ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

33 / 683 papers shown
Title
The Efficacy of SHIELD under Different Threat Models
The Efficacy of SHIELD under Different Threat Models
Cory Cornelius
Nilaksh Das
Shang-Tse Chen
Li Chen
Michael E. Kounavis
Duen Horng Chau
AAML
171
11
0
01 Feb 2019
Robustness Certificates Against Adversarial Examples for ReLU Networks
Robustness Certificates Against Adversarial Examples for ReLU Networks
Sahil Singla
Soheil Feizi
AAML
134
21
0
01 Feb 2019
Black Box Submodular Maximization: Discrete and Continuous Settings
Black Box Submodular Maximization: Discrete and Continuous Settings
Lin Chen
Mingrui Zhang
Hamed Hassani
Amin Karbasi
160
17
0
28 Jan 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffMAAML
212
39
0
26 Jan 2019
Characterizing and evaluating adversarial examples for Offline
  Handwritten Signature Verification
Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification
L. G. Hafemann
R. Sabourin
Luiz Eduardo Soares de Oliveira
AAML
114
50
0
10 Jan 2019
Adversarial CAPTCHAs
Adversarial CAPTCHAs
Chenghui Shi
Xiaohan Li
S. Ji
Kai Bu
Jianhai Chen
Jiliang Li
Ting Wang
AAML
127
56
0
04 Jan 2019
Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack
Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack
Haishan Ye
Zhichao Huang
Cong Fang
C. J. Li
Tong Zhang
AAML
200
39
0
29 Dec 2018
Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial
  Attacks
Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks
T. Brunner
Frederik Diehl
Michael Truong-Le
Alois Knoll
MLAUAAML
173
124
0
24 Dec 2018
Towards resilient machine learning for ransomware detection
Towards resilient machine learning for ransomware detection
Li-Wei Chen
Chih-Yuan Yang
Anindya Paul
R. Sahita
AAML
116
22
0
21 Dec 2018
Knockoff Nets: Stealing Functionality of Black-Box Models
Knockoff Nets: Stealing Functionality of Black-Box Models
Tribhuvanesh Orekondy
Bernt Schiele
Mario Fritz
MLAU
259
595
0
06 Dec 2018
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAMLOOD
564
301
0
03 Dec 2018
CNN-Cert: An Efficient Framework for Certifying Robustness of
  Convolutional Neural Networks
CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks
Akhilan Boopathy
Tsui-Wei Weng
Pin-Yu Chen
Sijia Liu
Luca Daniel
AAML
275
145
0
29 Nov 2018
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Jinghui Chen
Dongruo Zhou
Jinfeng Yi
Quanquan Gu
AAML
259
75
0
27 Nov 2018
ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and
  Robust Accuracies
ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and Robust Accuracies
Bao Wang
Binjie Yuan
Zuoqiang Shi
Stanley J. Osher
AAMLOOD
137
15
0
26 Nov 2018
A note on hyperparameters in black-box adversarial examples
A note on hyperparameters in black-box adversarial examples
Jamie Hayes
AAMLMLAU
45
0
0
15 Nov 2018
Mathematical Analysis of Adversarial Attacks
Mathematical Analysis of Adversarial Attacks
Zehao Dou
Stanley J. Osher
Bao Wang
AAML
107
19
0
15 Nov 2018
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine LearningConference on Computer and Communications Security (CCS), 2018
K. Makarychev
Pascal Dupré
Yury Makarychev
Giancarlo Pellegrino
Dan Boneh
AAML
231
65
0
08 Nov 2018
Attack Graph Convolutional Networks by Adding Fake Nodes
Attack Graph Convolutional Networks by Adding Fake Nodes
Xiaoyun Wang
Minhao Cheng
Joe Eaton
Cho-Jui Hsieh
S. F. Wu
AAMLGNN
299
83
0
25 Oct 2018
Security Analysis of Deep Neural Networks Operating in the Presence of
  Cache Side-Channel Attacks
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
Sanghyun Hong
Michael Davinroy
Yigitcan Kaya
S. Locke
Ian Rackow
Kevin Kulda
Dana Dachman-Soled
Tudor Dumitras
MIACV
153
94
0
08 Oct 2018
Can Adversarially Robust Learning Leverage Computational Hardness?
Can Adversarially Robust Learning Leverage Computational Hardness?
Saeed Mahloujifar
Mohammad Mahmoody
AAMLOOD
124
49
0
02 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
204
49
0
02 Oct 2018
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural
  Network
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Xuanqing Liu
Yao Li
Chongruo Wu
Cho-Jui Hsieh
AAMLOOD
254
181
0
01 Oct 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial PerturbationConference on Uncertainty in Artificial Intelligence (UAI), 2018
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
230
186
0
24 Sep 2018
Adversarial Defense via Data Dependent Activation Function and Total
  Variation Minimization
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Bao Wang
A. Lin
Weizhi Zhu
Penghang Yin
Andrea L. Bertozzi
Stanley J. Osher
AAML
116
21
0
23 Sep 2018
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Yali Du
Meng Fang
Jinfeng Yi
Jun Cheng
Dacheng Tao
AAML
141
21
0
09 Sep 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
167
306
0
16 Aug 2018
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Prior Convictions: Black-Box Adversarial Attacks with Bandits and PriorsInternational Conference on Learning Representations (ICLR), 2018
Andrew Ilyas
Logan Engstrom
Aleksander Madry
MLAUAAML
297
405
0
20 Jul 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based
  Approach
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
221
366
0
12 Jul 2018
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
MLAUAAML
295
429
0
30 May 2018
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
M. Alzantot
Yash Sharma
Supriyo Chakraborty
Huan Zhang
Cho-Jui Hsieh
Mani B. Srivastava
AAML
299
278
0
28 May 2018
Towards the first adversarially robust neural network model on MNIST
Towards the first adversarially robust neural network model on MNIST
Lukas Schott
Jonas Rauber
Matthias Bethge
Wieland Brendel
AAMLOOD
311
380
0
23 May 2018
Query-Efficient Black-Box Attack Against Sequence-Based Malware
  Classifiers
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
Ishai Rosenberg
A. Shabtai
Yuval Elovici
Lior Rokach
AAML
263
11
0
23 Apr 2018
Detecting Adversarial Examples via Neural Fingerprinting
Detecting Adversarial Examples via Neural Fingerprinting
Sumanth Dathathri
Stephan Zheng
Tianwei Yin
Richard M. Murray
Yisong Yue
MLAUAAML
160
0
0
11 Mar 2018
Previous
123...121314