ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1807.07978
  4. Cited By
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

20 July 2018
Andrew Ilyas
Logan Engstrom
A. Madry
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"

50 / 69 papers shown
Title
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
47
0
0
17 Mar 2025
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
Zhi-Yi Chin
Kuan-Chen Mu
Mario Fritz
Pin-Yu Chen
DiffM
85
0
0
25 Nov 2024
AI-generated Image Detection: Passive or Watermark?
AI-generated Image Detection: Passive or Watermark?
Moyang Guo
Yuepeng Hu
Zhengyuan Jiang
Zeyu Li
Amir Sadovnik
Arka Daw
Neil Zhenqiang Gong
77
1
0
20 Nov 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAML
SILM
60
6
0
26 Oct 2024
Natural Language Induced Adversarial Images
Natural Language Induced Adversarial Images
Xiaopei Zhu
Peiyang Xu
Guanning Zeng
Yingpeng Dong
Xiaolin Hu
AAML
28
0
0
11 Oct 2024
$L_p$-norm Distortion-Efficient Adversarial Attack
LpL_pLp​-norm Distortion-Efficient Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Zi-Jia Wang
Xiangui Kang
34
0
0
03 Jul 2024
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial
  Attack
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack
Viet Vo
Ehsan Abbasnejad
D. Ranasinghe
AAML
33
5
0
08 Apr 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited
  Black-box Scenario
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Renyang Liu
Kwok-Yan Lam
Wei Zhou
Sixing Wu
Jun Zhao
Dongting Hu
Mingming Gong
AAML
28
0
0
30 Mar 2024
Counter-Samples: A Stateless Strategy to Neutralize Black Box
  Adversarial Attacks
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Roey Bokobza
Yisroel Mirsky
AAML
32
0
0
14 Mar 2024
A Generative Approach to Surrogate-based Black-box Attacks
A Generative Approach to Surrogate-based Black-box Attacks
Raha Moraffah
Huan Liu
AAML
19
0
0
05 Feb 2024
Black-Box Tuning of Vision-Language Models with Effective Gradient
  Approximation
Black-Box Tuning of Vision-Language Models with Effective Gradient Approximation
Zixian Guo
Yuxiang Wei
Ming-Yu Liu
Zhilong Ji
Jinfeng Bai
Yiwen Guo
Wangmeng Zuo
VLM
31
8
0
26 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
18
0
0
12 Dec 2023
When Side-Channel Attacks Break the Black-Box Property of Embedded
  Artificial Intelligence
When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence
Benoît Coqueret
Mathieu Carbone
Olivier Sentieys
Gabriel Zaid
58
2
0
23 Nov 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
23
11
0
21 Jun 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
34
4
0
13 Apr 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus
  on Videos
Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus on Videos
Xingxing Wei
Songping Wang
Huanqian Yan
AAML
26
15
0
03 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
27
27
0
01 Jan 2023
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Han-Ching Wu
Sareh Rowlands
Johan Wahlstrom
MLAU
AAML
28
0
0
28 Oct 2022
Object-Attentional Untargeted Adversarial Attack
Object-Attentional Untargeted Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Guopu Zhu
AAML
21
2
0
16 Oct 2022
Audit and Improve Robustness of Private Neural Networks on Encrypted
  Data
Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Jiaqi Xue
Lei Xu
Lin Chen
W. Shi
Kaidi Xu
Qian Lou
AAML
20
5
0
20 Sep 2022
Adversarial Detection: Attacking Object Detection in Real Time
Adversarial Detection: Attacking Object Detection in Real Time
Han-Ching Wu
Syed Yunas
Sareh Rowlands
Wenjie Ruan
Johan Wahlstrom
AAML
25
4
0
05 Sep 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
19
2
0
08 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
24
11
0
04 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
35
50
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
X. Huang
AAML
110
28
0
24 May 2022
Robust Representation via Dynamic Feature Aggregation
