ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.07435
  4. Cited By
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
v1v2 (latest)

AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows

Neural Information Processing Systems (NeurIPS), 2020
15 July 2020
H. M. Dolatabadi
S. Erfani
C. Leckie
    AAML
ArXiv (abs)PDFHTMLGithub (47★)

Papers citing "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows"

34 / 34 papers shown
Adaptive Token Merging for Efficient Transformer Semantic Communication at the Edge
Adaptive Token Merging for Efficient Transformer Semantic Communication at the Edge
Omar Erak
Omar Alhussein
H. Abou-zeid
Mehdi Bennis
Sami Muhaidat
216
2
0
12 Sep 2025
Adversarial Examples in Environment Perception for Automated Driving (Review)
Adversarial Examples in Environment Perception for Automated Driving (Review)
Jun Yan
Huilin Yin
AAML
372
1
0
11 Apr 2025
Cross-Modal Consistency Learning for Sign Language Recognition
Cross-Modal Consistency Learning for Sign Language Recognition
Kepeng Wu
Zecheng Li
Weichao Zhao
Hezhen Hu
Wengang Zhou
SLR
386
3
0
16 Mar 2025
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
566
1
0
30 Dec 2024
Design of Restricted Normalizing Flow towards Arbitrary Stochastic
  Policy with Computational Efficiency
Design of Restricted Normalizing Flow towards Arbitrary Stochastic Policy with Computational Efficiency
Taisuke Kobayashi
Takumi Aotani
416
6
0
17 Dec 2024
LiRA: Light-Robust Adversary for Model-based Reinforcement Learning in Real World
LiRA: Light-Robust Adversary for Model-based Reinforcement Learning in Real World
Taisuke Kobayashi
556
2
0
29 Sep 2024
DifAttack++: Query-Efficient Black-Box Adversarial Attack via Hierarchical Disentangled Feature Space in Cross-Domain
DifAttack++: Query-Efficient Black-Box Adversarial Attack via Hierarchical Disentangled Feature Space in Cross-Domain
Jun Liu
Jiantao Zhou
Jiandian Zeng
Jinyu Tian
Zheng Li
435
2
0
05 Jun 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited
  Black-box Scenario
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Renyang Liu
Kwok-Yan Lam
Wei Zhou
Sixing Wu
Jun Zhao
Dongting Hu
Mingming Gong
AAML
299
4
0
30 Mar 2024
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
Meixi Zheng
Xuanchen Yan
Zihao Zhu
Hongrui Chen
Baoyuan Wu
ELMMLAUAAML
490
24
0
28 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
327
1
0
12 Dec 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David Evans
AAML
435
8
0
26 Oct 2023
AFLOW: Developing Adversarial Examples under Extremely Noise-limited
  Settings
AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings
Renyang Liu
Jinhong Zhang
Haoran Li
Jin Zhang
Yuanyu Wang
Wei Zhou
AAML
222
7
0
15 Oct 2023
Boosting Black-box Attack to Deep Neural Networks with Conditional
  Diffusion Models
Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion ModelsIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Renyang Liu
Wei Zhou
Tianwei Zhang
Kangjie Chen
Jun Zhao
Kwok-Yan Lam
341
23
0
11 Oct 2023
OMG-ATTACK: Self-Supervised On-Manifold Generation of Transferable
  Evasion Attacks
OMG-ATTACK: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks
Ofir Bar Tal
Adi Haviv
Amit H. Bermano
AAML
228
0
0
05 Oct 2023
DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature
  Space
DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature SpaceAAAI Conference on Artificial Intelligence (AAAI), 2023
Liu Jun
Jiantao Zhou
Jiandian Zeng
Jinyu Tian
243
2
0
26 Sep 2023
VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion
  Models
VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion ModelsNeural Information Processing Systems (NeurIPS), 2023
Sheng-Yen Chou
Pin-Yu Chen
