sun
Shiliang Sun
AAML
102
0
0
19 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to
  Adversarial Examples
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
156
25
0
18 Jun 2020
AdvMind: Inferring Adversary Intent of Black-Box Attacks
AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
MLAUAAML
168
30
0
16 Jun 2020
Boosting Black-Box Attack with Partially Transferred Conditional
  Adversarial Distribution
Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng
Baoyuan Wu
Yanbo Fan
Li Liu
Zhifeng Li
Shutao Xia
AAML
246
6
0
15 Jun 2020
Convergence of adaptive algorithms for weakly convex constrained
  optimization
Convergence of adaptive algorithms for weakly convex constrained optimization
Ahmet Alacaoglu
Yura Malitsky
Volkan Cevher
174
14
0
11 Jun 2020
Protecting Against Image Translation Deepfakes by Leaking Universal
  Perturbations from Black-Box Neural Networks
Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks
Nataniel Ruiz
Sarah Adel Bargal
Stan Sclaroff
AAML
147
11
0
11 Jun 2020
A Primer on Zeroth-Order Optimization in Signal Processing and Machine
  Learning
A Primer on Zeroth-Order Optimization in Signal Processing and Machine LearningIEEE Signal Processing Magazine (IEEE Signal Process. Mag.), 2020
Sijia Liu
Pin-Yu Chen
B. Kailkhura
Gaoyuan Zhang
A. Hero III
P. Varshney
313
289
0
11 Jun 2020
Scalable Backdoor Detection in Neural Networks
Scalable Backdoor Detection in Neural Networks
Haripriya Harikumar
Vuong Le
Santu Rana
Sourangshu Bhattacharya
Sunil R. Gupta
Svetha Venkatesh
173
24
0
10 Jun 2020
Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based
  Classifiers
Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based Classifiers
Fangfang Yang
Shaolei Ren
AAML
112
17
0
10 Jun 2020
QEBA: Query-Efficient Boundary-Based Blackbox Attack
QEBA: Query-Efficient Boundary-Based Blackbox AttackComputer Vision and Pattern Recognition (CVPR), 2020
Huichen Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Yue Liu
AAML
280
196
0
28 May 2020
Increasing-Margin Adversarial (IMA) Training to Improve Adversarial
  Robustness of Neural Networks
Increasing-Margin Adversarial (IMA) Training to Improve Adversarial Robustness of Neural Networks
Linhai Ma
Liang Liang
AAML
898
21
0
19 May 2020
Attacking Black-box Recommendations via Copying Cross-domain User
  Profiles
Attacking Black-box Recommendations via Copying Cross-domain User Profiles
Wenqi Fan
Hanyu Wang
Xiangyu Zhao
Yao Ma
Hui Liu
Jianping Wang
Shucheng Zhou
Qing Li
MLAUAAML
237
87
0
17 May 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
243
11
0
11 May 2020
Projection & Probability-Driven Black-Box Attack
Projection & Probability-Driven Black-Box Attack
Jie Li
Rongrong Ji
Hong Liu
Jianzhuang Liu
Bineng Zhong
Cheng Deng
Q. Tian
AAML
135
52
0
08 May 2020
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient
  Estimation
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation
Sanjay Kariyappa
A. Prakash
Moinuddin K. Qureshi
AAML
292
175
0
06 May 2020
Adversarial Training against Location-Optimized Adversarial Patches
Adversarial Training against Location-Optimized Adversarial Patches
Sukrut Rao
David Stutz
Bernt Schiele
AAML
320
110
0
05 May 2020
Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness
Bridging Mode Connectivity in Loss Landscapes and Adversarial RobustnessInternational Conference on Learning Representations (ICLR), 2020
Pu Zhao
Pin-Yu Chen
Payel Das
Karthikeyan N. Ramamurthy
Xue Lin
AAML
459
204
0
30 Apr 2020
Imitation Attacks and Defenses for Black-box Machine Translation Systems
Imitation Attacks and Defenses for Black-box Machine Translation SystemsConference on Empirical Methods in Natural Language Processing (EMNLP), 2020
