ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 682 papers shown
Title
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models
Raz Lapid
Moshe Sipper
AAML
191
23
0
13 Jun 2023
Faithful Knowledge Distillation
Faithful Knowledge Distillation
Tom A. Lamb
Rudy Bunel
Krishnamurthy Dvijotham
M. P. Kumar
Juil Sock
Francisco Eiras
AAML
149
0
0
07 Jun 2023
On Evaluating Adversarial Robustness of Large Vision-Language Models
On Evaluating Adversarial Robustness of Large Vision-Language ModelsNeural Information Processing Systems (NeurIPS), 2023
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Chongxuan Li
Ngai-Man Cheung
Min Lin
VLMAAMLMLLM
442
255
0
26 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & DefensesIEEE Access (IEEE Access), 2023
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
346
104
0
18 May 2023
Improving Adversarial Transferability via Intermediate-level
  Perturbation Decay
Improving Adversarial Transferability via Intermediate-level Perturbation DecayNeural Information Processing Systems (NeurIPS), 2023
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
289
34
0
26 Apr 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical ConsistencyComputer Vision and Pattern Recognition (CVPR), 2023
Yang Hou
Qing Guo
Yihao Huang
Xiaofei Xie
Lei Ma
Jianjun Zhao
AAML
283
66
0
23 Apr 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial TransferabilityBritish Machine Vision Conference (BMVC), 2023
Zhiyuan Wang
Zeliang Zhang
Yaning Tan
Xiaosen Wang
AAML
315
25
0
20 Apr 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
281
7
0
13 Apr 2023
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via
  User-configurable Privacy Defense
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy DefenseACM Asia Conference on Computer and Communications Security (AsiaCCS), 2023
Yue-li Cui
Syed Imran Ali Meerza
Zhuohang Li
Luyang Liu
Jiaxin Zhang
Jian-Dong Liu
AAMLFedML
183
5
0
11 Apr 2023
Certifiable Black-Box Attacks with Randomized Adversarial Examples:
  Breaking Defenses with Provable Confidence
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable ConfidenceConference on Computer and Communications Security (CCS), 2023
Hanbin Hong
Xinyu Zhang
Binghui Wang
Zhongjie Ba
Yuan Hong
AAML
236
6
0
10 Apr 2023
A Certified Radius-Guided Attack Framework to Image Segmentation Models
A Certified Radius-Guided Attack Framework to Image Segmentation ModelsEuropean Symposium on Security and Privacy (Euro S&P), 2023
Wenjie Qu
Youqi Li
Binghui Wang
AAML
148
5
0
05 Apr 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense PredictionComputer Vision and Pattern Recognition (CVPR), 2023
Zikui Cai
Yaoteng Tan
M. Salman Asif
AAML
163
29
0
25 Mar 2023
An Extended Study of Human-like Behavior under Adversarial Training
An Extended Study of Human-like Behavior under Adversarial Training
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
152
11
0
22 Mar 2023
Reliable and Efficient Evaluation of Adversarial Robustness for Deep
  Hashing-Based Retrieval
Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Xunguang Wang
Jiawang Bai
Xin-Chao Xu
Xuelong Li
AAML
183
1
0
22 Mar 2023
Efficient Decision-based Black-box Patch Attacks on Video Recognition
Efficient Decision-based Black-box Patch Attacks on Video RecognitionIEEE International Conference on Computer Vision (ICCV), 2023
Kaixun Jiang
Zhaoyu Chen
Tony Huang
Jiafeng Wang
Dingkang Yang
Yue Liu
Yan Wang
Wenqiang Zhang
AAML
234
28
0
21 Mar 2023
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?IEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2023
Yuguang Yao
Jiancheng Liu
Yifan Gong
Xiaoming Liu
Yanzhi Wang
Xinyu Lin
Sijia Liu
AAMLMLAU
246
1
0
13 Mar 2023
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against
  Black-box Attacks
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box AttacksConference on Computer and Communications Security (CCS), 2023
Ryan Feng
Ashish Hooda
Neal Mangaokar
Kassem Fawaz
S. Jha
Atul Prakash
