Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2003.12703
Cited By
DaST: Data-free Substitute Training for Adversarial Attacks
28 March 2020
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
Re-assign community
ArXiv
PDF
HTML
Papers citing
"DaST: Data-free Substitute Training for Adversarial Attacks"
50 / 60 papers shown
Title
Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions
Yunfei Yang
Xiaojun Chen
Yuexin Xuan
Zhendong Zhao
AAML
65
0
0
23 Mar 2025
Examining the Threat Landscape: Foundation Models and Model Stealing
Ankita Raj
Deepankar Varma
Chetan Arora
AAML
73
1
0
25 Feb 2025
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
37
0
0
27 Sep 2024
Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges
Sazzad Sayyed
Milin Zhang
Shahriar Rifat
A. Swami
Michael De Lucia
Francesco Restuccia
28
1
0
31 Jul 2024
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images
Mingyuan Fan
Yang Liu
Cen Chen
Ximeng Liu
AAML
23
0
0
13 Jul 2024
DataFreeShield: Defending Adversarial Attacks without Training Data
Hyeyoon Lee
Kanghyun Choi
Dain Kwon
Sunjong Park
Mayoore S. Jaiswal
Noseong Park
Jonghyun Choi
Jinho Lee
36
0
0
21 Jun 2024
Investigating White-Box Attacks for On-Device Models
M. Zhou
Xiang Gao
Jing Wu
Kui Liu
Hailong Sun
Li Li
AAML
34
9
0
08 Feb 2024
A Generative Approach to Surrogate-based Black-box Attacks
Raha Moraffah
Huan Liu
AAML
19
0
0
05 Feb 2024
Cloud-based XAI Services for Assessing Open Repository Models Under Adversarial Attacks
Zerui Wang
Yan Liu
AAML
25
1
0
22 Jan 2024
Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training
Rongwu Xu
Zhixuan Fang
FedML
23
0
0
21 Jan 2024
MEAOD: Model Extraction Attack against Object Detectors
Zeyu Li
Chenghui Shi
Yuwen Pu
Xuhong Zhang
Yu Li
Jinbao Li
Shouling Ji
AAML
MIACV
30
3
0
22 Dec 2023
PPIDSG: A Privacy-Preserving Image Distribution Sharing Scheme with GAN in Federated Learning
Yuting Ma
Yuanzhi Yao
Xiaohua Xu
FedML
16
4
0
16 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
60
3
0
20 Nov 2023
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection
Akshit Jindal
Vikram Goyal
Saket Anand
Chetan Arora
FedML
20
2
0
08 Nov 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David E. Evans
AAML
31
6
0
26 Oct 2023
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack
Renyang Liu
Jinhong Zhang
Kwok-Yan Lam
Jun Zhao
Wei Zhou
17
1
0
15 Oct 2023
Dual Student Networks for Data-Free Model Stealing
James Beetham
Navid Kardan
Ajmal Saeed Mian
M. Shah
45
17
0
18 Sep 2023
Efficient Defense Against Model Stealing Attacks on Convolutional Neural Networks
Kacem Khaled
Mouna Dhaouadi
F. Magalhães
Gabriela Nicolescu
AAML
14
2
0
04 Sep 2023
Continual Learning From a Stream of APIs
Enneng Yang
Zhenyi Wang
Li Shen
Nan Yin
Tongliang Liu
Guibing Guo
Xingwei Wang
Dacheng Tao
CLL
27
3
0
31 Aug 2023
Latent Code Augmentation Based on Stable Diffusion for Data-free Substitute Attacks
Mingwen Shao
Lingzhuang Meng
Yuanjian Qiao
Lixu Zhang
W. Zuo
DiffM
29
0
0
24 Jul 2023
FDINet: Protecting against DNN Model Extraction via Feature Distortion Index
Hongwei Yao
Zheng Li
Haiqin Weng
Feng Xue
Kui Ren
Zhan Qin
18
4
0
20 Jun 2023
Bridging the Gap between Decision and Logits in Decision-based Knowledge Distillation for Pre-trained Language Models
Qinhong Zhou
Zonghan Yang
Peng Li
Yang Liu
22
3
0
15 Jun 2023
Extracting Cloud-based Model with Prior Knowledge
