ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 684 papers shown
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Sign-OPT: A Query-Efficient Hard-label Adversarial AttackInternational Conference on Learning Representations (ICLR), 2019
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
542
245
0
24 Sep 2019
Absum: Simple Regularization Method for Reducing Structural Sensitivity
  of Convolutional Neural Networks
Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural NetworksAAAI Conference on Artificial Intelligence (AAAI), 2019
Sekitoshi Kanai
Yasutoshi Ida
Yasuhiro Fujiwara
Masanori Yamada
S. Adachi
AAML
145
1
0
19 Sep 2019
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Adversarial Attacks and Defenses in Images, Graphs and Text: A ReviewInternational Journal of Automation and Computing (IJAC), 2019
Han Xu
Yao Ma
Haochen Liu
Debayan Deb
Hui Liu
Shucheng Zhou
Anil K. Jain
AAML
331
728
0
17 Sep 2019
White-Box Adversarial Defense via Self-Supervised Data Estimation
White-Box Adversarial Defense via Self-Supervised Data Estimation
Zudi Lin
Hanspeter Pfister
Ziming Zhang
AAML
143
2
0
13 Sep 2019
Sparse and Imperceivable Adversarial Attacks
Sparse and Imperceivable Adversarial AttacksIEEE International Conference on Computer Vision (ICCV), 2019
Francesco Croce
Matthias Hein
AAML
201
221
0
11 Sep 2019
Universal Physical Camouflage Attacks on Object Detectors
Universal Physical Camouflage Attacks on Object DetectorsComputer Vision and Pattern Recognition (CVPR), 2019
Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
C. Zou
Ning Liu
AAML
315
199
0
10 Sep 2019
Learning to Disentangle Robust and Vulnerable Features for Adversarial
  Detection
Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection
Byunggill Joe
Sung Ju Hwang
I. Shin
AAML
83
2
0
10 Sep 2019
BOSH: An Efficient Meta Algorithm for Decision-based Attacks
BOSH: An Efficient Meta Algorithm for Decision-based Attacks
Zhenxin Xiao
Puyudi Yang
Yuchen Eleanor Jiang
Kai-Wei Chang
Cho-Jui Hsieh
AAML
196
1
0
10 Sep 2019
Blackbox Attacks on Reinforcement Learning Agents Using Approximated
  Temporal Information
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Yiren Zhao
Ilia Shumailov
Han Cui
Xitong Gao
Robert D. Mullins
Ross J. Anderson
AAML
211
34
0
06 Sep 2019
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with
  Limited Queries
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesUSENIX Security Symposium (USENIX Security), 2019
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
AAML
423
94
0
19 Aug 2019
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
  Recognition Systems
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition SystemsAsia-Pacific Computer Systems Architecture Conference (APCSAC), 2019
Lea Schonherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
375
70
0
05 Aug 2019
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor
  Contamination Detection
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination DetectionUSENIX Security Symposium (USENIX Security), 2019
Di Tang
Luyi Xing
Haixu Tang
Kehuan Zhang
AAML
199
230
0
02 Aug 2019
On the Design of Black-box Adversarial Examples by Leveraging
  Gradient-free Optimization and Operator Splitting Method
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting MethodIEEE International Conference on Computer Vision (ICCV), 2019
Pu Zhao
Sijia Liu
Pin-Yu Chen
Nghia Hoang
Kaidi Xu
B. Kailkhura
Xue Lin
AAML
364
58
0
26 Jul 2019
Stateful Detection of Black-Box Adversarial Attacks
Stateful Detection of Black-Box Adversarial Attacks
Steven Chen
Nicholas Carlini
D. Wagner
AAMLMLAU
196
135
0
12 Jul 2019
Metamorphic Detection of Adversarial Examples in Deep Learning Models
  With Affine Transformations
Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine TransformationsInternational Workshop on Metamorphic Testing (IWMT), 2019
R. Mekala
Gudjon Magnusson
Adam A. Porter
Mikael Lindvall
Madeline Diep
AAML
65
18
0
10 Jul 2019
Diminishing the Effect of Adversarial Perturbations via Refining Feature
  Representation