AAML
229
14
0
11 Mar 2023
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional
  Gradient Estimation
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional Gradient Estimation
Geunhyeok Yu
Minwoo Jeon
Hyoseok Hwang
AAML
187
1
0
09 Mar 2023
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial
  Attacks on Object Detectors
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial Attacks on Object Detectors
Raz Lapid
Eylon Mizrahi
Moshe Sipper
AAML
285
3
0
07 Mar 2023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency
  Trigger
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency TriggerComputer Vision and Pattern Recognition (CVPR), 2023
Yi Yu
Yufei Wang
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
287
57
0
28 Feb 2023
Adversarial Attack with Raindrops
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
196
22
0
28 Feb 2023
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign
  Recognition: A Feasibility Study
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign Recognition: A Feasibility Study
Fabian Woitschek
G. Schneider
AAML
176
13
0
27 Feb 2023
Automatic Prompt Augmentation and Selection with Chain-of-Thought from
  Labeled Data
Automatic Prompt Augmentation and Selection with Chain-of-Thought from Labeled DataConference on Empirical Methods in Natural Language Processing (EMNLP), 2023
Kashun Shum
Shizhe Diao
Tong Zhang
ReLMLRM
406
174
0
24 Feb 2023
MalProtect: Stateful Defense Against Adversarial Query Attacks in
  ML-based Malware Detection
MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-based Malware DetectionIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Aqib Rashid
Jose Such
AAML
366
14
0
21 Feb 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
147
2
0
21 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
429
32
0
19 Feb 2023
An End-to-End Framework for Marketing Effectiveness Optimization under
  Budget Constraint
An End-to-End Framework for Marketing Effectiveness Optimization under Budget Constraint
Ziang Yan
Shusen Wang
Guorui Zhou
Jingjian Lin
Peng Jiang
OffRL
95
10
0
09 Feb 2023
Shortcut Detection with Variational Autoencoders
Shortcut Detection with Variational AutoencodersIEEE International Joint Conference on Neural Network (IJCNN), 2023
Nicolas Müller
Simon Roschmann
Shahbaz Khan
Philip Sperl
Konstantin Böttinger
AAMLDRL
211
2
0
08 Feb 2023
Black Box Adversarial Prompting for Foundation Models
Black Box Adversarial Prompting for Foundation Models
Natalie Maus
Patrick Chao
Eric Wong
Jacob R. Gardner
VLM
225
72
0
08 Feb 2023
CosPGD: an efficient white-box adversarial attack for pixel-wise
  prediction tasks
CosPGD: an efficient white-box adversarial attack for pixel-wise prediction tasksInternational Conference on Machine Learning (ICML), 2023
Shashank Agnihotri
Steffen Jung
Margret Keuper
AAML
333
29
0
04 Feb 2023
Effectiveness of Moving Target Defenses for Adversarial Attacks in
  ML-based Malware Detection
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-based Malware DetectionIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Aqib Rashid
Jose Such
AAML
160
4
0
01 Feb 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual
  Example
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
184
4
0
30 Jan 2023
Improving the Accuracy-Robustness Trade-Off of Classifiers via Adaptive
  Smoothing
Improving the Accuracy-Robustness Trade-Off of Classifiers via Adaptive SmoothingSIAM Journal on Mathematics of Data Science (SIMODS), 2023
Yatong Bai
Brendon G. Anderson
Aerin Kim
Somayeh Sojoudi
AAML
341
22
0
29 Jan 2023
Semantic Adversarial Attacks on Face Recognition through Significant
  Attributes
Semantic Adversarial Attacks on Face Recognition through Significant AttributesInternational Journal of Computational Intelligence Systems (IJCIS), 2023
Yasmeen M. Khedr
Yifeng Xiong
Kun He
AAML
249
2
0
28 Jan 2023
Adapting Step-size: A Unified Perspective to Analyze and Improve
  Gradient-based Methods for Adversarial Attacks
