ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 684 papers shown
Transferable Adversarial Face Attack with Text Controlled Attribute
Transferable Adversarial Face Attack with Text Controlled AttributeAAAI Conference on Artificial Intelligence (AAAI), 2024
Wenyun Li
Zheng Zhang
X. Lan
Shihong Deng
AAML
395
5
0
16 Dec 2024
Robust and Transferable Backdoor Attacks Against Deep Image Compression
  With Selective Frequency Prior
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency PriorIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2024
Yi Yu
Yufei Wang
Wenhan Yang
Lanqing Guo
Shijian Lu
Ling-yu Duan
Yap-Peng Tan
Alex C. Kot
AAML
309
12
0
02 Dec 2024
Hard-Label Black-Box Attacks on 3D Point Clouds
Hard-Label Black-Box Attacks on 3D Point Clouds
Daizong Liu
Yunbo Tao
Pan Zhou
Wei Hu
3DPC
414
7
0
30 Nov 2024
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
Zhi-Yi Chin
Kuan-Chen Mu
Mario Fritz
Pin-Yu Chen
DiffM
491
1
0
25 Nov 2024
Chain of Attack: On the Robustness of Vision-Language Models Against
  Transfer-Based Adversarial Attacks
Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2024
Peng Xie
Yequan Bie
Jianda Mao
Yangqiu Song
Yang Wang
Hao Chen
Kani Chen
AAML
349
7
0
24 Nov 2024
AI-generated Image Detection: Passive or Watermark?
AI-generated Image Detection: Passive or Watermark?
Moyang Guo
Yuepeng Hu
Zhengyuan Jiang
Zeyu Li
Amir Sadovnik
Arka Daw
Neil Zhenqiang Gong
463
4
0
20 Nov 2024
Keep on Swimming: Real Attackers Only Need Partial Knowledge of a
  Multi-Model System
Keep on Swimming: Real Attackers Only Need Partial Knowledge of a Multi-Model System
Julian Collado
Kevin Stangl
AAML
183
0
0
30 Oct 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream ModelsNeural Information Processing Systems (NeurIPS), 2024
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAMLSILM
441
14
0
26 Oct 2024
Detecting Adversarial Examples
Detecting Adversarial Examples
Furkan Mumcu
Yasin Yilmaz
AAML
260
4
0
22 Oct 2024
Model Mimic Attack: Knowledge Distillation for Provably Transferable
  Adversarial Examples
Model Mimic Attack: Knowledge Distillation for Provably Transferable Adversarial Examples
Kirill Lukyanov
Andrew Perminov
D. Turdakov
Mikhail Pautov
AAML
169
3
0
21 Oct 2024
Sharpness-Aware Black-Box Optimization
Sharpness-Aware Black-Box Optimization
Feiyang Ye
Yueming Lyu
Xuehao Wang
Masashi Sugiyama
Yu Zhang
Ivor W. Tsang
AAML
367
4
0
16 Oct 2024
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in
  Frequency Domain
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency DomainNeural Information Processing Systems (NeurIPS), 2024
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
280
4
0
16 Oct 2024
Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML
  Through the Lens of Evasion Attacks
Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML Through the Lens of Evasion Attacks
Kevin Eykholt
Farhan Ahmed
Pratik Vaishnavi
Amir Rahmati
AAML
283
1
0
15 Oct 2024
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object
  Detectors
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object DetectorsEuropean Conference on Computer Vision (ECCV), 2024
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
AAML
271
2
0
14 Oct 2024
From Transparency to Accountability and Back: A Discussion of Access and
  Evidence in AI Auditing
From Transparency to Accountability and Back: A Discussion of Access and Evidence in AI AuditingConference on Equity and Access in Algorithms, Mechanisms, and Optimization (EAAMO), 2024
Sarah H. Cen
Rohan Alur
265
10
0
07 Oct 2024
On the Adversarial Risk of Test Time Adaptation: An Investigation into Realistic Test-Time Data Poisoning
On the Adversarial Risk of Test Time Adaptation: An Investigation into Realistic Test-Time Data PoisoningInternational Conference on Learning Representations (ICLR), 2024
Yongyi Su
Yushu Li
Nanqing Liu
Kui Jia
Xulei Yang
Chuan-Sheng Foo
Xun Xu
TTAAAML
479
2
0
07 Oct 2024
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future ProspectsIEEE Access (IEEE Access), 2024
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
495
14
0
27 Sep 2024
