ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 683 papers shown
Title
Is ReLU Adversarially Robust?
Is ReLU Adversarially Robust?
Korn Sooksatra
Greg Hamerly
Pablo Rivas
135
3
0
06 May 2024
Energy-Latency Manipulation of Multi-modal Large Language Models via
  Verbose Samples
Energy-Latency Manipulation of Multi-modal Large Language Models via Verbose Samples
Kuofeng Gao
Jindong Gu
Yang Bai
Shu-Tao Xia
Juil Sock
Wei Liu
Zhifeng Li
300
17
0
25 Apr 2024
Multimodal Attack Detection for Action Recognition Models
Multimodal Attack Detection for Action Recognition Models
Furkan Mumcu
Yasin Yılmaz
AAML
212
3
0
13 Apr 2024
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial
  Attack
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
298
10
0
08 Apr 2024
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise
  Regression Tasks
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks
Zhiyuan Cheng
Zhaoyi Liu
Tengda Guo
Shiwei Feng
Dongfang Liu
Mingjie Tang
Xiangyu Zhang
AAML
340
6
0
01 Apr 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited
  Black-box Scenario
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Renyang Liu
Kwok-Yan Lam
Wei Zhou
Sixing Wu
Jun Zhao
Dongting Hu
Mingming Gong
AAML
264
1
0
30 Mar 2024
Fully Zeroth-Order Bilevel Programming via Gaussian Smoothing
Fully Zeroth-Order Bilevel Programming via Gaussian Smoothing
Alireza Aghasi
Saeed Ghadimi
221
5
0
29 Mar 2024
ADAPT to Robustify Prompt Tuning Vision Transformers
ADAPT to Robustify Prompt Tuning Vision Transformers
Masih Eskandar
Tooba Imtiaz
Zifeng Wang
Jennifer Dy
VPVLMVLMAAML
398
0
0
19 Mar 2024
LocalStyleFool: Regional Video Style Transfer Attack Using Segment
  Anything Model
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Yuxin Cao
Jinghao Li
Xi Xiao
Derui Wang
Minhui Xue
Hao Ge
Wei Liu
Guangwu Hu
AAML
373
1
0
18 Mar 2024
Benchmarking Zero-Shot Robustness of Multimodal Foundation Models: A
  Pilot Study
Benchmarking Zero-Shot Robustness of Multimodal Foundation Models: A Pilot Study
Chenguang Wang
Ruoxi Jia
Xin Liu
Dawn Song
VLM
189
10
0
15 Mar 2024
Mitigating Dialogue Hallucination for Large Vision Language Models via
  Adversarial Instruction Tuning
Mitigating Dialogue Hallucination for Large Vision Language Models via Adversarial Instruction Tuning
Dongmin Park
Zhaofang Qian
Guangxing Han
Ser-Nam Lim
MLLM
221
1
0
15 Mar 2024
An Image Is Worth 1000 Lies: Adversarial Transferability across Prompts
  on Vision-Language Models
An Image Is Worth 1000 Lies: Adversarial Transferability across Prompts on Vision-Language Models
Haochen Luo
Jindong Gu
Fengyuan Liu
Juil Sock
VLMVPVLMAAML
250
34
0
14 Mar 2024
Counter-Samples: A Stateless Strategy to Neutralize Black Box
  Adversarial Attacks
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial AttacksACM Transactions on Intelligent Systems and Technology (ACM TIST), 2024
Roey Bokobza
Yisroel Mirsky
AAML
165
0
0
14 Mar 2024
Hard-label based Small Query Black-box Adversarial Attack
Hard-label based Small Query Black-box Adversarial AttackIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2024
Jeonghwan Park
Paul Miller
Niall McLaughlin
MLAU
145
11
0
09 Mar 2024
Resilience of Entropy Model in Distributed Neural Networks
Resilience of Entropy Model in Distributed Neural Networks
Milin Zhang
Mohammad Abdi
Shahriar Rifat
Francesco Restuccia
AAML
254
2
0
01 Mar 2024
Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by
  Exploring Refusal Loss Landscapes
Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by Exploring Refusal Loss Landscapes
Xiaomeng Hu
Pin-Yu Chen
Tsung-Yi Ho
AAML
184
48
0
01 Mar 2024
Investigating Deep Watermark Security: An Adversarial Transferability
  Perspective
Investigating Deep Watermark Security: An Adversarial Transferability Perspective
Biqing Qi
Junqi Gao
Yiang Luo
Jianxing Liu
Ligang Wu
Bowen Zhou
AAML
204
4
0
26 Feb 2024
Sparse MeZO: Less Parameters for Better Performance in Zeroth-Order LLM
  Fine-Tuning
Sparse MeZO: Less Parameters for Better Performance in Zeroth-Order LLM Fine-Tuning
Yong Liu
Zirui Zhu
Chaoyu Gong
Minhao Cheng
Cho-Jui Hsieh
Yang You
MoE
222
33
0
24 Feb 2024
BSPA: Exploring Black-box Stealthy Prompt Attacks against Image
  Generators
BSPA: Exploring Black-box Stealthy Prompt Attacks against Image Generators
Yu Tian
Xiao Yang
Yinpeng Dong
Heming Yang
Hang Su
Jun Zhu
AAML
138
8
0
23 Feb 2024
Cost-Adaptive Recourse Recommendation by Adaptive Preference Elicitation
Cost-Adaptive Recourse Recommendation by Adaptive Preference Elicitation
Duy Nguyen
Bao Nguyen
Viet Anh Nguyen
186
0
0
23 Feb 2024
Revisiting Zeroth-Order Optimization for Memory-Efficient LLM
  Fine-Tuning: A Benchmark
Revisiting Zeroth-Order Optimization for Memory-Efficient LLM Fine-Tuning: A Benchmark
Yihua Zhang
Pingzhi Li
Junyuan Hong
Jiaxiang Li
Yimeng Zhang
...
