ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2203.04607
  4. Cited By
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
v1v2v3 (latest)

Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation

9 March 2022
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
    AAML
ArXiv (abs)PDFHTML

Papers citing "Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation"

50 / 79 papers shown
On Synthetic Texture Datasets: Challenges, Creation, and Curation
On Synthetic Texture Datasets: Challenges, Creation, and Curation
Blaine Hoak
Patrick McDaniel
EGVM
492
0
0
16 Sep 2024
Any Target Can be Offense: Adversarial Example Generation via
  Generalized Latent Infection
Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection
Youheng Sun
Shengming Yuan
Xuanhan Wang
Lianli Gao
Jingkuan Song
AAML
316
7
0
17 Jul 2024
Adversarial Attacks on Hidden Tasks in Multi-Task Learning
Adversarial Attacks on Hidden Tasks in Multi-Task Learning
Yu Zhe
Rei Nagaike
Daiki Nishiyama
Kazuto Fukuchi
Jun Sakuma
AAML
337
1
0
24 May 2024
LFAA: Crafting Transferable Targeted Adversarial Examples with
  Low-Frequency Perturbations
LFAA: Crafting Transferable Targeted Adversarial Examples with Low-Frequency PerturbationsEuropean Conference on Artificial Intelligence (ECAI), 2023
Kunyu Wang
Juluan Shi
Wenxuan Wang
AAML
327
7
0
31 Oct 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David Evans
AAML
397
8
0
26 Oct 2023
Practical Deep Dispersed Watermarking with Synchronization and Fusion
Practical Deep Dispersed Watermarking with Synchronization and FusionACM Multimedia (ACM MM), 2023
Hengchang Guo
Qilong Zhang
Junwei Luo
Feng Guo
Wenbin Zhang
Xiaodong Su
Minglei Li
WIGM
178
20
0
23 Oct 2023
Improving the Transferability of Adversarial Examples with Arbitrary
  Style Transfer
Improving the Transferability of Adversarial Examples with Arbitrary Style TransferACM Multimedia (ACM MM), 2023
Zhijin Ge
Fanhua Shang
Hongying Liu
Yuanyuan Liu
Liang Wan
Wei Feng
Xiaosen Wang
AAML
271
33
0
21 Aug 2023
Boosting Adversarial Transferability with Learnable Patch-wise Masks
Boosting Adversarial Transferability with Learnable Patch-wise MasksIEEE transactions on multimedia (IEEE TMM), 2023
Xingxing Wei
Shiji Zhao
AAML
223
17
0
28 Jun 2023
Improving the Transferability of Adversarial Samples by Path-Augmented
  Method
Improving the Transferability of Adversarial Samples by Path-Augmented MethodComputer Vision and Pattern Recognition (CVPR), 2023
Jianping Zhang
Shu Yang
Wenxuan Wang
Yichen Li
Weibin Wu
Xiaosen Wang
Yuxin Su
Michael R. Lyu
AAML
218
72
0
28 Mar 2023
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted AttacksNeural Information Processing Systems (NeurIPS), 2022
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
266
69
0
05 Oct 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAMLMLAU
326
6
0
29 Sep 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial AttackEuropean Conference on Computer Vision (ECCV), 2022
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
328
237
0
12 Jul 2022
Zero-Query Transfer Attacks on Context-Aware Object Detectors
Zero-Query Transfer Attacks on Context-Aware Object DetectorsComputer Vision and Pattern Recognition (CVPR), 2022
Zikui Cai
S. Rane
Alejandro E. Brito
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
212
27
0
29 Mar 2022
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Practical Evaluation of Adversarial Robustness via Adaptive Auto AttackComputer Vision and Pattern Recognition (CVPR), 2022
Ye Liu
Yaya Cheng
Lianli Gao
Xianglong Liu
Qilong Zhang
Jingkuan Song
AAML
348
74
0
10 Mar 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for
  Black-box Domains
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box DomainsInternational Conference on Learning Representations (ICLR), 2022
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
404
83
0
27 Jan 2022
Feature Space Targeted Attacks by Statistic Alignment
Feature Space Targeted Attacks by Statistic AlignmentInternational Joint Conference on Artificial Intelligence (IJCAI), 2021
