ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information
v1v2v3 (latest)

Black-box Adversarial Attacks with Limited Queries and Information

International Conference on Machine Learning (ICML), 2018
23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 684 papers shown
Adversarial Scratches: Deployable Attacks to CNN Classifiers
Adversarial Scratches: Deployable Attacks to CNN ClassifiersPattern Recognition (Pattern Recogn.), 2022
Loris Giulivi
Malhar Jere
Loris Rossi
F. Koushanfar
Gabriela F. Cretu-Ciocarlie
Briland Hitaj
Giacomo Boracchi
AAML
232
23
0
20 Apr 2022
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based
  Retrieval
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based RetrievalThe Web Conference (WWW), 2022
Xunguang Wang
Yinqun Lin
Xuelong Li
AAMLGAN
316
10
0
18 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision SettingsIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
Jiliang Li
Ting Wang
AAML
197
22
0
07 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
DST: Dynamic Substitute Training for Data-free Black-box AttackComputer Vision and Pattern Recognition (CVPR), 2022
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OODAAML
123
22
0
03 Apr 2022
Scalable Whitebox Attacks on Tree-based Models
Scalable Whitebox Attacks on Tree-based Models
Giuseppe Castiglione
G. Ding
Masoud Hashemi
C. Srinivasa
Ga Wu
AAML
166
3
0
31 Mar 2022
Improving Adversarial Transferability via Neuron Attribution-Based
  Attacks
Improving Adversarial Transferability via Neuron Attribution-Based AttacksComputer Vision and Pattern Recognition (CVPR), 2022
Jianping Zhang
Weibin Wu
Shu Yang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
408
166
0
31 Mar 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box AttackComputer Vision and Pattern Recognition (CVPR), 2022
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
228
54
0
30 Mar 2022
StyleFool: Fooling Video Classification Systems via Style Transfer
StyleFool: Fooling Video Classification Systems via Style TransferIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Yu Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
AAML
519
29
0
30 Mar 2022
Boosting Black-Box Adversarial Attacks with Meta Learning
Boosting Black-Box Adversarial Attacks with Meta LearningCybersecurity and Cyberforensics Conference (CC), 2022
Junjie Fu
Jian Sun
Chongqing
AAML
110
4
0
28 Mar 2022
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization
  Perspective
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization PerspectiveInternational Conference on Learning Representations (ICLR), 2022
Yimeng Zhang
Yuguang Yao
Jinghan Jia
Jinfeng Yi
Min-Fong Hong
Shiyu Chang
Sijia Liu
AAML
316
39
0
27 Mar 2022
Origins of Low-dimensional Adversarial Perturbations
Origins of Low-dimensional Adversarial PerturbationsInternational Conference on Artificial Intelligence and Statistics (AISTATS), 2022
Elvis Dohmatob
Chuan Guo
Morgane Goibert
AAML
199
4
0
25 Mar 2022
An Intermediate-level Attack Framework on The Basis of Linear Regression
An Intermediate-level Attack Framework on The Basis of Linear RegressionIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Yiwen Guo
Qizhang Li
W. Zuo
Hao Chen
229
14
0
21 Mar 2022
Towards Robust 2D Convolution for Reliable Visual Recognition
Towards Robust 2D Convolution for Reliable Visual Recognition
Lida Li
Shuai Li
Kun Wang
Xiangchu Feng
Lei Zhang
101
1
0
18 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easyInternational Conference on Learning Representations (ICLR), 2022
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAMLMLAU
230
32
0
16 Mar 2022
Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?
Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?International Conference on Learning Representations (ICLR), 2022
Y. Fu
Shunyao Zhang
Shan-Hung Wu
Cheng Wan
Yingyan Lin
AAML
413
82
0
16 Mar 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GANAAML
157
24
0
13 Mar 2022
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based
  Prior
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based PriorIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2021
Yinpeng Dong
Shuyu Cheng
Tianyu Pang
Hang Su
Jun Zhu
AAML
149
67
0
13 Mar 2022
Shadows can be Dangerous: Stealthy and Effective Physical-world
  Adversarial Attack by Natural Phenomenon
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural PhenomenonComputer Vision and Pattern Recognition (CVPR), 2022
Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
AAML
305
183
0
08 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
138
2
0
07 Mar 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Enhancing Adversarial Robustness for Deep Metric LearningComputer Vision and Pattern Recognition (CVPR), 2022
Mo Zhou
Vishal M. Patel
AAML
201
19
0
02 Mar 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware DetectionComputers & security (Comput. Secur.), 2022
Aqib Rashid
Jose Such
AAML
446
10
0
15 Feb 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning ModelsAAAI Conference on Artificial Intelligence (AAAI), 2022
Pin-Yu Chen
Sijia Liu
AAML
381
22
0
15 Feb 2022
EREBA: Black-box Energy Testing of Adaptive Neural Networks
EREBA: Black-box Energy Testing of Adaptive Neural NetworksInternational Conference on Software Engineering (ICSE), 2022
Mirazul Haque
Yaswanth Yadlapalli
Wei Yang
Cong Liu
AAML
154
14
0
12 Feb 2022
On the Detection of Adaptive Adversarial Attacks in Speaker Verification
  Systems
On the Detection of Adaptive Adversarial Attacks in Speaker Verification SystemsIEEE Internet of Things Journal (IEEE IoT J.), 2022
Zesheng Chen
AAML
149
11
0
11 Feb 2022
Adversarial Attack and Defense for Non-Parametric Two-Sample Tests
Adversarial Attack and Defense for Non-Parametric Two-Sample TestsInternational Conference on Machine Learning (ICML), 2022
Xilie Xu
Jingfeng Zhang
Yifan Zhang
Masashi Sugiyama
Mohan S. Kankanhalli
AAML
338
2
0
07 Feb 2022
Pixle: a fast and effective black-box attack based on rearranging pixels
Pixle: a fast and effective black-box attack based on rearranging pixelsIEEE International Joint Conference on Neural Network (IJCNN), 2022
Jary Pomponi
Simone Scardapane
A. Uncini
AAML
160
46
0
04 Feb 2022
Learnability Lock: Authorized Learnability Control Through Adversarial
  Invertible Transformations
Learnability Lock: Authorized Learnability Control Through Adversarial Invertible TransformationsInternational Conference on Learning Representations (ICLR), 2022
Weiqi Peng
Jinghui Chen
AAML
131
5
0
03 Feb 2022
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep
  Learning Models
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep Learning ModelsInternational Conference on Learning Representations (ICLR), 2022
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
319
15
0
31 Jan 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial AttacksInternational Conference on Pattern Recognition (ICPR), 2022
Manjushree B. Aithal
Xiaohua Li
AAML
167
7
0
31 Jan 2022
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
Chi Hong
Jiyue Huang
L. Chen
186
2
0
31 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object DetectionIEEE International Conference on Computer Vision (ICCV), 2021
Yaning Tan
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
285
91
0
22 Jan 2022
Black-box Prompt Learning for Pre-trained Language Models
Black-box Prompt Learning for Pre-trained Language Models
Shizhe Diao
Zhichao Huang
Ruijia Xu
Xuechun Li
Yong Lin
Xiao Zhou
Tong Zhang
VLMAAML
290
83
0
21 Jan 2022
Security for Machine Learning-based Software Systems: a survey of
  threats, practices and challenges
Security for Machine Learning-based Software Systems: a survey of threats, practices and challengesACM Computing Surveys (ACM CSUR), 2022