Wotao Yin
Mingyi Hong
Zinan Lin
Sijia Liu
Tianlong Chen
395
94
0
18 Feb 2024
Only My Model On My Data: A Privacy Preserving Approach Protecting one
  Model and Deceiving Unauthorized Black-Box Models
Only My Model On My Data: A Privacy Preserving Approach Protecting one Model and Deceiving Unauthorized Black-Box Models
Weiheng Chai
Brian Testa
Huantao Ren
Asif Salekin
Senem Velipasalar
94
0
0
14 Feb 2024
Understanding Deep Learning defenses Against Adversarial Examples
  Through Visualizations for Dynamic Risk Assessment
Understanding Deep Learning defenses Against Adversarial Examples Through Visualizations for Dynamic Risk Assessment
Xabier Echeberria-Barrio
Amaia Gil-Lerchundi
Jon Egana-Zubia
Raul Orduna Urrutia
AAML
149
8
0
12 Feb 2024
Investigating White-Box Attacks for On-Device Models
Investigating White-Box Attacks for On-Device Models
M. Zhou
Yantao Du
Jing Wu
Kui Liu
Hailong Sun
Li Li
AAML
309
12
0
08 Feb 2024
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted
  Attribute-aware Distribution
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution
Qi Zhou
Donghai Hong
Tianlin Li
Zhihong Xu
Yang Liu
Kui Ren
Wenhai Wang
Qing Guo
AAMLDiffM
179
2
0
06 Feb 2024
Unraveling the Key of Machine Learning Solutions for Android Malware
  Detection
Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Jiahao Liu
Jun Zeng
Fabio Pierazzi
Lorenzo Cavallaro
Zhenkai Liang
AAML
167
11
0
05 Feb 2024
PROSAC: Provably Safe Certification for Machine Learning Models under
  Adversarial Attacks
PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks
Ziquan Liu
Zhuo Zhi
Ilija Bogunovic
Carsten Gerner-Beuerle
Miguel R. D. Rodrigues
AAML
232
2
0
04 Feb 2024
MixedNUTS: Training-Free Accuracy-Robustness Balance via Nonlinearly
  Mixed Classifiers
MixedNUTS: Training-Free Accuracy-Robustness Balance via Nonlinearly Mixed Classifiers
Yatong Bai
Mo Zhou
Vishal M. Patel
Somayeh Sojoudi
AAML
351
16
0
03 Feb 2024
Stochastic Two Points Method for Deep Model Zeroth-order Optimization
Stochastic Two Points Method for Deep Model Zeroth-order Optimization
Yijiang Pang
Jiayu Zhou
403
1
0
02 Feb 2024
Delving into Decision-based Black-box Attacks on Semantic Segmentation
Delving into Decision-based Black-box Attacks on Semantic Segmentation
Zhaoyu Chen
Zhengyang Shan
Jingwen Chang
Kaixun Jiang
Dingkang Yang
Yiting Cheng
Wenqiang Zhang
AAML
157
0
0
02 Feb 2024
Rendering Wireless Environments Useful for Gradient Estimators: A Zero-Order Stochastic Federated Learning Method
Rendering Wireless Environments Useful for Gradient Estimators: A Zero-Order Stochastic Federated Learning Method
Elissa Mhanna
Mohamad Assaad
521
2
0
30 Jan 2024
L-AutoDA: Leveraging Large Language Models for Automated Decision-based
  Adversarial Attacks
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks
Ping Guo
Fei Liu
Xi Lin
Qingchuan Zhao
Qingfu Zhang
304
0
0
27 Jan 2024
Black-Box Access is Insufficient for Rigorous AI Audits
Black-Box Access is Insufficient for Rigorous AI AuditsConference on Fairness, Accountability and Transparency (FAccT), 2024
Stephen Casper
Carson Ezell
Charlotte Siegmann
Noam Kolt
Taylor Lynn Curtis
...