A Survey on Offensive AI Within Cybersecurity
A Survey on Offensive AI Within Cybersecurity
Sahil Girhepuje
Aviral Verma
Gaurav Raina
AAML
160
7
0
26 Sep 2024
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers
  via Feature Substitution
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers via Feature SubstitutionBigData Congress [Services Society] (BSS), 2024
Kiana Vu
Phung Lai
Truc D. T. Nguyen
AAML
195
1
0
13 Sep 2024
Adversarial Attacks on Data Attribution
Adversarial Attacks on Data AttributionInternational Conference on Learning Representations (ICLR), 2024
Xinhe Wang
Pingbang Hu
Junwei Deng
Jiaqi W. Ma
TDI
597
0
0
09 Sep 2024
Robust off-policy Reinforcement Learning via Soft Constrained Adversary
Robust off-policy Reinforcement Learning via Soft Constrained Adversary
Kosuke Nakanishi
Akihiro Kubo
Yuji Yasui
Shin Ishii
270
1
0
31 Aug 2024
On the Robustness of Kolmogorov-Arnold Networks: An Adversarial Perspective
On the Robustness of Kolmogorov-Arnold Networks: An Adversarial Perspective
Tal Alter
Raz Lapid
Moshe Sipper
AAML
473
14
0
25 Aug 2024
Segment-Anything Models Achieve Zero-shot Robustness in Autonomous
  Driving
Segment-Anything Models Achieve Zero-shot Robustness in Autonomous Driving
Jun Yan
Pengyu Wang
Danni Wang
Weiquan Huang
Daniel Watzenig
Huilin Yin
AAMLVLM
214
6
0
19 Aug 2024
Constructing Adversarial Examples for Vertical Federated Learning:
  Optimal Client Corruption through Multi-Armed Bandit
Constructing Adversarial Examples for Vertical Federated Learning: Optimal Client Corruption through Multi-Armed BanditInternational Conference on Learning Representations (ICLR), 2024
Duanyi Yao
Songze Li
Ye Xue
Jin Liu
FedMLAAML
181
4
0
08 Aug 2024
SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on
  Physically-Unclonable Identifiers of Paper Surface
SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on Physically-Unclonable Identifiers of Paper Surface
Anirudh Nakra
Min Wu
Chau-Wai Wong
232
0
0
05 Aug 2024
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial
  Contrastive Prompt Tuning
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt TuningACM Multimedia (MM), 2024
Xin Wang
Kai-xiang Chen
Jiabo He
Zhineng Chen
Yue Yu
Yu-Gang Jiang
AAML
296
10
0
04 Aug 2024
Guardians of Image Quality: Benchmarking Defenses Against Adversarial Attacks on Image Quality Metrics
Guardians of Image Quality: Benchmarking Defenses Against Adversarial Attacks on Image Quality Metrics
Alexander Gushchin
Khaled Abud
Georgii Bychkov
E. Shumitskaya
Anna Chistyakova
Sergey Lavrushkin
Bader Rasheed
Kirill Malyshev
D. Vatolin
Anastasia Antsiferova
AAML
329
4
0
02 Aug 2024
Resilience and Security of Deep Neural Networks Against Intentional and
  Unintentional Perturbations: Survey and Research Challenges
Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges
Sazzad Sayyed
Milin Zhang
Shahriar Rifat
A. Swami
Michael De Lucia
Francesco Restuccia
464
2
0
31 Jul 2024
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers
Camilo A. Mart´ınez-Mej´ıa
Jesus Solano
J. Breier
Dominik Bucko
Xiaolu Hou
AAML
187
0
0
30 Jul 2024
Preventing Catastrophic Overfitting in Fast Adversarial Training: A
  Bi-level Optimization Perspective
Preventing Catastrophic Overfitting in Fast Adversarial Training: A Bi-level Optimization Perspective
Zhaoxin Wang
Handing Wang
Cong Tian
Yaochu Jin
AAML
247
8
0
17 Jul 2024
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled
  Images
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images
Mingyuan Fan
Yang Liu
Cen Chen
Ximeng Liu
AAML
123
0
0
13 Jul 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against
  Face Recognition Systems
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Yuxin Cao
Yumeng Zhu
Derui Wang
Sheng Wen
Minhui Xue
Jin Lu
Hao Ge
AAML
230
2
0
11 Jul 2024
A Comprehensive Survey on the Security of Smart Grid: Challenges,
  Mitigations, and Future Research Opportunities
A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities
Arastoo Zibaeirad
Farnoosh Koleini
Shengping Bi
Tao Hou
Tao Wang
AAML
231
36
0
10 Jul 2024
DLOVE: A new Security Evaluation Tool for Deep Learning Based
  Watermarking Techniques
