ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information

Black-box Adversarial Attacks with Limited Queries and Information

23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 651 papers shown
Title
Simple Black-box Adversarial Attacks
Simple Black-box Adversarial Attacks
Chuan Guo
J. Gardner
Yurong You
A. Wilson
Kilian Q. Weinberger
AAML
11
565
0
17 May 2019
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial
  Optimization
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization
Seungyong Moon
Gaon An
Hyun Oh Song
AAML
MLAU
12
133
0
16 May 2019
Enhancing Cross-task Transferability of Adversarial Examples with
  Dispersion Reduction
Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Yunhan Jia
Yantao Lu
Senem Velipasalar
Zhenyu Zhong
Tao Wei
AAML
14
10
0
08 May 2019
Better the Devil you Know: An Analysis of Evasion Attacks using
  Out-of-Distribution Adversarial Examples
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Vikash Sehwag
A. Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
M. Chiang
Prateek Mittal
OODD
16
26
0
05 May 2019
NATTACK: Learning the Distributions of Adversarial Examples for an
  Improved Black-Box Attack on Deep Neural Networks
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks
Yandong Li
Lijun Li
Liqiang Wang
Tong Zhang
Boqing Gong
AAML
15
245
0
01 May 2019
Gradient-free activation maximization for identifying effective stimuli
Gradient-free activation maximization for identifying effective stimuli
Will Xiao
Gabriel Kreiman
11
10
0
01 May 2019
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via
  Genetic Algorithm
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm
Jinyin Chen
Mengmeng Su
Shijing Shen
Hui Xiong
Haibin Zheng
AAML
14
66
0
01 May 2019
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep
  Classifiers
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers
Ameya Joshi
Amitangshu Mukherjee
S. Sarkar
C. Hegde
AAML
6
99
0
17 Apr 2019
Black-box Adversarial Attacks on Video Recognition Models
Black-box Adversarial Attacks on Video Recognition Models
Linxi Jiang
Xingjun Ma
Shaoxiang Chen
James Bailey
Yu-Gang Jiang
AAML
MLAU
9
142
0
10 Apr 2019
Efficient Decision-based Black-box Adversarial Attacks on Face
  Recognition
Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
Yinpeng Dong
Hang Su
Baoyuan Wu
Zhifeng Li
W. Liu
Tong Zhang
Jun Zhu
CVBM
AAML
15
405
0
09 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
16
654
0
03 Apr 2019
Adversarial Robustness vs Model Compression, or Both?
Adversarial Robustness vs Model Compression, or Both?
Shaokai Ye
Kaidi Xu
Sijia Liu
Jan-Henrik Lambrechts
Huan Zhang
Aojun Zhou
Kaisheng Ma
Yanzhi Wang
Xue Lin
AAML
6
163
0
29 Mar 2019
Adversarial Out-domain Examples for Generative Models
Adversarial Out-domain Examples for Generative Models
Dario Pasquini
Marco Mingione
M. Bernaschi
WIGM
SILM
AAML
15
6
0
07 Mar 2019
Defense Against Adversarial Images using Web-Scale Nearest-Neighbor
  Search
Defense Against Adversarial Images using Web-Scale Nearest-Neighbor Search
Abhimanyu Dubey
L. V. D. van der Maaten
Zeki Yalniz
Yixuan Li
D. Mahajan
AAML
25
62
0
05 Mar 2019
Perceptual Quality-preserving Black-Box Attack against Deep Learning
  Image Classifiers
Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers
Diego Gragnaniello
Francesco Marra
Giovanni Poggi
L. Verdoliva
AAML
11
30
0
20 Feb 2019
There are No Bit Parts for Sign Bits in Black-Box Attacks
There are No Bit Parts for Sign Bits in Black-Box Attacks
Abdullah Al-Dujaili
Una-May O’Reilly
AAML
21
20
0
19 Feb 2019
On Evaluating Adversarial Robustness
On Evaluating Adversarial Robustness
Nicholas Carlini
Anish Athalye
Nicolas Papernot
Wieland Brendel
Jonas Rauber
Dimitris Tsipras
Ian Goodfellow
A. Madry
Alexey Kurakin
ELM
AAML
11
890
0
18 Feb 2019
The Efficacy of SHIELD under Different Threat Models
The Efficacy of SHIELD under Different Threat Models
Cory Cornelius
Nilaksh Das
Shang-Tse Chen
Li Chen
Michael E. Kounavis
Duen Horng Chau
AAML
13
11
0
01 Feb 2019
Robustness Certificates Against Adversarial Examples for ReLU Networks
Robustness Certificates Against Adversarial Examples for ReLU Networks
Sahil Singla
S. Feizi
AAML
17
21
0
01 Feb 2019
Black Box Submodular Maximization: Discrete and Continuous Settings
Black Box Submodular Maximization: Discrete and Continuous Settings
Lin Chen
Mingrui Zhang
Hamed Hassani
Amin Karbasi
13
16
0
28 Jan 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffM
AAML
19
36
0
26 Jan 2019
Characterizing and evaluating adversarial examples for Offline
  Handwritten Signature Verification
Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification
L. G. Hafemann
R. Sabourin
Luiz Eduardo Soares de Oliveira
AAML
11
42
0
10 Jan 2019
Adversarial CAPTCHAs
Adversarial CAPTCHAs
