Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
1804.08598
Cited By
v1
v2
v3 (latest)
Black-box Adversarial Attacks with Limited Queries and Information
International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
MLAU
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Black-box Adversarial Attacks with Limited Queries and Information"
50 / 682 papers shown
Title
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Han-Ching Wu
Sareh Rowlands
Johan Wahlstrom
MLAU
AAML
315
1
0
28 Oct 2022
Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Huiyun Cao
Wenlong Zou
Yinkun Wang
Ting Song
Mengjun Liu
AAML
235
6
0
19 Oct 2022
Object-Attentional Untargeted Adversarial Attack
Journal of Information Security and Applications (JISA), 2022
Chao Zhou
Yuan-Gen Wang
Guopu Zhu
AAML
123
4
0
16 Oct 2022
Is Face Recognition Safe from Realizable Attacks?
Sanjay Saha
Terence Sim
CVBM
AAML
122
3
0
15 Oct 2022
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation
Neural Information Processing Systems (NeurIPS), 2022
Zeyu Qin
Yanbo Fan
Yi Liu
Li Shen
Yong Zhang
Jue Wang
Baoyuan Wu
AAML
SILM
183
103
0
12 Oct 2022
Robust Models are less Over-Confident
Neural Information Processing Systems (NeurIPS), 2022
Julia Grabinski
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
224
28
0
12 Oct 2022
What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?
Neural Information Processing Systems (NeurIPS), 2022
Nikolaos Tsilivis
Julia Kempe
AAML
202
23
0
11 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
IEEE Transactions on Image Processing (IEEE TIP), 2022
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
152
69
0
09 Oct 2022
Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems
International Conference on Machine Learning (ICML), 2022
Chawin Sitawarin
Florian Tramèr
Nicholas Carlini
AAML
252
9
0
07 Oct 2022
On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses
Neural Information Processing Systems (NeurIPS), 2022
Anshuman Chhabra
Ashwin Sekhari
P. Mohapatra
OOD
AAML
239
10
0
04 Oct 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAML
MLAU
212
5
0
29 Sep 2022
Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Jiaqi Xue
Lei Xu
Lin Chen
W. Shi
Kaidi Xu
Qian Lou
AAML
148
5
0
20 Sep 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Conference on Computer and Communications Security (CCS), 2022
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
217
34
0
20 Sep 2022
Improving Robust Fairness via Balance Adversarial Training
Chunyu Sun
Chenye Xu
Chengyuan Yao
Yaning Tan
Yichao Wu
Ding Liang
XiangLong Liu
Aishan Liu
106
11
0
15 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
194
11
0
11 Sep 2022
The Space of Adversarial Strategies
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Patrick McDaniel
AAML
154
6
0
09 Sep 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
International Conference on Information and Knowledge Management (CIKM), 2022
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
130
1
0
28 Aug 2022
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Dongbin Na
Sangwoo Ji
Jong Kim
AAML
211
27
0
24 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
251
2
0
18 Aug 2022
An Efficient Multi-Step Framework for Malware Packing Identification
Jong-Wouk Kim
Yang-Sae Moon
Mi-Jung Choi
78
0
0
17 Aug 2022
Online Learning for Non-monotone Submodular Maximization: From Full Information to Bandit Feedback
Qixin Zhang
Zengde Deng
Zaiyi Chen
Kuangqi Zhou
Haoyuan Hu
Yu Yang
165
7
0
16 Aug 2022
Unifying Gradients to Improve Real-world Robustness for Deep Networks
ACM Transactions on Intelligent Systems and Technology (ACM TIST), 2022
Yingwen Wu
Sizhe Chen
Kun Fang
Xiaolin Huang
AAML
191
4
0
12 Aug 2022
Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks
International Conference on Information Photonics (ICIP), 2022
Woo Jae Kim
Seunghoon Hong
Sung-eui Yoon
AAML
194
14
0
11 Aug 2022
Blackbox Attacks via Surrogate Ensemble Search
Neural Information Processing Systems (NeurIPS), 2022
Zikui Cai
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
291
25
0
07 Aug 2022
