ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.12703
  4. Cited By
DaST: Data-free Substitute Training for Adversarial Attacks

DaST: Data-free Substitute Training for Adversarial Attacks

28 March 2020
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
ArXivPDFHTML

Papers citing "DaST: Data-free Substitute Training for Adversarial Attacks"

10 / 60 papers shown
Title
Query Attack by Multi-Identity Surrogates
Query Attack by Multi-Identity Surrogates
Sizhe Chen
Zhehao Huang
Qinghua Tao
X. Huang
AAML
27
4
0
31 May 2021
Black-Box Dissector: Towards Erasing-based Hard-Label Model Stealing
  Attack
Black-Box Dissector: Towards Erasing-based Hard-Label Model Stealing Attack
Yixu Wang
Jie Li
Hong Liu
Yan Wang
Yongjian Wu
Feiyue Huang
Rongrong Ji
AAML
25
34
0
03 May 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
60
63
0
26 Apr 2021
Performance Evaluation of Adversarial Attacks: Discrepancies and
  Solutions
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Jing Wu
Mingyi Zhou
Ce Zhu
Yipeng Liu
Mehrtash Harandi
Li Li
AAML
44
10
0
22 Apr 2021
Learning Defense Transformers for Counterattacking Adversarial Examples
Learning Defense Transformers for Counterattacking Adversarial Examples
Jincheng Li
Jiezhang Cao
Yifan Zhang
Jian Chen
Mingkui Tan
AAML
29
2
0
13 Mar 2021
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
11
44
0
04 Mar 2021
Practical No-box Adversarial Attacks against DNNs
Practical No-box Adversarial Attacks against DNNs
Qizhang Li
Yiwen Guo
Hao Chen
AAML
19
57
0
04 Dec 2020
ES Attack: Model Stealing against Deep Neural Networks without Data
  Hurdles
ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Xiaoyong Yuan
Lei Ding
Lan Zhang
Xiaolin Li
D. Wu
17
40
0
21 Sep 2020
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
261
3,109
0
04 Nov 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,835
0
08 Jul 2016
Previous
12