Diminishing the Effect of Adversarial Perturbations via Refining Feature Representation
Nader Asadi
Amirm. Sarfi
Mehrdad Hosseinzadeh
Sahba Tahsini
M. Eftekhari
AAML
131
2
0
01 Jul 2019
Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with
  Adversarial Perturbations
Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations
Yuezun Li
Xin Yang
Baoyuan Wu
Siwei Lyu
AAMLPICVCVBM
174
42
0
21 Jun 2019
Convergence of Adversarial Training in Overparametrized Neural Networks
Convergence of Adversarial Training in Overparametrized Neural NetworksNeural Information Processing Systems (NeurIPS), 2019
Ruiqi Gao
Tianle Cai
Haochuan Li
Liwei Wang
Cho-Jui Hsieh
Jason D. Lee
AAML
308
114
0
19 Jun 2019
The Attack Generator: A Systematic Approach Towards Constructing
  Adversarial Attacks
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
F. Assion
Peter Schlicht
Florens Greßner
W. Günther
Fabian Hüger
Nico M. Schmidt
Umair Rasheed
AAML
147
16
0
17 Jun 2019
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Improving Black-box Adversarial Attacks with a Transfer-based PriorNeural Information Processing Systems (NeurIPS), 2019
Shuyu Cheng
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
AAML
212
295
0
17 Jun 2019
Copy and Paste: A Simple But Effective Initialization Method for
  Black-Box Adversarial Attacks
Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2019
T. Brunner
Frederik Diehl
Alois Knoll
AAML
145
8
0
14 Jun 2019
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking
Jiabao Guo
M. Potkonjak
AAMLWIGM
166
18
0
11 Jun 2019
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient
  Black-box Attacks
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box AttacksNeural Information Processing Systems (NeurIPS), 2019
Ziang Yan
Yiwen Guo
Changshui Zhang
AAML
167
118
0
11 Jun 2019
Robustness Verification of Tree-based Models
Robustness Verification of Tree-based ModelsNeural Information Processing Systems (NeurIPS), 2019
Hongge Chen
Huan Zhang
Si Si
Yang Li
Duane S. Boning
Cho-Jui Hsieh
AAML
223
87
0
10 Jun 2019
Attacking Graph Convolutional Networks via Rewiring
Attacking Graph Convolutional Networks via Rewiring
Yao Ma
Suhang Wang
Tyler Derr
Lingfei Wu
Shucheng Zhou
AAMLGNN
181
89
0
10 Jun 2019
Provably Robust Boosted Decision Stumps and Trees against Adversarial
  Attacks
Provably Robust Boosted Decision Stumps and Trees against Adversarial AttacksNeural Information Processing Systems (NeurIPS), 2019
Maksym Andriushchenko
Matthias Hein
206
66
0
08 Jun 2019
ML-LOO: Detecting Adversarial Examples with Feature Attribution
ML-LOO: Detecting Adversarial Examples with Feature AttributionAAAI Conference on Artificial Intelligence (AAAI), 2019
Puyudi Yang
Jianbo Chen
Cho-Jui Hsieh
Jane-ling Wang
Sai Li
AAML
173
112
0
08 Jun 2019
Making targeted black-box evasion attacks effective and efficient
Making targeted black-box evasion attacks effective and efficient
Mika Juuti
B. Atli
Nadarajah Asokan
AAMLMIACVMLAU
106
9
0
08 Jun 2019
Robust Attacks against Multiple Classifiers
Robust Attacks against Multiple Classifiers
Juan C. Perdomo
Yaron Singer
AAML
144
11
0
06 Jun 2019
Query-efficient Meta Attack to Deep Neural Networks
Query-efficient Meta Attack to Deep Neural NetworksInternational Conference on Learning Representations (ICLR), 2019
Jiawei Du
Hu Zhang
Qiufeng Wang
Yi Yang
Jiashi Feng
AAML
201
86
0
06 Jun 2019
Enhancing Transformation-based Defenses using a Distribution Classifier
Enhancing Transformation-based Defenses using a Distribution Classifier
C. Kou
H. Lee
E. Chang
Teck Khim Ng
180
4
0
01 Jun 2019
High Frequency Component Helps Explain the Generalization of
  Convolutional Neural Networks
High Frequency Component Helps Explain the Generalization of Convolutional Neural NetworksComputer Vision and Pattern Recognition (CVPR), 2019
Haohan Wang
Xindi Wu
Pengcheng Yin
Eric Xing
396
623
0
28 May 2019
Thwarting finite difference adversarial attacks with output
  randomization
Thwarting finite difference adversarial attacks with output randomization
Haidar Khan
Daniel Park
Azer Khan
B. Yener
SILMAAML