Robust Representation via Dynamic Feature Aggregation
Haozhe Liu
Haoqin Ji
Yuexiang Li
Nanjun He
Haoqian Wu
Feng Liu
Linlin Shen
Yefeng Zheng
AAML
OOD
32
3
0
16 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Binghui Wang
Youqin Li
Pan Zhou
AAML
26
13
0
07 May 2022
KING: Generating Safety-Critical Driving Scenarios for Robust Imitation
  via Kinematics Gradients
KING: Generating Safety-Critical Driving Scenarios for Robust Imitation via Kinematics Gradients
Niklas Hanselmann
Katrin Renz
Kashyap Chitta
Apratim Bhattacharyya
Andreas Geiger
29
86
0
28 Apr 2022
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization
  Perspective
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Yimeng Zhang
Yuguang Yao
Jinghan Jia
Jinfeng Yi
Min-Fong Hong
Shiyu Chang
Sijia Liu
AAML
18
33
0
27 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
Adversarial Token Attacks on Vision Transformers
Adversarial Token Attacks on Vision Transformers
Ameya Joshi
Gauri Jagatap
C. Hegde
ViT
30
19
0
08 Oct 2021
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to
  CNNs
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
47
78
0
06 Oct 2021
2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency
2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency
Yonggan Fu
Yang Katie Zhao
Qixuan Yu
Chaojian Li
Yingyan Lin
AAML
46
12
0
11 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
ROPUST: Improving Robustness through Fine-tuning with Photonic
  Processors and Synthetic Gradients
ROPUST: Improving Robustness through Fine-tuning with Photonic Processors and Synthetic Gradients
Alessandro Cappelli
Julien Launay
Laurent Meunier
Ruben Ohana
Iacopo Poli
AAML
16
4
0
06 Jul 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
60
63
0
26 Apr 2021
Random Noise Defense Against Query-Based Black-Box Attacks
Random Noise Defense Against Query-Based Black-Box Attacks
Zeyu Qin
Yanbo Fan
H. Zha
Baoyuan Wu
AAML
19
59
0
23 Apr 2021
Performance Evaluation of Adversarial Attacks: Discrepancies and
  Solutions
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Jing Wu
Mingyi Zhou
Ce Zhu
Yipeng Liu
Mehrtash Harandi
Li Li
AAML
44
10
0
22 Apr 2021
Mini-batch graphs for robust image classification
Mini-batch graphs for robust image classification
Arnab Kumar Mondal
V. Jain
K. Siddiqi
OOD
33
6
0
22 Apr 2021
Relating Adversarially Robust Generalization to Flat Minima
Relating Adversarially Robust Generalization to Flat Minima
David Stutz
Matthias Hein
Bernt Schiele
OOD
29
65
0
09 Apr 2021
Combating Adversaries with Anti-Adversaries
Combating Adversaries with Anti-Adversaries
Motasem Alfarra
Juan C. Pérez
Ali K. Thabet
Adel Bibi
Philip H. S. Torr
Bernard Ghanem
AAML
26
26
0
26 Mar 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial
  Attack
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Ajmal Saeed Mian
AAML
14
2
0
19 Mar 2021
A survey on practical adversarial examples for malware classifiers
A survey on practical adversarial examples for malware classifiers
Daniel Park
B. Yener
AAML
22
14
0
06 Nov 2020
The Vulnerability of the Neural Networks Against Adversarial Examples in
  Deep Learning Algorithms
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Rui Zhao
AAML
21
1
0
02 Nov 2020
Adversarial Attacks on Binary Image Recognition Systems
Adversarial Attacks on Binary Image Recognition Systems
Eric Balkanski
Harrison W. Chase
Kojin Oshiba
Alexander Rilee
Yaron Singer
Richard Wang
AAML
39
4
0
22 Oct 2020
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Jiancheng Yang
Yangzhou Jiang
Xiaoyang Huang
Bingbing Ni
Chenglong Zhao
AAML
18
81
0
21 Oct 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
L. Chen
Junhai Yong
MLAU
OOD
41
17
0
02 Sep 2020
Adversarially Robust Neural Architectures
Adversarially Robust Neural Architectures
Minjing Dong
Yanxi Li
Yunhe Wang
Chang Xu
AAML
OOD
39
48
0
02 Sep 2020
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
24
51
0
20 Aug 2020
12
Next