ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.12703
  4. Cited By
DaST: Data-free Substitute Training for Adversarial Attacks

DaST: Data-free Substitute Training for Adversarial Attacks

28 March 2020
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
ArXivPDFHTML

Papers citing "DaST: Data-free Substitute Training for Adversarial Attacks"

50 / 60 papers shown
Title
Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions
Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions
Yunfei Yang
Xiaojun Chen
Yuexin Xuan
Zhendong Zhao
AAML
65
0
0
23 Mar 2025
Examining the Threat Landscape: Foundation Models and Model Stealing
Examining the Threat Landscape: Foundation Models and Model Stealing
Ankita Raj
Deepankar Varma
Chetan Arora
AAML
73
1
0
25 Feb 2025
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
37
0
0
27 Sep 2024
Resilience and Security of Deep Neural Networks Against Intentional and
  Unintentional Perturbations: Survey and Research Challenges
Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges
Sazzad Sayyed
Milin Zhang
Shahriar Rifat
A. Swami
Michael De Lucia
Francesco Restuccia
28
1
0
31 Jul 2024
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled
  Images
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images
Mingyuan Fan
Yang Liu
Cen Chen
Ximeng Liu
AAML
23
0
0
13 Jul 2024
DataFreeShield: Defending Adversarial Attacks without Training Data
DataFreeShield: Defending Adversarial Attacks without Training Data
Hyeyoon Lee
Kanghyun Choi
Dain Kwon
Sunjong Park
Mayoore S. Jaiswal
Noseong Park
Jonghyun Choi
Jinho Lee
36
0
0
21 Jun 2024
Investigating White-Box Attacks for On-Device Models
Investigating White-Box Attacks for On-Device Models
M. Zhou
Xiang Gao
Jing Wu
Kui Liu
Hailong Sun
Li Li
AAML
34
9
0
08 Feb 2024
A Generative Approach to Surrogate-based Black-box Attacks
A Generative Approach to Surrogate-based Black-box Attacks
Raha Moraffah
Huan Liu
AAML
19
0
0
05 Feb 2024
Cloud-based XAI Services for Assessing Open Repository Models Under
  Adversarial Attacks
Cloud-based XAI Services for Assessing Open Repository Models Under Adversarial Attacks
Zerui Wang
Yan Liu
AAML
25
1
0
22 Jan 2024
Tempo: Confidentiality Preservation in Cloud-Based Neural Network
  Training
Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training
Rongwu Xu
Zhixuan Fang
FedML
23
0
0
21 Jan 2024
MEAOD: Model Extraction Attack against Object Detectors
MEAOD: Model Extraction Attack against Object Detectors
Zeyu Li
Chenghui Shi
Yuwen Pu
Xuhong Zhang
Yu Li
Jinbao Li
Shouling Ji
AAML
MIACV
30
3
0
22 Dec 2023
PPIDSG: A Privacy-Preserving Image Distribution Sharing Scheme with GAN
  in Federated Learning
PPIDSG: A Privacy-Preserving Image Distribution Sharing Scheme with GAN in Federated Learning
Yuting Ma
Yuanzhi Yao
Xiaohua Xu
FedML
16
4
0
16 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
60
3
0
20 Nov 2023
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based
  sample selection
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection
Akshit Jindal
Vikram Goyal
Saket Anand
Chetan Arora
FedML
20
2
0
08 Nov 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David E. Evans
AAML
31
6
0
26 Oct 2023
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model
  Extraction Attack
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack
Renyang Liu
Jinhong Zhang
Kwok-Yan Lam
Jun Zhao
Wei Zhou
15
1
0
15 Oct 2023
Dual Student Networks for Data-Free Model Stealing
Dual Student Networks for Data-Free Model Stealing
James Beetham
Navid Kardan
Ajmal Saeed Mian
M. Shah
45
17
0
18 Sep 2023
Efficient Defense Against Model Stealing Attacks on Convolutional Neural
  Networks
Efficient Defense Against Model Stealing Attacks on Convolutional Neural Networks
Kacem Khaled
Mouna Dhaouadi
F. Magalhães
Gabriela Nicolescu
AAML
14
2
0
04 Sep 2023
Continual Learning From a Stream of APIs
Continual Learning From a Stream of APIs
Enneng Yang
Zhenyi Wang
Li Shen
Nan Yin
Tongliang Liu
Guibing Guo
Xingwei Wang
Dacheng Tao
CLL
27
3
0
31 Aug 2023
Latent Code Augmentation Based on Stable Diffusion for Data-free
  Substitute Attacks
Latent Code Augmentation Based on Stable Diffusion for Data-free Substitute Attacks
Mingwen Shao
Lingzhuang Meng
Yuanjian Qiao
Lixu Zhang
W. Zuo
DiffM
29
0
0
24 Jul 2023
FDINet: Protecting against DNN Model Extraction via Feature Distortion
  Index
FDINet: Protecting against DNN Model Extraction via Feature Distortion Index
Hongwei Yao
Zheng Li
Haiqin Weng
Feng Xue
Kui Ren
Zhan Qin
18
4
0
20 Jun 2023
Bridging the Gap between Decision and Logits in Decision-based Knowledge
  Distillation for Pre-trained Language Models
Bridging the Gap between Decision and Logits in Decision-based Knowledge Distillation for Pre-trained Language Models
Qinhong Zhou
Zonghan Yang
Peng Li
Yang Liu
22
3
0
15 Jun 2023
Extracting Cloud-based Model with Prior Knowledge
Extracting Cloud-based Model with Prior Knowledge
