ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2012.02525
  4. Cited By
Practical No-box Adversarial Attacks against DNNs

Practical No-box Adversarial Attacks against DNNs

Neural Information Processing Systems (NeurIPS), 2020
4 December 2020
Qizhang Li
Yiwen Guo
Hao Chen
    AAML
ArXiv (abs)PDFHTML

Papers citing "Practical No-box Adversarial Attacks against DNNs"

29 / 29 papers shown
Are Neuro-Inspired Multi-Modal Vision-Language Models Resilient to Membership Inference Privacy Leakage?
Are Neuro-Inspired Multi-Modal Vision-Language Models Resilient to Membership Inference Privacy Leakage?
David Amebley
Sayanton Dibbo
AAML
214
0
0
24 Nov 2025
Text Adversarial Attacks with Dynamic Outputs
Text Adversarial Attacks with Dynamic Outputs
Wenqiang Wang
Siyuan Liang
Xiao Yan
Xiaochun Cao
AAML
157
0
0
26 Sep 2025
Multi-task Adversarial Attacks against Black-box Model with Few-shot Queries
Multi-task Adversarial Attacks against Black-box Model with Few-shot QueriesAnnual Meeting of the Association for Computational Linguistics (ACL), 2025
Wenqiang Wang
Yan Xiao
Hao Lin
Yangshijie Zhang
Xiaochun Cao
AAML
197
1
0
10 Aug 2025
One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP
One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP
Binyan Xu
Xilin Dai
Di Tang
Kehuan Zhang
AAML
332
6
0
26 May 2025
Texture- and Shape-based Adversarial Attacks for Overhead Image Vehicle Detection
Texture- and Shape-based Adversarial Attacks for Overhead Image Vehicle DetectionInternational Conference on Information Photonics (ICIP), 2024
Mikael Yeghiazaryan
Sai Abhishek Siddhartha Namburu
Emily Kim
Stanislav Panev
Celso de Melo
Brent Lance
Fernando de la Torre
AAML
449
0
0
20 Dec 2024
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in
  Frequency Domain
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency DomainNeural Information Processing Systems (NeurIPS), 2024
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
312
9
0
16 Oct 2024
Adversarial Attacks on Hidden Tasks in Multi-Task Learning
Adversarial Attacks on Hidden Tasks in Multi-Task Learning
Yu Zhe
Rei Nagaike
Daiki Nishiyama
Kazuto Fukuchi
Jun Sakuma
AAML
368
1
0
24 May 2024
Towards Evaluating Transfer-based Attacks Systematically, Practically,
  and Fairly
Towards Evaluating Transfer-based Attacks Systematically, Practically, and FairlyNeural Information Processing Systems (NeurIPS), 2023
Qizhang Li
Yiwen Guo
Wangmeng Zuo
Hao Chen
ELMAAML
326
9
0
02 Nov 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David Evans
AAML
415
8
0
26 Oct 2023
Hard No-Box Adversarial Attack on Skeleton-Based Human Action
  Recognition with Skeleton-Motion-Informed Gradient
Hard No-Box Adversarial Attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed GradientIEEE International Conference on Computer Vision (ICCV), 2023
Zhengzhi Lu
He Wang
Ziyi Chang
Guoan Yang
Hubert P. H. Shum
AAML
280
17
0
10 Aug 2023
Improving Transferability of Adversarial Examples via Bayesian Attacks
Improving Transferability of Adversarial Examples via Bayesian Attacks
Qizhang Li
Yiwen Guo
Xiaochen Yang
W. Zuo
Hao Chen
AAMLBDL
347
2
0
21 Jul 2023
GLOW: Global Layout Aware Attacks on Object Detection
GLOW: Global Layout Aware Attacks on Object DetectionComputer Vision and Pattern Recognition (CVPR), 2023
Buyu Liu
BaoJun
Jianping Fan
Xi Peng
Kui Ren
Jun Yu
AAML
319
2
0
27 Feb 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
386
114
0
29 Dec 2022
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks
  against Phishing Website Detectors using Machine Learning
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine LearningAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Ying Yuan
Giovanni Apruzzese
Mauro Conti
AAML
410
28
0
24 Oct 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAMLMLAU
359
6
0
29 Sep 2022
Sound and Complete Verification of Polynomial Networks
Sound and Complete Verification of Polynomial NetworksNeural Information Processing Systems (NeurIPS), 2022
Elias Abad Rocamora
Mehmet Fatih Şahin
Fanghui Liu
Grigorios G. Chrysos
Volkan Cevher
257
6
0
15 Sep 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable
  Perturbations
Adversarial Pixel Restoration as a Pretext Task for Transferable PerturbationsBritish Machine Vision Conference (BMVC), 2022
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
Fahad Shahbaz Khan
AAML
238
8
0
18 Jul 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial RobustnessInternational Conference on Learning Representations (ICLR), 2022
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
341
18
0
23 May 2022
Zero-Query Transfer Attacks on Context-Aware Object Detectors
Zero-Query Transfer Attacks on Context-Aware Object DetectorsComputer Vision and Pattern Recognition (CVPR), 2022
Zikui Cai
S. Rane
Alejandro E. Brito
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
232
28
0
29 Mar 2022
Reverse Engineering of Imperceptible Adversarial Image Perturbations
Reverse Engineering of Imperceptible Adversarial Image PerturbationsInternational Conference on Learning Representations (ICLR), 2022
Yifan Gong
Yuguang Yao
Yize Li
Yimeng Zhang
Xiaoming Liu
Xinyu Lin
Sijia Liu
AAML
376
25
0
26 Mar 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
417
17
0
09 Mar 2022
Adversarial Attack across Datasets
Adversarial Attack across Datasets
Yunxiao Qin
Yuanhao Xiong
Jinfeng Yi
Lihong Cao
Cho-Jui Hsieh
AAML
330
5
0
13 Oct 2021
Training Meta-Surrogate Model for Transferable Adversarial Attack
Training Meta-Surrogate Model for Transferable Adversarial Attack
Yunxiao Qin
Yuanhao Xiong
Jinfeng Yi
Cho-Jui Hsieh
AAML
328
30
0
05 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
521
311
0
01 Aug 2021
Adversarial for Good? How the Adversarial ML Community's Values Impede
  Socially Beneficial Uses of Attacks
Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks
Kendra Albert
Maggie K. Delano
B. Kulynych
Ramnath Kumar
AAML
476
5
0
11 Jul 2021
Adversarial Attack on Graph Neural Networks as An Influence Maximization
  Problem
Adversarial Attack on Graph Neural Networks as An Influence Maximization ProblemWeb Search and Data Mining (WSDM), 2021
Jiaqi Ma
Junwei Deng
Qiaozhu Mei
AAMLGNN
170
41
0
21 Jun 2021
Certification of embedded systems based on Machine Learning: A survey
Certification of embedded systems based on Machine Learning: A survey
Guillaume Vidot
Christophe Gabreau
I. Ober
Iulian Ober
209
13
0
14 Jun 2021
Can Targeted Adversarial Examples Transfer When the Source and Target
  Models Have No Label Space Overlap?
Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Nathan Inkawhich
Kevin J. Liang
Jingyang Zhang
Huanrui Yang
Xue Yang
Yiran Chen
AAML
160
6
0
17 Mar 2021
Backpropagating Linearly Improves Transferability of Adversarial
  Examples
Backpropagating Linearly Improves Transferability of Adversarial Examples
Yiwen Guo
Qizhang Li
Hao Chen
FedMLAAML
389
132
0
07 Dec 2020
1
Page 1 of 1