ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information

Black-box Adversarial Attacks with Limited Queries and Information

23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 651 papers shown
Title
A Review of Adversarial Attacks in Computer Vision
A Review of Adversarial Attacks in Computer Vision
Yutong Zhang
Yao Li
Yin Li
Zhichang Guo
AAML
19
3
0
15 Aug 2023
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D
  Point Cloud Attack
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
Yunbo Tao
Daizong Liu
Pan Zhou
Yulai Xie
Wei Du
Wei Hu
3DPC
AAML
19
11
0
15 Aug 2023
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network
  Intrusion Detection
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection
João Vitorino
Isabel Praça
Eva Maia
AAML
28
22
0
13 Aug 2023
On the Interplay of Convolutional Padding and Adversarial Robustness
On the Interplay of Convolutional Padding and Adversarial Robustness
Paul Gavrikov
J. Keuper
AAML
23
3
0
12 Aug 2023
Symmetry Defense Against XGBoost Adversarial Perturbation Attacks
Symmetry Defense Against XGBoost Adversarial Perturbation Attacks
Blerta Lindqvist
AAML
35
0
0
10 Aug 2023
Enhancing Adversarial Robustness in Low-Label Regime via Adaptively
  Weighted Regularization and Knowledge Distillation
Enhancing Adversarial Robustness in Low-Label Regime via Adaptively Weighted Regularization and Knowledge Distillation
Dongyoon Yang
Insung Kong
Yongdai Kim
31
4
0
08 Aug 2023
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity
  Deep Hiding
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding
Hangcheng Liu
Tao Xiang
Shangwei Guo
Han Li
Tianwei Zhang
Xiaofeng Liao
18
5
0
03 Aug 2023
Mirror Natural Evolution Strategies
Mirror Natural Evolution Strategies
Haishan Ye
14
2
0
01 Aug 2023
Theoretically Principled Trade-off for Stateful Defenses against
  Query-Based Black-Box Attacks
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Ashish Hooda
Neal Mangaokar
Ryan Feng
Kassem Fawaz
S. Jha
Atul Prakash
AAML
13
3
0
30 Jul 2023
Towards Building More Robust Models with Frequency Bias
Towards Building More Robust Models with Frequency Bias
Qingwen Bu
Dong Huang
Heming Cui
AAML
15
10
0
19 Jul 2023
On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Akshay Mehra
Yunbei Zhang
B. Kailkhura
Jihun Hamm
25
2
0
17 Jul 2023
Vulnerability-Aware Instance Reweighting For Adversarial Training
Vulnerability-Aware Instance Reweighting For Adversarial Training
Olukorede Fakorede
Ashutosh Nirala
Modeste Atsague
Jin Tian
AAML
17
2
0
14 Jul 2023
Query-Efficient Decision-based Black-Box Patch Attack
Query-Efficient Decision-based Black-Box Patch Attack
Zhaoyu Chen
Bo-wen Li
Shuang Wu
Shouhong Ding
Wenqiang Zhang
AAML
16
33
0
02 Jul 2023
Neural Polarizer: A Lightweight and Effective Backdoor Defense via
  Purifying Poisoned Features
Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
H. Zha
Baoyuan Wu
AAML
30
37
0
29 Jun 2023
Document Image Cleaning using Budget-Aware Black-Box Approximation
Document Image Cleaning using Budget-Aware Black-Box Approximation
Ganesh Tata
Katyani Singh
E. V. Oeveren
Nilanjan Ray
AAML
15
0
0
22 Jun 2023
Visual Adversarial Examples Jailbreak Aligned Large Language Models
Visual Adversarial Examples Jailbreak Aligned Large Language Models
Xiangyu Qi
Kaixuan Huang
Ashwinee Panda
Peter Henderson
Mengdi Wang
Prateek Mittal
AAML
23
137
0
22 Jun 2023
Rethinking the Backward Propagation for Adversarial Transferability
Rethinking the Backward Propagation for Adversarial Transferability
Xiaosen Wang
Kangheng Tong
Kun He
AAML
SILM
17
25
0
22 Jun 2023
HumanDiffusion: diffusion model using perceptual gradients
HumanDiffusion: diffusion model using perceptual gradients
Yota Ueda
Shinnosuke Takamichi
Yuki Saito
Norihiro Takamune
Hiroshi Saruwatari
DiffM
11
0
0
21 Jun 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
23
11
0
21 Jun 2023
Wasserstein distributional robustness of neural networks
Wasserstein distributional robustness of neural networks
Xingjian Bai
Guangyi He
Yifan Jiang
J. Obłój
OOD
AAML
16
6
0
16 Jun 2023
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models
Raz Lapid
Moshe Sipper
AAML
19
17
0
13 Jun 2023
Faithful Knowledge Distillation
Faithful Knowledge Distillation
Tom A. Lamb
Rudy Bunel
Krishnamurthy Dvijotham
M. P. Kumar
Philip H. S. Torr
Francisco Eiras
AAML
17
0
0
07 Jun 2023
On Evaluating Adversarial Robustness of Large Vision-Language Models
On Evaluating Adversarial Robustness of Large Vision-Language Models
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Chongxuan Li
Ngai-man Cheung
Min-Bin Lin
VLM
AAML
MLLM
19
166
0
26 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
37
49
0
18 May 2023