Chenghui Shi
Xiaogang Xu
S. Ji
Kai Bu
Jianhai Chen
R. Beyah
Ting Wang
AAML
14
52
0
04 Jan 2019
Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack
Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack
Haishan Ye
Zhichao Huang
Cong Fang
C. J. Li
Tong Zhang
AAML
18
41
0
29 Dec 2018
Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial
  Attacks
Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks
T. Brunner
Frederik Diehl
Michael Truong-Le
Alois Knoll
MLAU
AAML
6
115
0
24 Dec 2018
Towards resilient machine learning for ransomware detection
Towards resilient machine learning for ransomware detection
Li-Wei Chen
Chih-Yuan Yang
Anindya Paul
R. Sahita
AAML
12
22
0
21 Dec 2018
Knockoff Nets: Stealing Functionality of Black-Box Models
Knockoff Nets: Stealing Functionality of Black-Box Models
Tribhuvanesh Orekondy
Bernt Schiele
Mario Fritz
MLAU
6
525
0
06 Dec 2018
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAML
OOD
188
273
0
03 Dec 2018
CNN-Cert: An Efficient Framework for Certifying Robustness of
  Convolutional Neural Networks
CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks
Akhilan Boopathy
Tsui-Wei Weng
Pin-Yu Chen
Sijia Liu
Luca Daniel
AAML
108
138
0
29 Nov 2018
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Jinghui Chen
Dongruo Zhou
Jinfeng Yi
Quanquan Gu
AAML
13
67
0
27 Nov 2018
ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and
  Robust Accuracies
ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and Robust Accuracies
Bao Wang
Binjie Yuan
Zuoqiang Shi
Stanley J. Osher
AAML
OOD
6
15
0
26 Nov 2018
A note on hyperparameters in black-box adversarial examples
A note on hyperparameters in black-box adversarial examples
Jamie Hayes
AAML
MLAU
14
0
0
15 Nov 2018
Mathematical Analysis of Adversarial Attacks
Mathematical Analysis of Adversarial Attacks
Zehao Dou
Stanley J. Osher
Bao Wang
AAML
22
18
0
15 Nov 2018
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
K. Makarychev
Pascal Dupré
Yury Makarychev
Giancarlo Pellegrino
Dan Boneh
AAML
26
64
0
08 Nov 2018
Attack Graph Convolutional Networks by Adding Fake Nodes
Attack Graph Convolutional Networks by Adding Fake Nodes
Xiaoyun Wang
Minhao Cheng
Joe Eaton
Cho-Jui Hsieh
S. F. Wu
AAML
GNN
25
78
0
25 Oct 2018
Security Analysis of Deep Neural Networks Operating in the Presence of
  Cache Side-Channel Attacks
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
Sanghyun Hong
Michael Davinroy
Yigitcan Kaya
S. Locke
Ian Rackow
Kevin Kulda
Dana Dachman-Soled
Tudor Dumitras
MIACV
25
90
0
08 Oct 2018
Can Adversarially Robust Learning Leverage Computational Hardness?
Can Adversarially Robust Learning Leverage Computational Hardness?
Saeed Mahloujifar
Mohammad Mahmoody
AAML
OOD
14
48
0
02 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILM
AAML
23
49
0
02 Oct 2018
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural
  Network
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Xuanqing Liu
Yao Li
Chongruo Wu
Cho-Jui Hsieh
AAML
OOD
19
171
0
01 Oct 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial Perturbation
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
11
163
0
24 Sep 2018
Adversarial Defense via Data Dependent Activation Function and Total
  Variation Minimization
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Bao Wang
A. Lin
Weizhi Zhu
Penghang Yin
Andrea L. Bertozzi
Stanley J. Osher
AAML
29
21
0
23 Sep 2018
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Yali Du
Meng Fang
Jinfeng Yi
Jun Cheng
Dacheng Tao
AAML
11
21
0
09 Sep 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
22
285
0
16 Aug 2018
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Andrew Ilyas
Logan Engstrom
A. Madry
MLAU
AAML
8
374
0
20 Jul 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based
  Approach
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
26
346
0
12 Jul 2018
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
MLAU
AAML
13
394
0
30 May 2018
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
M. Alzantot
Yash Sharma
Supriyo Chakraborty
Huan Zhang
Cho-Jui Hsieh
Mani B. Srivastava
AAML
19
254
0
28 May 2018
Towards the first adversarially robust neural network model on MNIST
Towards the first adversarially robust neural network model on MNIST
Lukas Schott
Jonas Rauber
Matthias Bethge
Wieland Brendel
AAML
OOD
14
368
0
23 May 2018
Query-Efficient Black-Box Attack Against Sequence-Based Malware
  Classifiers
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
Ishai Rosenberg
A. Shabtai
Yuval Elovici
L. Rokach
AAML
11
11
0
23 Apr 2018
Detecting Adversarial Examples via Neural Fingerprinting
Detecting Adversarial Examples via Neural Fingerprinting
Sumanth Dathathri
Stephan Zheng
Tianwei Yin
Richard M. Murray
Yisong Yue
MLAU
AAML
33
0
0
11 Mar 2018
Previous
123...121314
Next