Lianli Gao
Yaya Cheng
Qilong Zhang
Xing Xu
Jingkuan Song
AAML
193
36
0
25 May 2021
Staircase Sign Method for Boosting Adversarial Attacks
Staircase Sign Method for Boosting Adversarial Attacks
Qilong Zhang
Xiaosu Zhu
Jingkuan Song
Lianli Gao
Heng Tao Shen
AAML
180
16
0
20 Apr 2021
Patch-wise++ Perturbation for Adversarial Targeted Attacks
Patch-wise++ Perturbation for Adversarial Targeted Attacks
Lianli Gao
Qilong Zhang
Jingkuan Song
Heng Tao Shen
AAML
290
25
0
31 Dec 2020
Practical No-box Adversarial Attacks against DNNs
Practical No-box Adversarial Attacks against DNNsNeural Information Processing Systems (NeurIPS), 2020
Qizhang Li
Yiwen Guo
Hao Chen
AAML
241
68
0
04 Dec 2020
Adversarial Robustness Across Representation Spaces
Adversarial Robustness Across Representation SpacesComputer Vision and Pattern Recognition (CVPR), 2020
Pranjal Awasthi
George Yu
Chun-Sung Ferng
Andrew Tomkins
Da-Cheng Juan
OODAAML
213
11
0
01 Dec 2020
Patch-wise Attack for Fooling Deep Neural Network
Patch-wise Attack for Fooling Deep Neural NetworkEuropean Conference on Computer Vision (ECCV), 2020
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
300
180
0
14 Jul 2020
Understanding Adversarial Examples from the Mutual Influence of Images
  and Perturbations
Understanding Adversarial Examples from the Mutual Influence of Images and PerturbationsComputer Vision and Pattern Recognition (CVPR), 2020
Chaoning Zhang
Philipp Benz
Tooba Imtiaz
In-So Kweon
SSLAAML
337
137
0
13 Jul 2020
A Self-supervised Approach for Adversarial Robustness
A Self-supervised Approach for Adversarial Robustness
Muzammal Naseer
Salman Khan
Munawar Hayat
Fahad Shahbaz Khan
Fatih Porikli
AAML
243
344
0
08 Jun 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2020
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
221
170
0
28 Mar 2020
Skip Connections Matter: On the Transferability of Adversarial Examples
  Generated with ResNets
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNetsInternational Conference on Learning Representations (ICLR), 2020
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Jiabo He
AAMLSILM
340
352
0
14 Feb 2020
Enhancing Cross-task Black-Box Transferability of Adversarial Examples
  with Dispersion Reduction
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion ReductionComputer Vision and Pattern Recognition (CVPR), 2019
Yantao Lu
Yunhan Jia
Jianyu Wang
Bai Li
Weiheng Chai
Lawrence Carin
Senem Velipasalar
AAML
233
90
0
22 Nov 2019
FDA: Feature Disruptive Attack
FDA: Feature Disruptive AttackIEEE International Conference on Computer Vision (ICCV), 2019
Aditya Ganeshan
S. VivekB.
R. Venkatesh Babu
AAML
289
135
0
10 Sep 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial
  Attacks
Nesterov Accelerated Gradient and Scale Invariance for Adversarial AttacksInternational Conference on Learning Representations (ICLR), 2019
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
John E. Hopcroft
AAML
737
736
0
17 Aug 2019
Enhancing Adversarial Example Transferability with an Intermediate Level
  Attack
Enhancing Adversarial Example Transferability with an Intermediate Level AttackIEEE International Conference on Computer Vision (ICCV), 2019
Qian Huang
Isay Katsman
Horace He
Zeqi Gu
Serge J. Belongie
Ser-Nam Lim
SILMAAML
434
283
0
23 Jul 2019
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient
  Black-box Attacks
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box AttacksNeural Information Processing Systems (NeurIPS), 2019
Ziang Yan
Yiwen Guo
Changshui Zhang
AAML
176
118
0
11 Jun 2019
High Frequency Component Helps Explain the Generalization of
  Convolutional Neural Networks
High Frequency Component Helps Explain the Generalization of Convolutional Neural NetworksComputer Vision and Pattern Recognition (CVPR), 2019
Haohan Wang
Xindi Wu
Pengcheng Yin
Eric Xing
437
643
0
28 May 2019
Cross-Domain Transferability of Adversarial Perturbations
Cross-Domain Transferability of Adversarial PerturbationsNeural Information Processing Systems (NeurIPS), 2019
