ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1807.07978
  4. Cited By
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

20 July 2018
Andrew Ilyas
Logan Engstrom
A. Madry
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"

20 / 70 papers shown
Title
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
24
51
0
20 Aug 2020
Anti-Bandit Neural Architecture Search for Model Defense
Anti-Bandit Neural Architecture Search for Model Defense
Hanlin Chen
Baochang Zhang
Shenjun Xue
Xuan Gong
Hong Liu
Rongrong Ji
David Doermann
AAML
14
33
0
03 Aug 2020
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
16
12
0
21 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
33
51
0
01 Jul 2020
QEBA: Query-Efficient Boundary-Based Blackbox Attack
QEBA: Query-Efficient Boundary-Based Blackbox Attack
Huichen Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo-wen Li
AAML
21
177
0
28 May 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
27
12
0
11 May 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial Attacks
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
17
142
0
28 Mar 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face
  Recognition
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
13
52
0
16 Mar 2020
GeoDA: a geometric framework for black-box adversarial attacks
GeoDA: a geometric framework for black-box adversarial attacks
A. Rahmati
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
H. Dai
MLAU
AAML
15
113
0
13 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
  Adversarial Robustness
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OOD
AAML
58
63
0
02 Mar 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie-jin Yang
Xiaolin Huang
AAML
31
103
0
16 Jan 2020
Malware Makeover: Breaking ML-based Static Analysis by Modifying
  Executable Bytes
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
S. Shintre
AAML
31
66
0
19 Dec 2019
Black-box Adversarial Attacks with Bayesian Optimization
Black-box Adversarial Attacks with Bayesian Optimization
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAML
MLAU
14
30
0
30 Sep 2019
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
124
219
0
24 Sep 2019
On the Design of Black-box Adversarial Examples by Leveraging
  Gradient-free Optimization and Operator Splitting Method
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Pu Zhao
Sijia Liu
Pin-Yu Chen
Nghia Hoang
Kaidi Xu
B. Kailkhura
Xue Lin
AAML
27
54
0
26 Jul 2019
ML-LOO: Detecting Adversarial Examples with Feature Attribution
ML-LOO: Detecting Adversarial Examples with Feature Attribution
Puyudi Yang
Jianbo Chen
Cho-Jui Hsieh
Jane-ling Wang
Michael I. Jordan
AAML
22
101
0
08 Jun 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the
  Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer
  Domain
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
32
18
0
19 May 2019
Adversarial Learning in Statistical Classification: A Comprehensive
  Review of Defenses Against Attacks
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks
David J. Miller
Zhen Xiang
G. Kesidis
AAML
19
35
0
12 Apr 2019
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
19
67
0
30 Sep 2018
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
261
3,110
0
04 Nov 2016
Previous
12