Adapting Step-size: A Unified Perspective to Analyze and Improve Gradient-based Methods for Adversarial Attacks
Wei Tao
Lei Bao
Long Sheng
Gao-wei Wu
Qing Tao
AAML
159
2
0
27 Jan 2023
On the feasibility of attacking Thai LPR systems with adversarial
  examples
On the feasibility of attacking Thai LPR systems with adversarial examples
Chissanupong Jiamsuchon
Jakapan Suaboot
Norrathep Rattanavipanon
AAML
86
0
0
13 Jan 2023
AdvBiom: Adversarial Attacks on Biometric Matchers
AdvBiom: Adversarial Attacks on Biometric Matchers
Debayan Deb
Vishesh Mistry
Rahul Parthe
AAMLCVBM
148
3
0
10 Jan 2023
Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus
  on Videos
Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus on VideosIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2023
Xingxing Wei
Songping Wang
Huanqian Yan
AAML
285
24
0
03 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta LearningIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2023
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
235
48
0
01 Jan 2023
Publishing Efficient On-device Models Increases Adversarial
  Vulnerability
Publishing Efficient On-device Models Increases Adversarial Vulnerability
Sanghyun Hong
Nicholas Carlini
Alexey Kurakin
AAML
145
4
0
28 Dec 2022
Learning When to Use Adaptive Adversarial Image Perturbations against
  Autonomous Vehicles
Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous VehiclesIEEE Robotics and Automation Letters (RA-L), 2022
Hyung-Jin Yoon
H. Jafarnejadsani
P. Voulgaris
AAML
162
10
0
28 Dec 2022
Simultaneously Optimizing Perturbations and Positions for Black-box
  Adversarial Patch Attacks
Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch AttacksIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Xingxing Wei
Yingjie Guo
Jie Yu
Bo Zhang
AAML
186
66
0
26 Dec 2022
Carpet-bombing patch: attacking a deep network without usual
  requirements
Carpet-bombing patch: attacking a deep network without usual requirements
Pol Labarbarie
Adrien Chan-Hon-Tong
Stéphane Herbin
Milad Leyli-Abadi
AAML
161
1
0
12 Dec 2022
PyPop7: A Pure-Python Library for Population-Based Black-Box
  Optimization
PyPop7: A Pure-Python Library for Population-Based Black-Box Optimization
Qiqi Duan
Guochen Zhou
Chang Shao
Zhuowei Wang
Mingyang Feng
Yuwei Huang
Yajing Tan
Yijun Yang
Qi Zhao
Yuhui Shi
282
7
0
12 Dec 2022
Re-purposing Perceptual Hashing based Client Side Scanning for Physical
  Surveillance
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Ashish Hooda
Andrey Labunets
Tadayoshi Kohno
Earlence Fernandes
130
2
0
08 Dec 2022
Recognizing Object by Components with Human Prior Knowledge Enhances
  Adversarial Robustness of Deep Neural Networks
Recognizing Object by Components with Human Prior Knowledge Enhances Adversarial Robustness of Deep Neural NetworksIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Xiao-Li Li
Ziqi Wang
Bo Zhang
Gang Hua
Xiaolin Hu
189
32
0
04 Dec 2022
Hijack Vertical Federated Learning Models As One Party
Hijack Vertical Federated Learning Models As One PartyIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Pengyu Qiu
Xuhong Zhang
R. Beyah
Changjiang Li
Yuwen Pu
Xing Yang
Ting Wang
FedML
192
12
0
01 Dec 2022
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action
  Recognition
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Rohit Gupta
Naveed Akhtar
Gaurav Kumar Nayak
Lin Wang
M. Shah
AAML
171
1
0
23 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Subrat Kishore Dutta
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
263
22
0
17 Nov 2022
Privacy against Real-Time Speech Emotion Detection via Acoustic
  Adversarial Evasion of Machine Learning
Privacy against Real-Time Speech Emotion Detection via Acoustic Adversarial Evasion of Machine LearningProceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (IMWUT), 2022
Brian Testa
Yi Xiao
Harshit Sharma
Avery Gump
Asif Salekin
AAML
231
12
0
17 Nov 2022
Previous
123456...121314
Next