ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 682 papers shown
Title
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Han-Ching Wu
Sareh Rowlands
Johan Wahlstrom
MLAUAAML
315
1
0
28 Oct 2022
Emerging Threats in Deep Learning-Based Autonomous Driving: A
  Comprehensive Survey
Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Huiyun Cao
Wenlong Zou
Yinkun Wang
Ting Song
Mengjun Liu
AAML
235
6
0
19 Oct 2022
Object-Attentional Untargeted Adversarial Attack
Object-Attentional Untargeted Adversarial AttackJournal of Information Security and Applications (JISA), 2022
Chao Zhou
Yuan-Gen Wang
Guopu Zhu
AAML
123
4
0
16 Oct 2022
Is Face Recognition Safe from Realizable Attacks?
Is Face Recognition Safe from Realizable Attacks?
Sanjay Saha
Terence Sim
CVBMAAML
122
3
0
15 Oct 2022
Boosting the Transferability of Adversarial Attacks with Reverse
  Adversarial Perturbation
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial PerturbationNeural Information Processing Systems (NeurIPS), 2022
Zeyu Qin
Yanbo Fan
Yi Liu
Li Shen
Yong Zhang
Jue Wang
Baoyuan Wu
AAMLSILM
183
103
0
12 Oct 2022
Robust Models are less Over-Confident
Robust Models are less Over-ConfidentNeural Information Processing Systems (NeurIPS), 2022
Julia Grabinski
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
224
28
0
12 Oct 2022
What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?
What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?Neural Information Processing Systems (NeurIPS), 2022
Nikolaos Tsilivis
Julia Kempe
AAML
202
23
0
11 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a
  Distribution Perspective
Towards Understanding and Boosting Adversarial Transferability from a Distribution PerspectiveIEEE Transactions on Image Processing (IEEE TIP), 2022
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
152
69
0
09 Oct 2022
Preprocessors Matter! Realistic Decision-Based Attacks on Machine
  Learning Systems
Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning SystemsInternational Conference on Machine Learning (ICML), 2022
Chawin Sitawarin
Florian Tramèr
Nicholas Carlini
AAML
252
9
0
07 Oct 2022
On the Robustness of Deep Clustering Models: Adversarial Attacks and
  Defenses
On the Robustness of Deep Clustering Models: Adversarial Attacks and DefensesNeural Information Processing Systems (NeurIPS), 2022
Anshuman Chhabra
Ashwin Sekhari
P. Mohapatra
OODAAML
239
10
0
04 Oct 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAMLMLAU
212
5
0
29 Sep 2022
Audit and Improve Robustness of Private Neural Networks on Encrypted
  Data
Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Jiaqi Xue
Lei Xu
Lin Chen
W. Shi
Kaidi Xu
Qian Lou
AAML
148
5
0
20 Sep 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Understanding Real-world Threats to Deep Learning Models in Android AppsConference on Computer and Communications Security (CCS), 2022
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
217
34
0
20 Sep 2022
Improving Robust Fairness via Balance Adversarial Training
Improving Robust Fairness via Balance Adversarial Training
Chunyu Sun
Chenye Xu
Chengyuan Yao
Yaning Tan
Yichao Wu
Ding Liang
XiangLong Liu
Aishan Liu
106
11
0
15 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via
  Attention-based Network in Face Recognition
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
194
11
0
11 Sep 2022
The Space of Adversarial Strategies
The Space of Adversarial Strategies
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Patrick McDaniel
AAML
154
6
0
09 Sep 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models
  with Transferred Evolutionary Strategies
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary StrategiesInternational Conference on Information and Knowledge Management (CIKM), 2022
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
130
1
0
28 Aug 2022
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Dongbin Na
Sangwoo Ji
Jong Kim
AAML
211
27
0
24 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
251
2
0
18 Aug 2022
An Efficient Multi-Step Framework for Malware Packing Identification
An Efficient Multi-Step Framework for Malware Packing Identification
Jong-Wouk Kim
Yang-Sae Moon
Mi-Jung Choi
78
0
0
17 Aug 2022
Online Learning for Non-monotone Submodular Maximization: From Full
  Information to Bandit Feedback
Online Learning for Non-monotone Submodular Maximization: From Full Information to Bandit Feedback
Qixin Zhang
Zengde Deng
Zaiyi Chen
Kuangqi Zhou
Haoyuan Hu
Yu Yang
165
7
0
16 Aug 2022
Unifying Gradients to Improve Real-world Robustness for Deep Networks
Unifying Gradients to Improve Real-world Robustness for Deep NetworksACM Transactions on Intelligent Systems and Technology (ACM TIST), 2022
Yingwen Wu
Sizhe Chen
Kun Fang
Xiaolin Huang
AAML
191
4
0
12 Aug 2022
Diverse Generative Perturbations on Attention Space for Transferable
  Adversarial Attacks
Diverse Generative Perturbations on Attention Space for Transferable Adversarial AttacksInternational Conference on Information Photonics (ICIP), 2022
Woo Jae Kim
Seunghoon Hong
Sung-eui Yoon
AAML
194
14
0
11 Aug 2022
Blackbox Attacks via Surrogate Ensemble Search
Blackbox Attacks via Surrogate Ensemble SearchNeural Information Processing Systems (NeurIPS), 2022
Zikui Cai
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