S. Zhao
Kangjie Chen
Meng Hao
Jian Zhang
Guowen Xu
Hongwei Li
Tianwei Zhang
AAML
MIACV
SILM
MLAU
SLR
36
5
0
07 Jun 2023
ModelObfuscator: Obfuscating Model Information to Protect Deployed
  ML-based Systems
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems
Mingyi Zhou
Xiang Gao
Jing Wu
John C. Grundy
Xiao Chen
Chunyang Chen
Li Li
AAML
31
12
0
01 Jun 2023
Multi-Task Models Adversarial Attacks
Multi-Task Models Adversarial Attacks
Lijun Zhang
Xiao Liu
Kaleel Mahmood
Caiwen Ding
Hui Guan
AAML
19
0
0
20 May 2023
Marich: A Query-efficient Distributionally Equivalent Model Extraction
  Attack using Public Data
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data
Pratik Karmakar
D. Basu
MIACV
18
6
0
16 Feb 2023
Threatening Patch Attacks on Object Detection in Optical Remote Sensing
  Images
Threatening Patch Attacks on Object Detection in Optical Remote Sensing Images
Xuxiang Sun
Gong Cheng
Lei Pei
Hongda Li
Junwei Han
AAML
15
38
0
13 Feb 2023
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action
  Recognition
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Rohit Gupta
Naveed Akhtar
Gaurav Kumar Nayak
Ajmal Saeed Mian
M. Shah
AAML
26
1
0
23 Nov 2022
Data-free Defense of Black Box Models Against Adversarial Attacks
Data-free Defense of Black Box Models Against Adversarial Attacks
Gaurav Kumar Nayak
Inder Khatri
Ruchit Rawal
Anirban Chakraborty
AAML
25
1
0
03 Nov 2022
ODG-Q: Robust Quantization via Online Domain Generalization
ODG-Q: Robust Quantization via Online Domain Generalization
Chaofan Tao
Ngai Wong
MQ
31
1
0
17 Oct 2022
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face
  Recognition
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Shuai Jia
Bangjie Yin
Taiping Yao
Shouhong Ding
Chunhua Shen
Xiaokang Yang
Chao Ma
AAML
CVBM
21
48
0
13 Oct 2022
A Large-scale Multiple-objective Method for Black-box Attack against
  Object Detection
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
Siyuan Liang
Longkang Li
Yanbo Fan
Xiaojun Jia
Jingzhi Li
Baoyuan Wu
Xiaochun Cao
AAML
23
34
0
16 Sep 2022
Transferability Ranking of Adversarial Examples
Transferability Ranking of Adversarial Examples
Mosh Levy
Guy Amit
Yuval Elovici
Yisroel Mirsky
AAML
28
0
0
23 Aug 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable
  Perturbations
Adversarial Pixel Restoration as a Pretext Task for Transferable Perturbations
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
F. Khan
AAML
20
8
0
18 Jul 2022
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean
  Label
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
22
44
0
01 Jul 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
30
5
0
16 Jun 2022
IDEAL: Query-Efficient Data-Free Learning from Black-box Models
IDEAL: Query-Efficient Data-Free Learning from Black-box Models
Jie M. Zhang
Chen Chen
Lingjuan Lyu
55
14
0
23 May 2022
Towards Data-Free Model Stealing in a Hard Label Setting
Towards Data-Free Model Stealing in a Hard Label Setting
Sunandini Sanyal
Sravanti Addepalli
R. Venkatesh Babu
AAML
24
85
0
23 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
DST: Dynamic Substitute Training for Data-free Black-box Attack
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OOD
AAML
11
17
0
03 Apr 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
30
21
0
09 Mar 2022
Enhance transferability of adversarial examples with model architecture
Enhance transferability of adversarial examples with model architecture
Mingyuan Fan
Wenzhong Guo
Shengxing Yu
Zuobin Ying
Ximeng Liu
SILM
AAML
11
7
0
28 Feb 2022
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
Chi Hong
Jiyue Huang
L. Chen
19
2
0
31 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
22
70
0
22 Jan 2022
Data-Free Knowledge Transfer: A Survey
Data-Free Knowledge Transfer: A Survey
Yuang Liu
Wei Zhang
Jun Wang
Jianyong Wang
27
48
0
31 Dec 2021
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art
  Black-Box Attacks
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks
Kaleel Mahmood
Rigel Mahmood
Ethan Rathbun
Marten van Dijk
AAML
19
22
0
29 Sep 2021
A Novel Data Encryption Method Inspired by Adversarial Attacks
A Novel Data Encryption Method Inspired by Adversarial Attacks
Praveen Fernando
Jin Wei-Kocsis
AAML
11
2
0
14 Sep 2021
Black-Box Attacks on Sequential Recommenders via Data-Free Model
  Extraction
Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction
Zhenrui Yue
Zhankui He
Huimin Zeng
Julian McAuley
MLAU
AAML
9
65
0
01 Sep 2021
On the Robustness of Domain Adaption to Adversarial Attacks
On the Robustness of Domain Adaption to Adversarial Attacks
Liyuan Zhang
Yuhang Zhou
Lei Zhang
OOD
AAML
8
2
0
04 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Learning with Noisy Labels via Sparse Regularization
Learning with Noisy Labels via Sparse Regularization
Xiong Zhou
Xianming Liu
Chenyang Wang
Deming Zhai
Junjun Jiang
Xiangyang Ji
NoLa
26
51
0
31 Jul 2021
12
Next