ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information

Black-box Adversarial Attacks with Limited Queries and Information

23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 651 papers shown
Title
Increasing Confidence in Adversarial Robustness Evaluations
Increasing Confidence in Adversarial Robustness Evaluations
Roland S. Zimmermann
Wieland Brendel
Florian Tramèr
Nicholas Carlini
AAML
36
16
0
28 Jun 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition
  using a Mobile and Compact Printer
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAML
CVBM
28
5
0
25 Jun 2022
On the Role of Generalization in Transferability of Adversarial Examples
On the Role of Generalization in Transferability of Adversarial Examples
Yilin Wang
Farzan Farnia
AAML
24
10
0
18 Jun 2022
Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete
  Sequential Data via Bayesian Optimization
Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization
Deokjae Lee
Seungyong Moon
Junhyeok Lee
Hyun Oh Song
AAML
20
38
0
17 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
30
5
0
16 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
19
2
0
08 Jun 2022
Improving Adversarial Robustness by Putting More Regularizations on Less
  Robust Samples
Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples
Dongyoon Yang
Insung Kong
Yongdai Kim
OOD
AAML
13
9
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
27
18
0
07 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Ke Tang
Qing Li
AAML
24
11
0
04 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
35
50
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
X. Huang
AAML
110
28
0
24 May 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial Robustness
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
34
9
0
23 May 2022
On Trace of PGD-Like Adversarial Attacks
On Trace of PGD-Like Adversarial Attacks
Mo Zhou
Vishal M. Patel
AAML
27
4
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
35
0
0
19 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Binghui Wang
Youqin Li
Pan Zhou
AAML
26
13
0
07 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAML
MLAU
19
3
0
30 Apr 2022
Smart App Attack: Hacking Deep Learning Models in Android Apps
Smart App Attack: Hacking Deep Learning Models in Android Apps
Yujin Huang
Chunyang Chen
FedML
AAML
15
21
0
23 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
16
5
0
20 Apr 2022
Adversarial Scratches: Deployable Attacks to CNN Classifiers
Adversarial Scratches: Deployable Attacks to CNN Classifiers
Loris Giulivi
Malhar Jere
Loris Rossi
F. Koushanfar
Gabriela F. Cretu-Ciocarlie
B. Hitaj
Giacomo Boracchi
AAML
20
18
0
20 Apr 2022
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based
  Retrieval
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based Retrieval
Xunguang Wang
Yinqun Lin
X. Li
AAML
GAN
12
7
0
18 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
27
18
0
07 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
DST: Dynamic Substitute Training for Data-free Black-box Attack
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OOD
AAML
11
17
0
03 Apr 2022
Scalable Whitebox Attacks on Tree-based Models
Scalable Whitebox Attacks on Tree-based Models
Giuseppe Castiglione
G. Ding
Masoud Hashemi
C. Srinivasa
Ga Wu
AAML
13
1
0
31 Mar 2022
Improving Adversarial Transferability via Neuron Attribution-Based
  Attacks
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Jianping Zhang
Weibin Wu
Jen-tse Huang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
45
129
0
31 Mar 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
31
42
0
30 Mar 2022
StyleFool: Fooling Video Classification Systems via Style Transfer
StyleFool: Fooling Video Classification Systems via Style Transfer
Yu Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
AAML
8
25
0
30 Mar 2022
Boosting Black-Box Adversarial Attacks with Meta Learning
Boosting Black-Box Adversarial Attacks with Meta Learning
Junjie Fu
Jian-jun Sun
Chongqing
AAML
17
4
0
28 Mar 2022
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization
  Perspective
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Yimeng Zhang
Yuguang Yao
Jinghan Jia
Jinfeng Yi
Min-Fong Hong
Shiyu Chang
Sijia Liu
AAML
15
33
0
27 Mar 2022
Origins of Low-dimensional Adversarial Perturbations
Origins of Low-dimensional Adversarial Perturbations
Elvis Dohmatob
Chuan Guo
Morgane Goibert
AAML
38
4
0
25 Mar 2022
An Intermediate-level Attack Framework on The Basis of Linear Regression
An Intermediate-level Attack Framework on The Basis of Linear Regression
Yiwen Guo
Qizhang Li
W. Zuo
Hao Chen
41
13
0
21 Mar 2022
Towards Robust 2D Convolution for Reliable Visual Recognition
Towards Robust 2D Convolution for Reliable Visual Recognition
Lida Li
Shuai Li
Kun Wang
Xiangchu Feng
Lei Zhang
19
1
0
18 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?
Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?
Y. Fu
Shunyao Zhang
Shan-Hung Wu
Cheng Wan
Yingyan Lin
AAML
23
64
0
16 Mar 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick D. McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GAN
AAML
17
14
0
13 Mar 2022
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based
  Prior
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Yinpeng Dong
Shuyu Cheng
Tianyu Pang
Hang Su
Jun Zhu
AAML
19
57
0
13 Mar 2022
Shadows can be Dangerous: Stealthy and Effective Physical-world
  Adversarial Attack by Natural Phenomenon
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon
Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
AAML
28
146
0
08 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
24
2
0
07 Mar 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Enhancing Adversarial Robustness for Deep Metric Learning
Mo Zhou
Vishal M. Patel
AAML
22
18
0
02 Mar 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
16
5
0
15 Feb 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning Models
Pin-Yu Chen
Sijia Liu
AAML
41
16
0
15 Feb 2022
EREBA: Black-box Energy Testing of Adaptive Neural Networks
EREBA: Black-box Energy Testing of Adaptive Neural Networks
Mirazul Haque
Yaswanth Yadlapalli
Wei Yang
Cong Liu
AAML
6
10
0
12 Feb 2022
On the Detection of Adaptive Adversarial Attacks in Speaker Verification
  Systems
On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
AAML
16
8
0
11 Feb 2022
Adversarial Attack and Defense for Non-Parametric Two-Sample Tests
Adversarial Attack and Defense for Non-Parametric Two-Sample Tests
Xilie Xu
Jingfeng Zhang
Feng Liu
Masashi Sugiyama
Mohan S. Kankanhalli
AAML
22
1
0
07 Feb 2022
Pixle: a fast and effective black-box attack based on rearranging pixels
Pixle: a fast and effective black-box attack based on rearranging pixels
Jary Pomponi
Simone Scardapane
A. Uncini
AAML
14
31
0
04 Feb 2022
Learnability Lock: Authorized Learnability Control Through Adversarial
  Invertible Transformations
Learnability Lock: Authorized Learnability Control Through Adversarial Invertible Transformations
Weiqi Peng
Jinghui Chen
AAML
16
5
0
03 Feb 2022
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep
  Learning Models
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep Learning Models
Viet Vo
Ehsan Abbasnejad
D. Ranasinghe
AAML
22
14
0
31 Jan 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
17
6
0
31 Jan 2022
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
Chi Hong
Jiyue Huang
L. Chen
19
2
0
31 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
22
70
0
22 Jan 2022
Black-box Prompt Learning for Pre-trained Language Models
Black-box Prompt Learning for Pre-trained Language Models
Shizhe Diao
Zhichao Huang
Ruijia Xu
Xuechun Li
Yong Lin
Xiao Zhou
Tong Zhang
VLM
AAML
28
68
0
21 Jan 2022
Previous
123...567...121314
Next