ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.02927
  4. Cited By
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval

QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval

4 March 2021
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
ArXivPDFHTML

Papers citing "QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval"

24 / 24 papers shown
Title
A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects
A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects
Aos Mulahuwaish
Basheer Qolomany
Kevin Gyorick
Jacques Bou Abdo
Mohammed Aledhari
Junaid Qadir
Kathleen Carley
Ala I. Al-Fuqaha
23
0
0
06 Apr 2025
DiffZOO: A Purely Query-Based Black-Box Attack for Red-teaming Text-to-Image Generative Model via Zeroth Order Optimization
DiffZOO: A Purely Query-Based Black-Box Attack for Red-teaming Text-to-Image Generative Model via Zeroth Order Optimization
Pucheng Dang
Xing Hu
Dong Li
Rui Zhang
Qi Guo
Kaidi Xu
DiffM
36
5
0
18 Aug 2024
Collapse-Aware Triplet Decoupling for Adversarially Robust Image
  Retrieval
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval
Qiwei Tian
Chenhao Lin
Zhengyu Zhao
Qian Li
Chao Shen
26
2
0
12 Dec 2023
ScAR: Scaling Adversarial Robustness for LiDAR Object Detection
ScAR: Scaling Adversarial Robustness for LiDAR Object Detection
Xiaohu Lu
H. Radha
AAML
3DPC
39
0
0
05 Dec 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
37
15
0
01 Oct 2023
Adversarial Attacks on Video Object Segmentation with Hard Region
  Discovery
Adversarial Attacks on Video Object Segmentation with Hard Region Discovery
P. Li
Yu Zhang
L. Yuan
Jian Zhao
Xianghua Xu
Xiaoqing Zhang
AAML
VOS
40
11
0
25 Sep 2023
Robust Ranking Explanations
Robust Ranking Explanations
Chao Chen
Chenghua Guo
Guixiang Ma
Ming Zeng
Xi Zhang
Sihong Xie
FAtt
AAML
35
0
0
08 Jul 2023
Unsupervised Multi-Criteria Adversarial Detection in Deep Image
  Retrieval
Unsupervised Multi-Criteria Adversarial Detection in Deep Image Retrieval
Yanru Xiao
Cong Wang
Xing Gao
AAML
16
0
0
09 Apr 2023
Meta Generative Attack on Person Reidentification
Meta Generative Attack on Person Reidentification
M. I. A V Subramanyam
AAML
28
8
0
16 Jan 2023
Provable Robust Saliency-based Explanations
Provable Robust Saliency-based Explanations
Chao Chen
Chenghua Guo
Guixiang Ma
Ming Zeng
Xi Zhang
Sihong Xie
AAML
FAtt
36
0
0
28 Dec 2022
A Large-scale Multiple-objective Method for Black-box Attack against
  Object Detection
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
Siyuan Liang
Longkang Li
Yanbo Fan
Xiaojun Jia
Jingzhi Li
Baoyuan Wu
Xiaochun Cao
AAML
23
34
0
16 Sep 2022
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural
  Ranking Models
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Jiawei Liu
Yangyang Kang
Di Tang
Kaisong Song
Changlong Sun
Xiaofeng Wang
Wei Lu
Xiaozhong Liu
AAML
43
40
0
14 Sep 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
26
154
0
12 Jul 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Enhancing Adversarial Robustness for Deep Metric Learning
Mo Zhou
Vishal M. Patel
AAML
24
18
0
02 Mar 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for
  Black-box Domains
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
67
64
0
27 Jan 2022
Person Re-identification Method Based on Color Attack and Joint Defence
Person Re-identification Method Based on Color Attack and Joint Defence
Yunpeng Gong
Liqing Huang
Lifei Chen
AAML
19
37
0
18 Nov 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Adversarial Attack and Defense in Deep Ranking
Adversarial Attack and Defense in Deep Ranking
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
N. Zheng
G. Hua
OOD
26
14
0
07 Jun 2021
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Xingxing Wei
Yingjie Guo
Jie Yu
AAML
14
114
0
14 Apr 2021
Practical Relative Order Attack in Deep Ranking
Practical Relative Order Attack in Deep Ranking
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
Yinghui Xu
N. Zheng
G. Hua
13
18
0
09 Mar 2021
Attention-Guided Black-box Adversarial Attacks with Large-Scale
  Multiobjective Evolutionary Optimization
Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization
Jie Wang
Z. Yin
Jing Jiang
Yang Du
AAML
44
8
0
19 Jan 2021
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
124
219
0
24 Sep 2019
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object
  Detector
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
Shang-Tse Chen
Cory Cornelius
Jason Martin
Duen Horng Chau
ObjD
150
424
0
16 Apr 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
1