Tsung-Yi Ho
DiffM
473
86
0
12 Jun 2023
Attacking Perceptual Similarity Metrics
Attacking Perceptual Similarity Metrics
Abhijay Ghildyal
Yifan Zhang
AAML
332
13
0
15 May 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
541
35
0
19 Feb 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta LearningIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2023
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
338
54
0
01 Jan 2023
How to Backdoor Diffusion Models?
How to Backdoor Diffusion Models?Computer Vision and Pattern Recognition (CVPR), 2022
Sheng-Yen Chou
Pin-Yu Chen
Tsung-Yi Ho
DiffMSILM
563
131
0
11 Dec 2022
Imperceptible Adversarial Attack via Invertible Neural Networks
Imperceptible Adversarial Attack via Invertible Neural NetworksAAAI Conference on Artificial Intelligence (AAAI), 2022
Zihan Chen
Zifan Wang
Junjie Huang
Wentao Zhao
Xiao Liu
Dejian Guan
AAML
452
32
0
28 Nov 2022
Learning Multivariate CDFs and Copulas using Tensor Factorization
Learning Multivariate CDFs and Copulas using Tensor Factorization
Magda Amiridi
N. Sidiropoulos
246
2
0
13 Oct 2022
On the Role of Generalization in Transferability of Adversarial Examples
On the Role of Generalization in Transferability of Adversarial ExamplesConference on Uncertainty in Artificial Intelligence (UAI), 2022
Yilin Wang
Farzan Farnia
AAML
220
12
0
18 Jun 2022
PublicCheck: Public Integrity Verification for Services of Run-time Deep
  Models
PublicCheck: Public Integrity Verification for Services of Run-time Deep ModelsIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Shuo Wang
Sharif Abuadbba
Sidharth Agarwal
Kristen Moore
Ruoxi Sun
Minhui Xue
Surya Nepal
S. Çamtepe
S. Kanhere
HILM
295
13
0
21 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easyInternational Conference on Learning Representations (ICLR), 2022
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAMLMLAU
325
32
0
16 Mar 2022
Suppressing Static Visual Cues via Normalizing Flows for Self-Supervised
  Video Representation Learning
Suppressing Static Visual Cues via Normalizing Flows for Self-Supervised Video Representation Learning
Manlin Zhang
Jinpeng Wang
A. J. Ma
218
9
0
07 Dec 2021
Energy Attack: On Transferring Adversarial Examples
Energy Attack: On Transferring Adversarial Examples
Ruoxi Shi
Borui Yang
Yangzhou Jiang
Chenglong Zhao
Bingbing Ni
AAML
191
2
0
09 Sep 2021
Semantic Perturbations with Normalizing Flows for Improved
  Generalization
Semantic Perturbations with Normalizing Flows for Improved Generalization
Oğuz Kaan Yüksel
Sebastian U. Stich
Martin Jaggi
Tatjana Chavdarova
AAML
261
13
0
18 Aug 2021
On the Robustness of Domain Adaption to Adversarial Attacks
On the Robustness of Domain Adaption to Adversarial Attacks
Liyuan Zhang
Yuhang Zhou
Lei Zhang
OODAAML
199
2
0
04 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
545
315
0
01 Aug 2021
Generative Models for Security: Attacks, Defenses, and Opportunities
Generative Models for Security: Attacks, Defenses, and Opportunities
L. A. Bauer
Vincent Bindschaedler
314
5
0
21 Jul 2021
Adversarial for Good? How the Adversarial ML Community's Values Impede
  Socially Beneficial Uses of Attacks
Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks
Kendra Albert
Maggie K. Delano
B. Kulynych
Ramnath Kumar
AAML
505
5
0
11 Jul 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial
  Attack
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Lin Wang
AAML
284
2
0
19 Mar 2021
When Machine Learning Meets Privacy: A Survey and Outlook
When Machine Learning Meets Privacy: A Survey and OutlookACM Computing Surveys (ACM CSUR), 2020
B. Liu
Ming Ding
Sina shaham
W. Rahayu
F. Farokhi
Zihuai Lin
351
336
0
24 Nov 2020
1
Page 1 of 1