Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1904.01160
Cited By
Curls & Whey: Boosting Black-Box Adversarial Attacks
2 April 2019
Yucheng Shi
Siyu Wang
Yahong Han
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Curls & Whey: Boosting Black-Box Adversarial Attacks"
19 / 19 papers shown
Title
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Zhun Zhang
Yi Zeng
Qihe Liu
Shijie Zhou
AAML
36
0
0
16 Apr 2024
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing-Wu Guo
Yihao Huang
Xiaofei Xie
L. Ma
Jianjun Zhao
AAML
26
47
0
23 Apr 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
21
3
0
30 Jan 2023
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Philip H. S. Torr
Jiaya Jia
AAML
24
2
0
11 Dec 2022
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Shehzeen Samarah Hussain
Todd P. Huster
Chris Mesterharm
Paarth Neekhara
Kevin R. An
Malhar Jere
Harshvardhan Digvijay Sikka
F. Koushanfar
AAML
8
6
0
09 Jun 2022
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
38
78
0
06 Oct 2021
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Attack to Fool and Explain Deep Networks
Naveed Akhtar
M. Jalwana
Bennamoun
Ajmal Saeed Mian
AAML
22
33
0
20 Jun 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
60
63
0
26 Apr 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
XiaoFeng Wang
Shanqing Guo
AAML
37
15
0
19 Mar 2021
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
8
44
0
04 Mar 2021
Learnable Boundary Guided Adversarial Training
Jiequan Cui
Shu-Lin Liu
Liwei Wang
Jiaya Jia
OOD
AAML
19
124
0
23 Nov 2020
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
33
51
0
01 Jul 2020
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
28
38
0
26 Feb 2020
One Man's Trash is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples
Chang Xiao
Changxi Zheng
AAML
19
19
0
25 Nov 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
26
18
0
19 May 2019
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
284
5,835
0
08 Jul 2016
1