Michael Gerovitch
David Bau
Max Tegmark
David M. Krueger
Dylan Hadfield-Menell
AAML
508
127
0
25 Jan 2024
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
  and the Open Libraries Behind Them
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them
Chao-Jung Liu
Boxi Chen
Wei Shao
Chris Zhang
Kelvin Wong
Yi Zhang
286
7
0
22 Jan 2024
Inducing High Energy-Latency of Large Vision-Language Models with
  Verbose Images
Inducing High Energy-Latency of Large Vision-Language Models with Verbose ImagesInternational Conference on Learning Representations (ICLR), 2024
Kuofeng Gao
Yang Bai
Jindong Gu
Shu-Tao Xia
Juil Sock
Zhifeng Li
Wei Liu
VLM
184
63
0
20 Jan 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive
  Attackers for Security Applications
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
231
1
0
20 Jan 2024
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks
Ping Guo
Xiang Li
Zhiyuan Yang
Xi Lin
Qingchuan Zhao
Qingfu Zhang
AAML
298
4
0
19 Jan 2024
Adversarial Examples are Misaligned in Diffusion Model Manifolds
Adversarial Examples are Misaligned in Diffusion Model ManifoldsIEEE International Joint Conference on Neural Network (IJCNN), 2024
P. Lorenz
Ricard Durall
Jansi Keuper
DiffM
455
1
0
12 Jan 2024
Transferable Learned Image Compression-Resistant Adversarial
  Perturbations
Transferable Learned Image Compression-Resistant Adversarial Perturbations
Yang Sui
Zhuohang Li
Ding Ding
Xiang Pan
Xiaozhong Xu
Shan Liu
Zhenzhong Chen
AAML
125
0
0
06 Jan 2024
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
Meixi Zheng
Xuanchen Yan
Zihao Zhu
Hongrui Chen
Baoyuan Wu
ELMMLAUAAML
402
16
0
28 Dec 2023
Black-Box Tuning of Vision-Language Models with Effective Gradient
  Approximation
Black-Box Tuning of Vision-Language Models with Effective Gradient Approximation
Zixian Guo
Yuxiang Wei
Ming-Yu Liu
Zhilong Ji
Jinfeng Bai
Yiwen Guo
Wangmeng Zuo
VLM
168
9
0
26 Dec 2023
A Malware Classification Survey on Adversarial Attacks and Defences
A Malware Classification Survey on Adversarial Attacks and Defences
Mahesh Ponnuru
Likhitha Amasala
Tanu Sree Bhimavarapu
Guna Chaitanya Garikipati
AAML
101
5
0
15 Dec 2023
AVA: Inconspicuous Attribute Variation-based Adversarial Attack
  bypassing DeepFake Detection
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake DetectionIEEE Symposium on Security and Privacy (S&P), 2023
Xiangtao Meng
Li Wang
Shanqing Guo
Lei Ju
Qingchuan Zhao
AAML
211
15
0
14 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
224
0
0
12 Dec 2023
MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness
MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness
Xiaoyun Xu
Shujian Yu
Jingzheng Wu
S. Picek
AAML
538
7
0
08 Dec 2023
Defense Against Adversarial Attacks using Convolutional Auto-Encoders
Defense Against Adversarial Attacks using Convolutional Auto-Encoders
Shreyasi Mandal
AAML
138
2
0
06 Dec 2023
Generating Visually Realistic Adversarial Patch
Generating Visually Realistic Adversarial Patch
Xiaosen Wang
Kunyu Wang
AAML
181
1
0
05 Dec 2023
InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language
  Models
InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language Models
Xunguang Wang
Zhenlan Ji
Pingchuan Ma
Zongjie Li
Shuai Wang
MLLM
291
19
0
04 Dec 2023
Rethinking PGD Attack: Is Sign Function Necessary?
Rethinking PGD Attack: Is Sign Function Necessary?
Junjie Yang
Tianlong Chen
Xuxi Chen
Zinan Lin
Yingbin Liang
AAML
261
2
0
03 Dec 2023
A Unified Hardware-based Threat Detector for AI Accelerators
A Unified Hardware-based Threat Detector for AI Accelerators
Xiaobei Yan
Han Qiu
Tianwei Zhang
196
2
0
28 Nov 2023
Previous
123456...121314
Next