ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1904.01160
  4. Cited By
Curls & Whey: Boosting Black-Box Adversarial Attacks

Curls & Whey: Boosting Black-Box Adversarial Attacks

2 April 2019
Yucheng Shi
Siyu Wang
Yahong Han
    AAML
ArXivPDFHTML

Papers citing "Curls & Whey: Boosting Black-Box Adversarial Attacks"

19 / 19 papers shown
Title
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Zhun Zhang
Yi Zeng
Qihe Liu
Shijie Zhou
AAML
36
0
0
16 Apr 2024
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing-Wu Guo
Yihao Huang
Xiaofei Xie
L. Ma
Jianjun Zhao
AAML
26
47
0
23 Apr 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual
  Example
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
21
3
0
30 Jan 2023
General Adversarial Defense Against Black-box Attacks via Pixel Level
  and Feature Level Distribution Alignments
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Philip H. S. Torr
Jiaya Jia
AAML
24
2
0
11 Dec 2022
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Shehzeen Samarah Hussain
Todd P. Huster
Chris Mesterharm
Paarth Neekhara
Kevin R. An
Malhar Jere
Harshvardhan Digvijay Sikka
F. Koushanfar
AAML
8
6
0
09 Jun 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera
  Image Pipelines
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to
  CNNs
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
38
78
0
06 Oct 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Attack to Fool and Explain Deep Networks
Attack to Fool and Explain Deep Networks
Naveed Akhtar
M. Jalwana
Bennamoun
Ajmal Saeed Mian
AAML
22
33
0
20 Jun 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
60
63
0
26 Apr 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
XiaoFeng Wang
Shanqing Guo
AAML
37
15
0
19 Mar 2021
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
8
44
0
04 Mar 2021
Learnable Boundary Guided Adversarial Training
Learnable Boundary Guided Adversarial Training
Jiequan Cui
Shu-Lin Liu
Liwei Wang
Jiaya Jia
OOD
AAML
19
124
0
23 Nov 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
33
51
0
01 Jul 2020
Adversarial Ranking Attack and Defense
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
28
38
0
26 Feb 2020
One Man's Trash is Another Man's Treasure: Resisting Adversarial
  Examples by Adversarial Examples
One Man's Trash is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples
Chang Xiao
Changxi Zheng
AAML
19
19
0
25 Nov 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the
  Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer
  Domain
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
26
18
0
19 May 2019
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
284
5,835
0
08 Jul 2016
1