Eric Wallace
Mitchell Stern
Basel Alomair
AAML
330
130
0
30 Apr 2020
Perturbing Across the Feature Hierarchy to Improve Standard and Strict
  Blackbox Attack Transferability
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack TransferabilityNeural Information Processing Systems (NeurIPS), 2020
Nathan Inkawhich
Kevin J. Liang
Binghui Wang
Matthew J. Inkawhich
Lawrence Carin
Yiran Chen
AAML
227
97
0
29 Apr 2020
RAIN: A Simple Approach for Robust and Accurate Image Classification
  Networks
RAIN: A Simple Approach for Robust and Accurate Image Classification Networks
Jiawei Du
Hanshu Yan
Vincent Y. F. Tan
Qiufeng Wang
Rick Siow Mong Goh
Jiashi Feng
AAML
208
0
0
24 Apr 2020
PatchAttack: A Black-box Texture-based Attack with Reinforcement
  Learning
PatchAttack: A Black-box Texture-based Attack with Reinforcement LearningEuropean Conference on Computer Vision (ECCV), 2020
Chenglin Yang
Adam Kortylewski
Cihang Xie
Yinzhi Cao
Alan Yuille
AAML
241
128
0
12 Apr 2020
Luring of transferable adversarial perturbations in the black-box
  paradigm
Luring of transferable adversarial perturbations in the black-box paradigm
Rémi Bernhard
Pierre-Alain Moëllic
J. Dutertre
AAML
168
2
0
10 Apr 2020
Neural Networks Are More Productive Teachers Than Human Raters: Active
  Mixup for Data-Efficient Knowledge Distillation from a Blackbox Model
Neural Networks Are More Productive Teachers Than Human Raters: Active Mixup for Data-Efficient Knowledge Distillation from a Blackbox ModelComputer Vision and Pattern Recognition (CVPR), 2020
Dongdong Wang
Yandong Li
Liqiang Wang
Boqing Gong
144
51
0
31 Mar 2020
Towards Deep Learning Models Resistant to Large Perturbations
Towards Deep Learning Models Resistant to Large Perturbations
Amirreza Shaeiri
Rozhin Nobahari
M. Rohban
OODAAML
191
14
0
30 Mar 2020
Adversarial Imitation Attack
Adversarial Imitation Attack
Mingyi Zhou
Jing Wu
Yipeng Liu
Xiaolin Huang
Shuaicheng Liu
Xiang Zhang
Ce Zhu
AAML
141
0
0
28 Mar 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2020
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
204
168
0
28 Mar 2020
Do Deep Minds Think Alike? Selective Adversarial Attacks for
  Fine-Grained Manipulation of Multiple Deep Neural Networks
Do Deep Minds Think Alike? Selective Adversarial Attacks for Fine-Grained Manipulation of Multiple Deep Neural Networks
Zain Khan
Xiaodong Wu
R. Mudumbai
Xiaodong Wu
Weiyu Xu
AAMLMLAU
150
1
0
26 Mar 2020
Adversarial Transferability in Wearable Sensor Systems
Adversarial Transferability in Wearable Sensor Systems
Ramesh Kumar Sah
H. Ghasemzadeh
AAML
114
6
0
17 Mar 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face
  Recognition
Vec2Face: Unveil Human Faces from their Blackbox Features in Face RecognitionComputer Vision and Pattern Recognition (CVPR), 2020
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
238
60
0
16 Mar 2020
GeoDA: a geometric framework for black-box adversarial attacks
GeoDA: a geometric framework for black-box adversarial attacksComputer Vision and Pattern Recognition (CVPR), 2020
A. Rahmati
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
H. Dai
MLAUAAML
225
131
0
13 Mar 2020
Adversarial Vertex Mixup: Toward Better Adversarially Robust
  Generalization
Adversarial Vertex Mixup: Toward Better Adversarially Robust GeneralizationComputer Vision and Pattern Recognition (CVPR), 2020
Saehyung Lee
Hyungyu Lee
Sungroh Yoon
AAML
513
134
0
05 Mar 2020
Denoised Smoothing: A Provable Defense for Pretrained Classifiers
Denoised Smoothing: A Provable Defense for Pretrained Classifiers
Hadi Salman
Mingjie Sun
Greg Yang
Ashish Kapoor
J. Zico Kolter
225
23
0
04 Mar 2020
Previous
123...1011121314
Next