Robust Real-World Image Super-Resolution against Adversarial Attacks
ACM Multimedia (MM), 2021
N. Babaguchi
John R. Smith
Pengxu Wei
T. Plagemann
Rong Yan
AAML
239
26
0
31 Jul 2022
DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking
Machine-mediated learning (ML), 2022
Xiangyu Yin
Wenjie Ruan
J. Fieldsend
AAML
171
34
0
17 Jul 2022
Interactive Machine Learning: A State of the Art Review
Natnael A. Wondimu
Cédric Buche
U. Visser
VLM
HAI
248
12
0
13 Jul 2022
One-shot Neural Backdoor Erasing via Adversarial Weight Masking
Neural Information Processing Systems (NeurIPS), 2022
Shuwen Chai
Jinghui Chen
AAML
210
43
0
10 Jul 2022
Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling
International Conference on Information Photonics (ICIP), 2022
Daniel Wang
Jiayu Lin
Yuansheng Wang
AAML
155
6
0
05 Jul 2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
IEEE Transactions on Network and Service Management (IEEE TNSM), 2022
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
222
18
0
04 Jul 2022
On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Pengrui Quan
Supriyo Chakraborty
J. Jeyakumar
Mani B. Srivastava
MIACV
AAML
134
9
0
28 Jun 2022
Increasing Confidence in Adversarial Robustness Evaluations
Neural Information Processing Systems (NeurIPS), 2022
Roland S. Zimmermann
Wieland Brendel
Florian Tramèr
Nicholas Carlini
AAML
171
20
0
28 Jun 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAML
CVBM
153
7
0
25 Jun 2022
On the Role of Generalization in Transferability of Adversarial Examples
Conference on Uncertainty in Artificial Intelligence (UAI), 2022
Yilin Wang
Farzan Farnia
AAML
155
11
0
18 Jun 2022
Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization
International Conference on Machine Learning (ICML), 2022
Deokjae Lee
Seungyong Moon
Junhyeok Lee
Hyun Oh Song
AAML
178
47
0
17 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
IEEE International Conference on Tools with Artificial Intelligence (ICTAI), 2022
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
188
15
0
16 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
175
3
0
08 Jun 2022
Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples
International Conference on Machine Learning (ICML), 2022
Dongyoon Yang
Insung Kong
Yongdai Kim
OOD
AAML
293
14
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
IEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
142
21
0
07 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
ACM Transactions on Intelligent Systems and Technology (ACM TIST), 2022
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
191
16
0
04 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
International Conference on Learning Representations (ICLR), 2022
Yunpeng Huang
A. Kong
AAML
157
69
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Neural Information Processing Systems (NeurIPS), 2022
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
358
30
0
24 May 2022
Squeeze Training for Adversarial Robustness
International Conference on Learning Representations (ICLR), 2022
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
220
18
0
23 May 2022
On Trace of PGD-Like Adversarial Attacks
International Conference on Pattern Recognition (ICPR), 2022
Mo Zhou
Vishal M. Patel
AAML
244
4
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
158
0
0
19 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Computer Vision and Pattern Recognition (CVPR), 2022
Binghui Wang
Youqin Li
Pan Zhou
AAML
135
17
0
07 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAML
MLAU
96
3
0
30 Apr 2022
Smart App Attack: Hacking Deep Learning Models in Android Apps
IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Yujin Huang
Chunyang Chen
FedML
AAML
162
23
0
23 Apr 2022
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
193
5
0
20 Apr 2022
Adversarial Scratches: Deployable Attacks to CNN Classifiers
Pattern Recognition (Pattern Recogn.), 2022
Loris Giulivi
Malhar Jere
Loris Rossi
F. Koushanfar
Gabriela F. Cretu-Ciocarlie
Briland Hitaj
Giacomo Boracchi
AAML
186
23
0
20 Apr 2022
Previous
1
2
3
...
5
6
7
...
12
13
14
Next