S. Zhao
Kangjie Chen
Meng Hao
Jian Zhang
Guowen Xu
Hongwei Li
Tianwei Zhang
AAML
MIACV
SILM
MLAU
SLR
36
5
0
07 Jun 2023
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems
Mingyi Zhou
Xiang Gao
Jing Wu
John C. Grundy
Xiao Chen
Chunyang Chen
Li Li
AAML
31
12
0
01 Jun 2023
Multi-Task Models Adversarial Attacks
Lijun Zhang
Xiao Liu
Kaleel Mahmood
Caiwen Ding
Hui Guan
AAML
19
0
0
20 May 2023
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data
Pratik Karmakar
D. Basu
MIACV
18
6
0
16 Feb 2023
Threatening Patch Attacks on Object Detection in Optical Remote Sensing Images
Xuxiang Sun
Gong Cheng
Lei Pei
Hongda Li
Junwei Han
AAML
15
38
0
13 Feb 2023
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Rohit Gupta
Naveed Akhtar
Gaurav Kumar Nayak
Ajmal Saeed Mian
M. Shah
AAML
26
1
0
23 Nov 2022
Data-free Defense of Black Box Models Against Adversarial Attacks
Gaurav Kumar Nayak
Inder Khatri
Ruchit Rawal
Anirban Chakraborty
AAML
25
1
0
03 Nov 2022
ODG-Q: Robust Quantization via Online Domain Generalization
Chaofan Tao
Ngai Wong
MQ
31
1
0
17 Oct 2022
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Shuai Jia
Bangjie Yin
Taiping Yao
Shouhong Ding
Chunhua Shen
Xiaokang Yang
Chao Ma
AAML
CVBM
23
48
0
13 Oct 2022
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
Siyuan Liang
Longkang Li
Yanbo Fan
Xiaojun Jia
Jingzhi Li
Baoyuan Wu
Xiaochun Cao
AAML
23
34
0
16 Sep 2022
Transferability Ranking of Adversarial Examples
Mosh Levy
Guy Amit
Yuval Elovici
Yisroel Mirsky
AAML
28
0
0
23 Aug 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable Perturbations
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
F. Khan
AAML
20
8
0
18 Jul 2022
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
22
44
0
01 Jul 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
30
5
0
16 Jun 2022
IDEAL: Query-Efficient Data-Free Learning from Black-box Models
Jie M. Zhang
Chen Chen
Lingjuan Lyu
55
14
0
23 May 2022
Towards Data-Free Model Stealing in a Hard Label Setting
Sunandini Sanyal
Sravanti Addepalli
R. Venkatesh Babu
AAML
24
85
0
23 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OOD
AAML
11
17
0
03 Apr 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
30
21
0
09 Mar 2022
Enhance transferability of adversarial examples with model architecture
Mingyuan Fan
Wenzhong Guo
Shengxing Yu
Zuobin Ying
Ximeng Liu
SILM
AAML
13
7
0
28 Feb 2022
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
Chi Hong
Jiyue Huang
L. Chen
19
2
0
31 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
22
70
0
22 Jan 2022
Data-Free Knowledge Transfer: A Survey
Yuang Liu
Wei Zhang
Jun Wang
Jianyong Wang
29
48
0
31 Dec 2021
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks
Kaleel Mahmood
Rigel Mahmood
Ethan Rathbun
Marten van Dijk
AAML
19
22
0
29 Sep 2021
A Novel Data Encryption Method Inspired by Adversarial Attacks
Praveen Fernando
Jin Wei-Kocsis
AAML
13
2
0
14 Sep 2021
Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction
Zhenrui Yue
Zhankui He
Huimin Zeng
Julian McAuley
MLAU
AAML
9
65
0
01 Sep 2021
On the Robustness of Domain Adaption to Adversarial Attacks
Liyuan Zhang
Yuhang Zhou
Lei Zhang
OOD
AAML
8
2
0
04 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Learning with Noisy Labels via Sparse Regularization
Xiong Zhou
Xianming Liu
Chenyang Wang
Deming Zhai
Junjun Jiang
Xiangyang Ji
NoLa
26
51
0
31 Jul 2021
1
2
Next