Muzammal Naseer
Salman H. Khan
M. H. Khan
Fahad Shahbaz Khan
Fatih Porikli
AAML
509
175
0
28 May 2019
Efficient Decision-based Black-box Adversarial Attacks on Face
  Recognition
Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
Yinpeng Dong
Hang Su
Baoyuan Wu
Zhifeng Li
Wen Liu
Tong Zhang
Jun Zhu
CVBMAAML
227
451
0
09 Apr 2019
Evading Defenses to Transferable Adversarial Examples by
  Translation-Invariant Attacks
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
SILMAAML
305
1,036
0
05 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Sai Li
Martin J. Wainwright
AAML
541
774
0
03 Apr 2019
Regional Homogeneity: Towards Learning Transferable Universal
  Adversarial Perturbations Against Defenses
Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses
Yingwei Li
S. Bai
Cihang Xie
Zhenyu A. Liao
Xiaohui Shen
Alan Yuille
AAML
361
58
0
01 Apr 2019
On the Effectiveness of Low Frequency Perturbations
On the Effectiveness of Low Frequency PerturbationsInternational Joint Conference on Artificial Intelligence (IJCAI), 2019
Yash Sharma
G. Ding
Marcus A. Brubaker
AAML
326
138
0
28 Feb 2019
Learning Transferable Adversarial Examples via Ghost Networks
Learning Transferable Adversarial Examples via Ghost Networks
Yingwei Li
S. Bai
Yuyin Zhou
Cihang Xie
Zhishuai Zhang
Alan Yuille
AAML
415
153
0
09 Dec 2018
Feature Denoising for Improving Adversarial Robustness
Feature Denoising for Improving Adversarial Robustness
Cihang Xie
Yuxin Wu
Laurens van der Maaten
Alan Yuille
Kaiming He
398
996
0
09 Dec 2018
ImageNet-trained CNNs are biased towards texture; increasing shape bias
  improves accuracy and robustness
ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness
Robert Geirhos
Patricia Rubisch
Claudio Michaelis
Matthias Bethge
Felix Wichmann
Wieland Brendel
789
3,000
0
29 Nov 2018
CCNet: Criss-Cross Attention for Semantic Segmentation
CCNet: Criss-Cross Attention for Semantic Segmentation
Zilong Huang
Xinggang Wang
Yunchao Wei
Lichao Huang
Humphrey Shi
Wenyu Liu
Chang Huang
VOS
510
2,908
0
28 Nov 2018
Feature Prioritization and Regularization Improve Standard Accuracy and
  Adversarial Robustness
Feature Prioritization and Regularization Improve Standard Accuracy and Adversarial Robustness
Chihuang Liu
Joseph Jaja
AAML
181
13
0
04 Oct 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial PerturbationConference on Uncertainty in Artificial Intelligence (UAI), 2018
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
289
191
0
24 Sep 2018
ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture
  Design
ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design
Ningning Ma
Xiangyu Zhang
Haitao Zheng
Jian Sun
502
6,059
0
30 Jul 2018
The Effects of JPEG and JPEG2000 Compression on Attacks using
  Adversarial Examples
The Effects of JPEG and JPEG2000 Compression on Attacks using Adversarial Examples
Ayse Elvan Aydemir
A. Temi̇zel
T. Taşkaya-Temizel
AAML
135
37
0
28 Mar 2018
Improving Transferability of Adversarial Examples with Input Diversity
Improving Transferability of Adversarial Examples with Input Diversity
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
AAML
554
1,350
0
19 Mar 2018
Shield: Fast, Practical Defense and Vaccination for Deep Learning using
  JPEG Compression
Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Nilaksh Das
Madhuri Shanbhogue
Shang-Tse Chen
Fred Hohman
Siwei Li
Li-Wei Chen
Michael E. Kounavis
Duen Horng Chau
FedMLAAML
207
247
0
19 Feb 2018
MobileNetV2: Inverted Residuals and Linear Bottlenecks
MobileNetV2: Inverted Residuals and Linear Bottlenecks
Mark Sandler
Andrew G. Howard
Menglong Zhu
A. Zhmoginov
Liang-Chieh Chen
3.5K
23,336
0
13 Jan 2018
Adversarial Patch
Adversarial Patch
Tom B. Brown
Dandelion Mané
Aurko Roy
Martín Abadi
Justin Gilmer
AAML
370
1,226
0
27 Dec 2017
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box
  Machine Learning Models
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models
Wieland Brendel
Jonas Rauber
Matthias Bethge
AAML
355
1,490
0
12 Dec 2017
12
Next
Page 1 of 2