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques
Sudev Kumar Padhi
Sk. Subidh Ali
AAML
206
0
0
09 Jul 2024
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Feilong Wang
Xin Wang
X. Ban
AAML
208
26
0
06 Jul 2024
$L_p$-norm Distortion-Efficient Adversarial Attack
LpL_pLp​-norm Distortion-Efficient Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Zi-Jia Wang
Xiangui Kang
167
0
0
03 Jul 2024
Query-Efficient Hard-Label Black-Box Attack against Vision Transformers
Query-Efficient Hard-Label Black-Box Attack against Vision Transformers
Chao Zhou
Xiaowen Shi
Yuan-Gen Wang
ViTAAML
215
1
0
29 Jun 2024
On Discrete Prompt Optimization for Diffusion Models
On Discrete Prompt Optimization for Diffusion Models
Ruochen Wang
Ting Liu
Cho-Jui Hsieh
Boqing Gong
DiffM
269
20
0
27 Jun 2024
Communication-Efficient Byzantine-Resilient Federated Zero-Order
  Optimization
Communication-Efficient Byzantine-Resilient Federated Zero-Order Optimization
Afonso de Sá Delgado Neto
Maximilian Egger
Mayank Bakshi
Rawad Bitar
FedMLAI4CE
133
3
0
20 Jun 2024
Enhancing robustness of data-driven SHM models: adversarial training
  with circle loss
Enhancing robustness of data-driven SHM models: adversarial training with circle loss
Xiangli Yang
Xijie Deng
Hanwei Zhang
Yang Zou
Jianxi Yang
AAML
176
1
0
20 Jun 2024
Perturbation Towards Easy Samples Improves Targeted Adversarial
  Transferability
Perturbation Towards Easy Samples Improves Targeted Adversarial TransferabilityNeural Information Processing Systems (NeurIPS), 2024
Junqi Gao
Biqing Qi
Yao Li
Zhichang Guo
Dong Li
Yuming Xing
Dazhi Zhang
AAML
236
9
0
08 Jun 2024
One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models
One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models
Hao Fang
Jiawei Kong
Wenbo Yu
Bin Chen
Jiawei Li
Hao Wu
Ke Xu
Ke Xu
AAMLVLM
421
27
0
08 Jun 2024
ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial
  Attacks
ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial AttacksAAAI Conference on Artificial Intelligence (AAAI), 2024
Feiyang Wang
Xingquan Zuo
Hai Huang
Gang Chen
AAML
314
9
0
07 Jun 2024
DifAttack++: Query-Efficient Black-Box Adversarial Attack via
  Hierarchical Disentangled Feature Space in Cross-Domain
DifAttack++: Query-Efficient Black-Box Adversarial Attack via Hierarchical Disentangled Feature Space in Cross-Domain
Jun Liu
Jiantao Zhou
Jiandian Zeng
Jinyu Tian
Zheng Li
342
0
0
05 Jun 2024
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided
  by a Function Prior
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior
Shuyu Cheng
Yibo Miao
Yinpeng Dong
Xiao Yang
Xiao-Shan Gao
Jun Zhu
AAML
215
7
0
29 May 2024
Learning to Transform Dynamically for Better Adversarial Transferability
Learning to Transform Dynamically for Better Adversarial TransferabilityComputer Vision and Pattern Recognition (CVPR), 2024
Rongyi Zhu
Zeliang Zhang
Susan Liang
Zhuo Liu
Chenliang Xu
AAML
499
31
0
23 May 2024
Configurable Mirror Descent: Towards a Unification of Decision Making
Configurable Mirror Descent: Towards a Unification of Decision Making
Pengdeng Li
Shuxin Li
Chang Yang
Xinrun Wang
Shuyue Hu
Yi-Ju Chang
Hau Chan
Bo An
277
1
0
20 May 2024
Adversarial Robustness for Visual Grounding of Multimodal Large Language
  Models
Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
Kuofeng Gao
Yang Bai
Jiawang Bai
Yong Yang
Shu-Tao Xia
AAML
245
25
0
16 May 2024
SpeechGuard: Exploring the Adversarial Robustness of Multimodal Large
  Language Models
SpeechGuard: Exploring the Adversarial Robustness of Multimodal Large Language ModelsAnnual Meeting of the Association for Computational Linguistics (ACL), 2024
Raghuveer Peri
Sai Muralidhar Jayanthi
S. Ronanki
Anshu Bhatia
Karel Mundnich
...
Srikanth Vishnubhotla
Daniel Garcia-Romero
S. Srinivasan
Kyu J. Han
Katrin Kirchhoff
AAML
283
7
0
14 May 2024
Sparse-PGD: A Unified Framework for Sparse Adversarial Perturbations Generation
Sparse-PGD: A Unified Framework for Sparse Adversarial Perturbations GenerationIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2024
Xuyang Zhong
Yixiao Huang
AAML
406
0
0
08 May 2024
Previous
12345...121314
Next