ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1805.11770
  4. Cited By
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks
v1v2v3v4v5 (latest)

AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks

30 May 2018
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks"

50 / 215 papers shown
Title
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing FlowsNeural Information Processing Systems (NeurIPS), 2020
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
220
67
0
15 Jul 2020
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low
  Query Budget Regimes
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget RegimesKnowledge Discovery and Data Mining (KDD), 2020
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAML
83
36
0
13 Jul 2020
Generating Adversarial Inputs Using A Black-box Differential Technique
Generating Adversarial Inputs Using A Black-box Differential Technique
J. Matos
Lucas C. Cordeiro
Marcelo d’Amorim
Xiaowei Huang
AAML
62
0
0
10 Jul 2020
Query-Free Adversarial Transfer via Undertrained Surrogates
Query-Free Adversarial Transfer via Undertrained Surrogates
Chris Miller
Soroush Vosoughi
AAML
55
0
0
01 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Damien Scieur
William L. Hamilton
AAMLGAN
171
55
0
01 Jul 2020
R2-B2: Recursive Reasoning-Based Bayesian Optimization for No-Regret
  Learning in Games
R2-B2: Recursive Reasoning-Based Bayesian Optimization for No-Regret Learning in Games
Zhongxiang Dai
Yizhou Chen
K. H. Low
Patrick Jaillet
Teck-Hua Ho
120
28
0
30 Jun 2020
Blacklight: Scalable Defense for Neural Networks against Query-Based
  Black-Box Attacks
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box AttacksUSENIX Security Symposium (USENIX Security), 2020
Huiying Li
Shawn Shan
Emily Wenger
Jiayun Zhang
Haitao Zheng
Ben Y. Zhao
AAML
165
50
0
24 Jun 2020
Sparse-RS: a versatile framework for query-efficient sparse black-box
  adversarial attacks
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacksAAAI Conference on Artificial Intelligence (AAAI), 2020
Francesco Croce
Maksym Andriushchenko
Naman D. Singh
Nicolas Flammarion
Matthias Hein
202
119
0
23 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to
  Adversarial Examples
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
111
25
0
18 Jun 2020
Protecting Against Image Translation Deepfakes by Leaking Universal
  Perturbations from Black-Box Neural Networks
Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks
Nataniel Ruiz
Sarah Adel Bargal
Stan Sclaroff
AAML
91
11
0
11 Jun 2020
A Primer on Zeroth-Order Optimization in Signal Processing and Machine
  Learning
A Primer on Zeroth-Order Optimization in Signal Processing and Machine LearningIEEE Signal Processing Magazine (IEEE Signal Process. Mag.), 2020
Sijia Liu
Pin-Yu Chen
B. Kailkhura
Gaoyuan Zhang
A. Hero III
P. Varshney
226
278
0
11 Jun 2020
Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based
  Classifiers
Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based Classifiers
Fangfang Yang
Shaolei Ren
AAML
88
17
0
10 Jun 2020
QEBA: Query-Efficient Boundary-Based Blackbox Attack
QEBA: Query-Efficient Boundary-Based Blackbox AttackComputer Vision and Pattern Recognition (CVPR), 2020
Huichen Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Yue Liu
AAML
206
194
0
28 May 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
129
11
0
11 May 2020
Projection & Probability-Driven Black-Box Attack
Projection & Probability-Driven Black-Box Attack
Jie Li
Rongrong Ji
Hong Liu
Jianzhuang Liu
Bineng Zhong
Cheng Deng
Q. Tian
AAML
98
52
0
08 May 2020
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient
  Estimation
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation
Sanjay Kariyappa
A. Prakash
Moinuddin K. Qureshi
AAML
188
165
0
06 May 2020
RAIN: A Simple Approach for Robust and Accurate Image Classification
  Networks
RAIN: A Simple Approach for Robust and Accurate Image Classification Networks
Jiawei Du
Hanshu Yan
Vincent Y. F. Tan
Qiufeng Wang
Rick Siow Mong Goh
Jiashi Feng
AAML
56
0
0
24 Apr 2020
PatchAttack: A Black-box Texture-based Attack with Reinforcement
  Learning
PatchAttack: A Black-box Texture-based Attack with Reinforcement LearningEuropean Conference on Computer Vision (ECCV), 2020
Chenglin Yang
Adam Kortylewski