291
25
0
07 Aug 2022
Robust Real-World Image Super-Resolution against Adversarial Attacks
Robust Real-World Image Super-Resolution against Adversarial AttacksACM Multimedia (MM), 2021
N. Babaguchi
John R. Smith
Pengxu Wei
T. Plagemann
Rong Yan
AAML
239
26
0
31 Jul 2022
DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking
DIMBA: Discretely Masked Black-Box Attack in Single Object TrackingMachine-mediated learning (ML), 2022
Xiangyu Yin
Wenjie Ruan
J. Fieldsend
AAML
171
34
0
17 Jul 2022
Interactive Machine Learning: A State of the Art Review
Interactive Machine Learning: A State of the Art Review
Natnael A. Wondimu
Cédric Buche
U. Visser
VLMHAI
248
12
0
13 Jul 2022
One-shot Neural Backdoor Erasing via Adversarial Weight Masking
One-shot Neural Backdoor Erasing via Adversarial Weight MaskingNeural Information Processing Systems (NeurIPS), 2022
Shuwen Chai
Jinghui Chen
AAML
210
43
0
10 Jul 2022
Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling
Query-Efficient Adversarial Attack Based on Latin Hypercube SamplingInternational Conference on Information Photonics (ICIP), 2022
Daniel Wang
Jiayu Lin
Yuansheng Wang
AAML
155
6
0
05 Jul 2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial
  Examples
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial ExamplesIEEE Transactions on Network and Service Management (IEEE TNSM), 2022
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
222
18
0
04 Jul 2022
On the amplification of security and privacy risks by post-hoc
  explanations in machine learning models
On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Pengrui Quan
Supriyo Chakraborty
J. Jeyakumar
Mani B. Srivastava
MIACVAAML
134
9
0
28 Jun 2022
Increasing Confidence in Adversarial Robustness Evaluations
Increasing Confidence in Adversarial Robustness EvaluationsNeural Information Processing Systems (NeurIPS), 2022
Roland S. Zimmermann
Wieland Brendel
Florian Tramèr
Nicholas Carlini
AAML
171
20
0
28 Jun 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition
  using a Mobile and Compact Printer
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAMLCVBM
153
7
0
25 Jun 2022
On the Role of Generalization in Transferability of Adversarial Examples
On the Role of Generalization in Transferability of Adversarial ExamplesConference on Uncertainty in Artificial Intelligence (UAI), 2022
Yilin Wang
Farzan Farnia
AAML
155
11
0
18 Jun 2022
Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete
  Sequential Data via Bayesian Optimization
Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian OptimizationInternational Conference on Machine Learning (ICML), 2022
Deokjae Lee
Seungyong Moon
Junhyeok Lee
Hyun Oh Song
AAML
178
47
0
17 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark KnowledgeIEEE International Conference on Tools with Artificial Intelligence (ICTAI), 2022
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
188
15
0
16 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
175
3
0
08 Jun 2022
Improving Adversarial Robustness by Putting More Regularizations on Less
  Robust Samples
Improving Adversarial Robustness by Putting More Regularizations on Less Robust SamplesInternational Conference on Machine Learning (ICML), 2022
Dongyoon Yang
Insung Kong
Yongdai Kim
OODAAML
293
14
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition SystemsIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
142
21
0
07 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial AttackACM Transactions on Intelligent Systems and Technology (ACM TIST), 2022
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
191
16
0
04 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated GradientsInternational Conference on Learning Representations (ICLR), 2022
Yunpeng Huang
A. Kong
AAML
157
69
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query AttacksNeural Information Processing Systems (NeurIPS), 2022
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
358
30
0
24 May 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial RobustnessInternational Conference on Learning Representations (ICLR), 2022
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
220
18
0
23 May 2022
On Trace of PGD-Like Adversarial Attacks
On Trace of PGD-Like Adversarial AttacksInternational Conference on Pattern Recognition (ICPR), 2022
Mo Zhou
Vishal M. Patel
AAML
244
4
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
158
0
0
19 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical GuaranteesComputer Vision and Pattern Recognition (CVPR), 2022
Binghui Wang
Youqin Li
Pan Zhou
AAML
135
17
0
07 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAMLMLAU
96
3
0
30 Apr 2022
Smart App Attack: Hacking Deep Learning Models in Android Apps
Smart App Attack: Hacking Deep Learning Models in Android AppsIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Yujin Huang
Chunyang Chen
FedMLAAML
162
23
0
23 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
193
5
0
20 Apr 2022
Adversarial Scratches: Deployable Attacks to CNN Classifiers
Adversarial Scratches: Deployable Attacks to CNN ClassifiersPattern Recognition (Pattern Recogn.), 2022
Loris Giulivi
Malhar Jere
Loris Rossi
F. Koushanfar
Gabriela F. Cretu-Ciocarlie
Briland Hitaj
Giacomo Boracchi
AAML
186
23
0
20 Apr 2022
Previous
123...567...121314
Next