123
0
0
23 May 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the
  Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer
  Domain
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer DomainIEEE Transactions on Dependable and Secure Computing (TDSC), 2019
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
372
23
0
19 May 2019
Simple Black-box Adversarial Attacks
Simple Black-box Adversarial AttacksInternational Conference on Machine Learning (ICML), 2019
Chuan Guo
Jacob R. Gardner
Yurong You
A. Wilson
Kilian Q. Weinberger
AAML
346
660
0
17 May 2019
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial
  Optimization
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial OptimizationInternational Conference on Machine Learning (ICML), 2019
Seungyong Moon
Gaon An
Hyun Oh Song
AAMLMLAU
252
148
0
16 May 2019
Enhancing Cross-task Transferability of Adversarial Examples with
  Dispersion Reduction
Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Yunhan Jia
Yantao Lu
Senem Velipasalar
Zhenyu Zhong
Tao Wei
AAML
160
12
0
08 May 2019
Better the Devil you Know: An Analysis of Evasion Attacks using
  Out-of-Distribution Adversarial Examples
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Vikash Sehwag
A. Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
M. Chiang
Prateek Mittal
OODD
209
26
0
05 May 2019
NATTACK: Learning the Distributions of Adversarial Examples for an
  Improved Black-Box Attack on Deep Neural Networks
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural NetworksInternational Conference on Machine Learning (ICML), 2019
Yandong Li
Lijun Li
Liqiang Wang
Tong Zhang
Boqing Gong
AAML
263
263
0
01 May 2019
Gradient-free activation maximization for identifying effective stimuli
Gradient-free activation maximization for identifying effective stimuli
Will Xiao
Gabriel Kreiman
71
11
0
01 May 2019
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via
  Genetic Algorithm
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic AlgorithmComputers & security (Comput. Secur.), 2019
Jinyin Chen
Mengmeng Su
Shijing Shen
Hui Xiong
Haibin Zheng
AAML
223
71
0
01 May 2019
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep
  Classifiers
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers
Ameya Joshi
Amitangshu Mukherjee
Soumik Sarkar
Chinmay Hegde
AAML
248
108
0
17 Apr 2019
Black-box Adversarial Attacks on Video Recognition Models
Black-box Adversarial Attacks on Video Recognition Models
Linxi Jiang
Jiabo He
Shaoxiang Chen
James Bailey
Yu-Gang Jiang
AAMLMLAU
227
160
0
10 Apr 2019
Efficient Decision-based Black-box Adversarial Attacks on Face
  Recognition
Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
Yinpeng Dong
Hang Su
Baoyuan Wu
Zhifeng Li
Wen Liu
Tong Zhang
Jun Zhu
CVBMAAML
218
448
0
09 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Sai Li
Martin J. Wainwright
AAML
510
757
0
03 Apr 2019
Adversarial Robustness vs Model Compression, or Both?
Adversarial Robustness vs Model Compression, or Both?
Shaokai Ye
Kaidi Xu
Sijia Liu
Jan-Henrik Lambrechts
Huan Zhang
Aojun Zhou
Kaisheng Ma
Yanzhi Wang
Xue Lin
AAML
296
172
0
29 Mar 2019
Adversarial Out-domain Examples for Generative Models
Adversarial Out-domain Examples for Generative Models
Dario Pasquini
Marco Mingione
M. Bernaschi
WIGMSILMAAML
128
6
0
07 Mar 2019
Defense Against Adversarial Images using Web-Scale Nearest-Neighbor
  Search
Defense Against Adversarial Images using Web-Scale Nearest-Neighbor SearchComputer Vision and Pattern Recognition (CVPR), 2019
Abhimanyu Dubey
Laurens van der Maaten
Zeki Yalniz
Shouqing Yang
D. Mahajan
AAML
235
66
0
05 Mar 2019
Perceptual Quality-preserving Black-Box Attack against Deep Learning
  Image Classifiers
Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers
Diego Gragnaniello
Francesco Marra
Giovanni Poggi
L. Verdoliva
AAML
148
32
0
20 Feb 2019
There are No Bit Parts for Sign Bits in Black-Box Attacks
There are No Bit Parts for Sign Bits in Black-Box Attacks
Abdullah Al-Dujaili
Una-May O’Reilly
AAML
315
22
0
19 Feb 2019
Previous
123...121314
Next