Huaming Chen
Muhammad Ali Babar
AAML
298
33
0
12 Jan 2022
A General Framework for Evaluating Robustness of Combinatorial
  Optimization Solvers on Graphs
A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs
Han Lu
Zenan Li
Runzhong Wang
Qibing Ren
Junchi Yan
Yunbo Wang
AAML
171
0
0
28 Dec 2021
Adaptive Modeling Against Adversarial Attacks
Adaptive Modeling Against Adversarial Attacks
Zhiwen Yan
Teck Khim Ng
AAML
125
0
0
23 Dec 2021
Do You See What I See? Capabilities and Limits of Automated Multimedia
  Content Analysis
Do You See What I See? Capabilities and Limits of Automated Multimedia Content Analysis
Carey Shenkman
Dhanaraj Thakur
Emma Llansó
123
11
0
15 Dec 2021
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Xiaosen Wang
Zeliang Zhang
Kangheng Tong
Dihong Gong
Kun He
Zhifeng Li
Wei Liu
AAML
258
76
0
13 Dec 2021
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction
  Models in Healthcare
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Muchao Ye
Junyu Luo
Guanjie Zheng
Cao Xiao
Ting Wang
Fenglong Ma
AAML
100
4
0
11 Dec 2021
RamBoAttack: A Robust Query Efficient Deep Neural Network Decision
  Exploit
RamBoAttack: A Robust Query Efficient Deep Neural Network Decision Exploit
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
198
11
0
10 Dec 2021
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A
  Causal Language Model Approach
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach
Junjie Hu
Mohammadreza Ebrahimi
Hsinchun Chen
AAML
121
13
0
03 Dec 2021
Certified Adversarial Defenses Meet Out-of-Distribution Corruptions:
  Benchmarking Robustness and Simple Baselines
Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Jiachen Sun
Akshay Mehra
B. Kailkhura
Pin-Yu Chen
Dan Hendrycks
Jihun Hamm
Z. Morley Mao
AAML
193
23
0
01 Dec 2021
Human Imperceptible Attacks and Applications to Improve Fairness
Human Imperceptible Attacks and Applications to Improve Fairness
Xinru Hua
Huanzhong Xu
Jose H. Blanchet
V. Nguyen
AAML
167
4
0
30 Nov 2021
Adaptive Image Transformations for Transfer-based Adversarial Attack
Adaptive Image Transformations for Transfer-based Adversarial AttackEuropean Conference on Computer Vision (ECCV), 2021
Zheng Yuan
Jie Zhang
Shiguang Shan
OOD
310
34
0
27 Nov 2021
A Review of Adversarial Attack and Defense for Classification Methods
A Review of Adversarial Attack and Defense for Classification Methods
Yao Li
Minhao Cheng
Cho-Jui Hsieh
T. C. Lee
AAML
198
89
0
18 Nov 2021
Finding Optimal Tangent Points for Reducing Distortions of Hard-label
  Attacks
Finding Optimal Tangent Points for Reducing Distortions of Hard-label AttacksNeural Information Processing Systems (NeurIPS), 2021
Chen Ma
Xiangyu Guo
Li Chen
Junhai Yong
Yisen Wang
AAML
355
18
0
15 Nov 2021
Meta-Learning the Search Distribution of Black-Box Random Search Based
  Adversarial Attacks
Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial AttacksNeural Information Processing Systems (NeurIPS), 2021
Maksym Yatsura
J. H. Metzen
Matthias Hein
OOD
413
15
0
02 Nov 2021
Attacking Video Recognition Models with Bullet-Screen Comments
Attacking Video Recognition Models with Bullet-Screen CommentsAAAI Conference on Artificial Intelligence (AAAI), 2021
Kai-xiang Chen
Zhipeng Wei
Yue Yu
Zuxuan Wu
Yu-Gang Jiang
AAML
227
26
0
29 Oct 2021
Drawing Robust Scratch Tickets: Subnetworks with Inborn Robustness Are Found within Randomly Initialized Networks
Drawing Robust Scratch Tickets: Subnetworks with Inborn Robustness Are Found within Randomly Initialized Networks
Yonggan Fu
Qixuan Yu
Yang Zhang
Shan-Hung Wu
Ouyang Xu
David D. Cox
Yingyan Lin
AAMLOOD
466
36
0
26 Oct 2021
Boosting the Transferability of Video Adversarial Examples via Temporal
  Translation
Boosting the Transferability of Video Adversarial Examples via Temporal Translation
Zhipeng Wei
Yue Yu
Zuxuan Wu
Yu-Gang Jiang
AAML
304
45
0
18 Oct 2021
Adversarial Attack across Datasets
Adversarial Attack across Datasets
Yunxiao Qin
Yuanhao Xiong
Jinfeng Yi
Lihong Cao
Cho-Jui Hsieh
AAML
293
4
0
13 Oct 2021
Previous
123...678...121314
Next