Cihang Xie
Yinzhi Cao
Alan Yuille
AAML
153
122
0
12 Apr 2020
Luring of transferable adversarial perturbations in the black-box
  paradigm
Luring of transferable adversarial perturbations in the black-box paradigm
Rémi Bernhard
Pierre-Alain Moëllic
J. Dutertre
AAML
80
2
0
10 Apr 2020
Do Deep Minds Think Alike? Selective Adversarial Attacks for
  Fine-Grained Manipulation of Multiple Deep Neural Networks
Do Deep Minds Think Alike? Selective Adversarial Attacks for Fine-Grained Manipulation of Multiple Deep Neural Networks
Zain Khan
Xiaodong Wu
R. Mudumbai
Xiaodong Wu
Weiyu Xu
AAMLMLAU
84
1
0
26 Mar 2020
Stochastic Zeroth-order Riemannian Derivative Estimation and
  Optimization
Stochastic Zeroth-order Riemannian Derivative Estimation and Optimization
Jiaxiang Li
Krishnakumar Balasubramanian
Shiqian Ma
136
5
0
25 Mar 2020
GeoDA: a geometric framework for black-box adversarial attacks
GeoDA: a geometric framework for black-box adversarial attacksComputer Vision and Pattern Recognition (CVPR), 2020
A. Rahmati
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
H. Dai
MLAUAAML
181
126
0
13 Mar 2020
A Model-Based Derivative-Free Approach to Black-Box Adversarial
  Examples: BOBYQA
A Model-Based Derivative-Free Approach to Black-Box Adversarial Examples: BOBYQA
Giuseppe Ughi
V. Abrol
Jared Tanner
AAML
88
3
0
24 Feb 2020
Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural
  Gradient Descent
Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient DescentAAAI Conference on Artificial Intelligence (AAAI), 2020
Pu Zhao
Pin-Yu Chen
Siyue Wang
Xinyu Lin
AAML
134
40
0
18 Feb 2020
Assessing the Adversarial Robustness of Monte Carlo and Distillation
  Methods for Deep Bayesian Neural Network Classification
Assessing the Adversarial Robustness of Monte Carlo and Distillation Methods for Deep Bayesian Neural Network Classification
Meet P. Vadera
Satya Narayan Shukla
B. Jalaeian
Benjamin M. Marlin
AAMLBDL
60
6
0
07 Feb 2020
Challenges and Countermeasures for Adversarial Attacks on Deep
  Reinforcement Learning
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement LearningIEEE Transactions on Artificial Intelligence (IEEE TAI), 2020
Inaam Ilahi
Muhammad Usama
Junaid Qadir
M. Janjua
Ala I. Al-Fuqaha
D. Hoang
Dusit Niyato
AAML
219
166
0
27 Jan 2020
A Survey of Black-Box Adversarial Attacks on Computer Vision Models
A Survey of Black-Box Adversarial Attacks on Computer Vision Models
Siddhant Bhambri
Sumanyu Muku
Avinash Tulasi
Arun Balaji Buduru
AAMLVLM
214
88
0
03 Dec 2019
AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds
AdvPC: Transferable Adversarial Perturbations on 3D Point CloudsEuropean Conference on Computer Vision (ECCV), 2019
Abdullah Hamdi
Sara Rojas
Ali K. Thabet
Guohao Li
AAML3DPC
223
153
0
01 Dec 2019
Square Attack: a query-efficient black-box adversarial attack via random
  search
Square Attack: a query-efficient black-box adversarial attack via random searchEuropean Conference on Computer Vision (ECCV), 2019
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
Matthias Hein
AAML
431
1,115
0
29 Nov 2019
Heuristic Black-box Adversarial Attacks on Video Recognition Models
Heuristic Black-box Adversarial Attacks on Video Recognition ModelsAAAI Conference on Artificial Intelligence (AAAI), 2019
Zhipeng Wei
Jingjing Chen
Xingxing Wei
Linxi Jiang
Tat-Seng Chua
Fengfeng Zhou
Yueping Jiang
AAML
130
78
0
21 Nov 2019
Black-Box Adversarial Attack with Transferable Model-based Embedding
Black-Box Adversarial Attack with Transferable Model-based EmbeddingInternational Conference on Learning Representations (ICLR), 2019
Zhichao Huang
Tong Zhang
133
123
0
17 Nov 2019
Learning to Learn by Zeroth-Order Oracle
Learning to Learn by Zeroth-Order OracleInternational Conference on Learning Representations (ICLR), 2019
Yangjun Ruan
Yuanhao Xiong
Sashank J. Reddi
Sanjiv Kumar
Cho-Jui Hsieh
105
20
0
21 Oct 2019
A New Defense Against Adversarial Images: Turning a Weakness into a
  Strength
A New Defense Against Adversarial Images: Turning a Weakness into a StrengthNeural Information Processing Systems (NeurIPS), 2019
Tao Yu
Shengyuan Hu
Chuan Guo
Wei-Lun Chao
Kilian Q. Weinberger
AAML
162
108
0
16 Oct 2019
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box
  Optimization