Improving Adversarial Transferability via Intermediate-level
  Perturbation Decay
Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
16
18
0
26 Apr 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing-Wu Guo
Yihao Huang
Xiaofei Xie
L. Ma
Jianjun Zhao
AAML
26
47
0
23 Apr 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
37
18
0
20 Apr 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
29
4
0
13 Apr 2023
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via
  User-configurable Privacy Defense
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense
Yue-li Cui
Syed Imran Ali Meerza
Zhuohang Li
Luyang Liu
Jiaxin Zhang
Jian-Dong Liu
AAML
FedML
21
4
0
11 Apr 2023
Certifiable Black-Box Attacks with Randomized Adversarial Examples:
  Breaking Defenses with Provable Confidence
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
Hanbin Hong
Xinyu Zhang
Binghui Wang
Zhongjie Ba
Yuan Hong
AAML
22
2
0
10 Apr 2023
A Certified Radius-Guided Attack Framework to Image Segmentation Models
A Certified Radius-Guided Attack Framework to Image Segmentation Models
Wenjie Qu
Youqi Li
Binghui Wang
AAML
13
5
0
05 Apr 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
M. Salman Asif
AAML
25
14
0
25 Mar 2023
An Extended Study of Human-like Behavior under Adversarial Training
An Extended Study of Human-like Behavior under Adversarial Training
Paul Gavrikov
J. Keuper
M. Keuper
AAML
28
9
0
22 Mar 2023
Reliable and Efficient Evaluation of Adversarial Robustness for Deep
  Hashing-Based Retrieval
Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Xunguang Wang
Jiawang Bai
Xin-Chao Xu
X. Li
AAML
10
1
0
22 Mar 2023
Efficient Decision-based Black-box Patch Attacks on Video Recognition
Efficient Decision-based Black-box Patch Attacks on Video Recognition
Kaixun Jiang
Zhaoyu Chen
Tony Huang
Jiafeng Wang
Dingkang Yang
Bo-wen Li
Yan Wang
Wenqiang Zhang
AAML
17
21
0
21 Mar 2023
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Yuguang Yao
Jiancheng Liu
Yifan Gong
Xiaoming Liu
Yanzhi Wang
X. Lin
Sijia Liu
AAML
MLAU
26
1
0
13 Mar 2023
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against
  Black-box Attacks
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks
Ryan Feng
Ashish Hooda
Neal Mangaokar
Kassem Fawaz
S. Jha
Atul Prakash
AAML
60
11
0
11 Mar 2023
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional
  Gradient Estimation
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional Gradient Estimation
Geunhyeok Yu
Minwoo Jeon
Hyoseok Hwang
AAML
21
1
0
09 Mar 2023
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial
  Attacks on Object Detectors
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial Attacks on Object Detectors
Raz Lapid
Eylon Mizrahi
Moshe Sipper
AAML
26
1
0
07 Mar 2023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency
  Trigger
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Yi Yu
Yufei Wang
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
63
41
0
28 Feb 2023
Adversarial Attack with Raindrops
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
13
18
0
28 Feb 2023
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign
  Recognition: A Feasibility Study
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign Recognition: A Feasibility Study
Fabian Woitschek
G. Schneider
AAML
30
9
0
27 Feb 2023
Automatic Prompt Augmentation and Selection with Chain-of-Thought from
  Labeled Data
Automatic Prompt Augmentation and Selection with Chain-of-Thought from Labeled Data
Kashun Shum
Shizhe Diao
Tong Zhang
ReLM
LRM
28
128
0
24 Feb 2023
MalProtect: Stateful Defense Against Adversarial Query Attacks in
  ML-based Malware Detection
MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
30
8
0
21 Feb 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
24
1
0
21 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
An End-to-End Framework for Marketing Effectiveness Optimization under
  Budget Constraint
An End-to-End Framework for Marketing Effectiveness Optimization under Budget Constraint
Ziang Yan
Shusen Wang
Guorui Zhou
Jingjian Lin
Peng Jiang
OffRL
13
8
0
09 Feb 2023
Shortcut Detection with Variational Autoencoders
Shortcut Detection with Variational Autoencoders
Nicolas M. Muller
Simon Roschmann
Shahbaz Khan
Philip Sperl
Konstantin Böttinger
AAML
DRL
29
1
0
08 Feb 2023
Black Box Adversarial Prompting for Foundation Models
Black Box Adversarial Prompting for Foundation Models
N. Maus
Patrick Chao
Eric Wong
Jacob R. Gardner
VLM
22
56
0
08 Feb 2023
CosPGD: an efficient white-box adversarial attack for pixel-wise
  prediction tasks
CosPGD: an efficient white-box adversarial attack for pixel-wise prediction tasks
Shashank Agnihotri
Steffen Jung
M. Keuper
AAML
29
21
0
04 Feb 2023
Previous
12345...121314
Next