ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1602.02697
  4. Cited By
Practical Black-Box Attacks against Machine Learning
v1v2v3v4 (latest)

Practical Black-Box Attacks against Machine Learning

8 February 2016
Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
S. Jha
Z. Berkay Celik
A. Swami
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Practical Black-Box Attacks against Machine Learning"

39 / 39 papers shown
Title
How Do Diffusion Models Improve Adversarial Robustness?
How Do Diffusion Models Improve Adversarial Robustness?
Liu Yuezhang
Xue-Xin Wei
288
0
0
28 May 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAMLSILM
565
0
0
20 Apr 2025
Examining the Threat Landscape: Foundation Models and Model Stealing
Examining the Threat Landscape: Foundation Models and Model Stealing
Ankita Raj
Deepankar Varma
Chetan Arora
AAML
279
1
0
25 Feb 2025
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
215
0
0
21 Feb 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
207
1
0
20 Jan 2025
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Jialin Wu
Kaikai Pan
Yanjiao Chen
Jiangyi Deng
Shengyuan Pang
Wenyuan Xu
ViTAAML
107
0
0
13 Jan 2025
Fall Leaf Adversarial Attack on Traffic Sign Classification
Fall Leaf Adversarial Attack on Traffic Sign Classification
Anthony Etim
Jakub Szefer
AAML
141
3
0
27 Nov 2024
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
In-Context Experience Replay Facilitates Safety Red-Teaming of Text-to-Image Diffusion Models
Zhi-Yi Chin
Kuan-Chen Mu
Mario Fritz
Pin-Yu Chen
DiffM
174
1
0
25 Nov 2024
AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models
AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models
Boming Miao
Chunxiao Li
Yao Zhu
Weixiang Sun
Zizhe Wang
Xiaoyi Wang
Chuanlong Xie
DiffMAAML
158
1
0
11 Sep 2024
Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors
Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors
Peter Lorenz
Mario Fernandez
Jens Müller
Ullrich Kothe
AAML
193
1
0
21 Jun 2024
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAMLSILM
125
3
0
20 Nov 2023
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Mohamed el Shehaby
Ashraf Matrawy
AAML
92
7
0
08 Jun 2023
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
91
14
0
04 Aug 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
121
21
0
09 Mar 2022
Sinkhorn Distributionally Robust Optimization
Sinkhorn Distributionally Robust Optimization
Jie Wang
Rui Gao
Yao Xie
127
39
0
24 Sep 2021
2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency
2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency
Yonggan Fu
Yang Zhao
Qixuan Yu
Chaojian Li
Yingyan Lin
AAML
114
14
0
11 Sep 2021
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
105
73
0
07 Aug 2020
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel
  Protection
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection
Anuj Dubey
Rosario Cammarota
Aydin Aysu
AAML
61
79
0
29 Oct 2019
Thieves on Sesame Street! Model Extraction of BERT-based APIs
Thieves on Sesame Street! Model Extraction of BERT-based APIs
Kalpesh Krishna
Gaurav Singh Tomar
Ankur P. Parikh
Nicolas Papernot
Mohit Iyyer
MIACVMLAU
116
201
0
27 Oct 2019
Generating Natural Adversarial Examples
Generating Natural Adversarial Examples
Zhengli Zhao
Dheeru Dua
Sameer Singh
GANAAML
186
601
0
31 Oct 2017
Evasion Attacks against Machine Learning at Test Time
Evasion Attacks against Machine Learning at Test Time
Battista Biggio
Igino Corona
Davide Maiorca
B. Nelson
Nedim Srndic
Pavel Laskov
Giorgio Giacinto
Fabio Roli
AAML
163
2,160
0
21 Aug 2017
Detecting Adversarial Image Examples in Deep Networks with Adaptive
  Noise Reduction
Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction
Bin Liang
Hongcheng Li
Miaoqiang Su
Xirong Li
Wenchang Shi
Xiaofeng Wang
AAML
104
218
0
23 May 2017
MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial
  Attacks with Moving Target Defense
MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense
Sailik Sengupta
Tathagata Chakraborti
S. Kambhampati
AAML
114
63
0
19 May 2017
DeepCorrect: Correcting DNN models against Image Distortions
DeepCorrect: Correcting DNN models against Image Distortions
Tejas S. Borkar
Lina Karam
97
93
0
05 May 2017
Stealing Machine Learning Models via Prediction APIs
Stealing Machine Learning Models via Prediction APIs
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
SILMMLAU
109
1,811
0
09 Sep 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILMAAML
547
5,912
0
08 Jul 2016
Theano: A Python framework for fast computation of mathematical
  expressions
Theano: A Python framework for fast computation of mathematical expressions
The Theano Development Team
Rami Al-Rfou
Guillaume Alain
Amjad Almahairi
Christof Angermüller
...
Kelvin Xu
Lijun Xue
Li Yao
Saizheng Zhang
Ying Zhang
208
2,340
0
09 May 2016
The Limitations of Deep Learning in Adversarial Settings
The Limitations of Deep Learning in Adversarial Settings
Nicolas Papernot
Patrick McDaniel
S. Jha
Matt Fredrikson
Z. Berkay Celik
A. Swami
AAML
117
3,968
0
24 Nov 2015
Distillation as a Defense to Adversarial Perturbations against Deep
  Neural Networks
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
Nicolas Papernot
Patrick McDaniel
Xi Wu
S. Jha
A. Swami
AAML
118
3,077
0
14 Nov 2015
Evasion and Hardening of Tree Ensemble Classifiers
Evasion and Hardening of Tree Ensemble Classifiers
Alex Kantchelian
J. D. Tygar
A. Joseph
AAML
130
205
0
25 Sep 2015
Distilling the Knowledge in a Neural Network
Distilling the Knowledge in a Neural Network
Geoffrey E. Hinton
Oriol Vinyals
J. Dean
FedML
367
19,745
0
09 Mar 2015
Delving Deep into Rectifiers: Surpassing Human-Level Performance on
  ImageNet Classification
Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
VLM
347
18,654
0
06 Feb 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
282
19,129
0
20 Dec 2014
Towards Deep Neural Network Architectures Robust to Adversarial Examples
Towards Deep Neural Network Architectures Robust to Adversarial Examples
S. Gu
Luca Rigazio
AAML
78
844
0
11 Dec 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
289
14,968
1
21 Dec 2013
Do Deep Nets Really Need to be Deep?
Do Deep Nets Really Need to be Deep?
Lei Jimmy Ba
R. Caruana
188
2,120
0
21 Dec 2013
Playing Atari with Deep Reinforcement Learning
Playing Atari with Deep Reinforcement Learning
Volodymyr Mnih
Koray Kavukcuoglu
David Silver
Alex Graves
Ioannis Antonoglou
Daan Wierstra
Martin Riedmiller
132
12,272
0
19 Dec 2013
Theano: new features and speed improvements
Theano: new features and speed improvements
Frédéric Bastien
Pascal Lamblin
Razvan Pascanu
James Bergstra
Ian Goodfellow
Arnaud Bergeron
Nicolas Bouchard
David Warde-Farley
Yoshua Bengio
100
1,420
0
23 Nov 2012
Poisoning Attacks against Support Vector Machines
Poisoning Attacks against Support Vector Machines
Battista Biggio
B. Nelson
Pavel Laskov
AAML
127
1,595
0
27 Jun 2012
1