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box OptimizationNeural Information Processing Systems (NeurIPS), 2019
Xiangyi Chen
Sijia Liu
Kaidi Xu
Xingguo Li
Xue Lin
Mingyi Hong
David Cox
ODL
152
123
0
15 Oct 2019
Yet another but more efficient black-box adversarial attack: tiling and
  evolution strategies
Yet another but more efficient black-box adversarial attack: tiling and evolution strategies
Laurent Meunier
Cen Chen
Li Wang
MLAUAAML
166
42
0
05 Oct 2019
Black-box Adversarial Attacks with Bayesian Optimization
Black-box Adversarial Attacks with Bayesian Optimization
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAMLMLAU
104
33
0
30 Sep 2019
Min-Max Optimization without Gradients: Convergence and Applications to
  Adversarial ML
Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Sijia Liu
Songtao Lu
Xiangyi Chen
Yao Feng
Kaidi Xu
Abdullah Al-Dujaili
Mingyi Hong
Una-May Obelilly
216
26
0
30 Sep 2019
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Sign-OPT: A Query-Efficient Hard-label Adversarial AttackInternational Conference on Learning Representations (ICLR), 2019
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
360
240
0
24 Sep 2019
BOSH: An Efficient Meta Algorithm for Decision-based Attacks
BOSH: An Efficient Meta Algorithm for Decision-based Attacks
Zhenxin Xiao
Puyudi Yang
Yuchen Eleanor Jiang
Kai-Wei Chang
Cho-Jui Hsieh
AAML
87
1
0
10 Sep 2019
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with
  Limited Queries
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesUSENIX Security Symposium (USENIX Security), 2019
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
AAML
263
92
0
19 Aug 2019
On the Design of Black-box Adversarial Examples by Leveraging
  Gradient-free Optimization and Operator Splitting Method
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting MethodIEEE International Conference on Computer Vision (ICCV), 2019
Pu Zhao
Sijia Liu
Pin-Yu Chen
Nghia Hoang
Kaidi Xu
B. Kailkhura
Xue Lin
AAML
220
56
0
26 Jul 2019
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Improving Black-box Adversarial Attacks with a Transfer-based PriorNeural Information Processing Systems (NeurIPS), 2019
Shuyu Cheng
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
AAML
173
289
0
17 Jun 2019
Copy and Paste: A Simple But Effective Initialization Method for
  Black-Box Adversarial Attacks
Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2019
T. Brunner
Frederik Diehl
Alois Knoll
AAML
82
8
0
14 Jun 2019
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient
  Black-box Attacks
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box AttacksNeural Information Processing Systems (NeurIPS), 2019
Ziang Yan
Yiwen Guo
Changshui Zhang
AAML
135
115
0
11 Jun 2019
Making targeted black-box evasion attacks effective and efficient
Making targeted black-box evasion attacks effective and efficient
Mika Juuti
B. Atli
Nadarajah Asokan
AAMLMIACVMLAU
73
9
0
08 Jun 2019
Query-efficient Meta Attack to Deep Neural Networks
Query-efficient Meta Attack to Deep Neural NetworksInternational Conference on Learning Representations (ICLR), 2019
Jiawei Du
Hu Zhang
Qiufeng Wang
Yi Yang
Jiashi Feng
AAML
85
86
0
06 Jun 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the
  Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer
  Domain
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer DomainIEEE Transactions on Dependable and Secure Computing (TDSC), 2019
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
229
19
0
19 May 2019
Simple Black-box Adversarial Attacks
Simple Black-box Adversarial AttacksInternational Conference on Machine Learning (ICML), 2019
Chuan Guo
Jacob R. Gardner
Yurong You
A. Wilson
Kilian Q. Weinberger
AAML
192
636
0
17 May 2019
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial
  Optimization
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial OptimizationInternational Conference on Machine Learning (ICML), 2019
Seungyong Moon
Gaon An
Hyun Oh Song
AAMLMLAU
151
145
0
16 May 2019
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via
  Genetic Algorithm
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic AlgorithmComputers & security (Comput. Secur.), 2019
Jinyin Chen
Mengmeng Su
Shijing Shen
Hui Xiong
Haibin Zheng
AAML
161
70
0
01 May 2019
Previous
12345
Next