ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1605.07277
  4. Cited By
Transferability in Machine Learning: from Phenomena to Black-Box Attacks
  using Adversarial Samples

Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples

24 May 2016
Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
    SILM
    AAML
ArXivPDFHTML

Papers citing "Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples"

50 / 360 papers shown
Title
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
60
0
0
08 May 2025
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Kai Hu
Weichen Yu
Lefei Zhang
Alexander Robey
Andy Zou
Chengming Xu
Haoqi Hu
Matt Fredrikson
AAML
VLM
72
1
0
02 May 2025
JailbreaksOverTime: Detecting Jailbreak Attacks Under Distribution Shift
JailbreaksOverTime: Detecting Jailbreak Attacks Under Distribution Shift
Julien Piet
Xiao Huang
Dennis Jacob
Annabella Chow
Maha Alrashed
Geng Zhao
Zhanhao Hu
Chawin Sitawarin
Basel Alomair
David Wagner
AAML
70
0
0
28 Apr 2025
A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning
A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning
Greg Gluch
Shafi Goldwasser
AAML
42
0
0
28 Apr 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
223
0
0
20 Apr 2025
From Visual Explanations to Counterfactual Explanations with Latent Diffusion
From Visual Explanations to Counterfactual Explanations with Latent Diffusion
Tung Luu
Nam Le
Duc Le
Bac Le
DiffM
AAML
FAtt
50
0
0
12 Apr 2025
AMUN: Adversarial Machine UNlearning
AMUN: Adversarial Machine UNlearning
A. Boroojeny
Hari Sundaram
Varun Chandrasekaran
MU
AAML
48
0
0
02 Mar 2025
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Li Yang
Mirna El Rajab
Abdallah Shami
Sami Muhaidat
92
6
0
28 Feb 2025
HALO: Robust Out-of-Distribution Detection via Joint Optimisation
HALO: Robust Out-of-Distribution Detection via Joint Optimisation
Hugo Lyons Keenan
S. Erfani
Christopher Leckie
OODD
214
0
0
27 Feb 2025
We're Different, We're the Same: Creative Homogeneity Across LLMs
We're Different, We're the Same: Creative Homogeneity Across LLMs
Emily Wenger
Yoed Kenett
95
5
0
31 Jan 2025
New Perspectives on Regularization and Computation in Optimal Transport-Based Distributionally Robust Optimization
New Perspectives on Regularization and Computation in Optimal Transport-Based Distributionally Robust Optimization
Soroosh Shafieezadeh-Abadeh
Liviu Aolaritei
Florian Dorfler
Daniel Kuhn
66
20
0
31 Dec 2024
Adversarial Training Can Provably Improve Robustness: Theoretical Analysis of Feature Learning Process Under Structured Data
Adversarial Training Can Provably Improve Robustness: Theoretical Analysis of Feature Learning Process Under Structured Data
Binghui Li
Yuanzhi Li
OOD
41
2
0
11 Oct 2024
Understanding Model Ensemble in Transferable Adversarial Attack
Understanding Model Ensemble in Transferable Adversarial Attack
Wei Yao
Zeliang Zhang
Huayi Tang
Yong Liu
33
2
0
09 Oct 2024
A Brain-Inspired Regularizer for Adversarial Robustness
A Brain-Inspired Regularizer for Adversarial Robustness
Elie Attias
Cengiz Pehlevan
D. Obeid
AAML
OOD
20
0
0
04 Oct 2024
Constructing Adversarial Examples for Vertical Federated Learning:
  Optimal Client Corruption through Multi-Armed Bandit
Constructing Adversarial Examples for Vertical Federated Learning: Optimal Client Corruption through Multi-Armed Bandit
Duanyi Yao
Songze Li
Ye Xue
Jin Liu
FedML
AAML
37
1
0
08 Aug 2024
Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning
Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning
Shihua Sun
Shridatt Sugrim
Angelos Stavrou
Haining Wang
AAML
68
1
0
13 Jul 2024
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation
Zhaoyi Lu
Wenchao Xu
Ming Tu
Xin Xie
Cunqing Hua
Nan Cheng
59
1
0
11 Jun 2024
Probing Human Visual Robustness with Neurally-Guided Deep Neural Networks
Probing Human Visual Robustness with Neurally-Guided Deep Neural Networks
Zhenan Shao
Linjian Ma
Yiqing Zhou
Yibo Jacky Zhang
Sanmi Koyejo
Bo Li
Diane M. Beck
AAML
53
3
0
04 May 2024
Bidirectional Consistency Models
Bidirectional Consistency Models
Liangchen Li
Jiajun He
DiffM
72
12
0
26 Mar 2024
Towards Adversarially Robust Dataset Distillation by Curvature Regularization
Towards Adversarially Robust Dataset Distillation by Curvature Regularization
Eric Xue
Yijiang Li
Haoyang Liu
Yifan Shen
Haohan Wang
Haohan Wang
DD
66
8
0
15 Mar 2024
Accelerated Smoothing: A Scalable Approach to Randomized Smoothing
Accelerated Smoothing: A Scalable Approach to Randomized Smoothing
Devansh Bhardwaj
Kshitiz Kaushik
Sarthak Gupta
AAML
37
0
0
12 Feb 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
38
6
0
11 Feb 2024
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Wenqi Wei
Ling Liu
31
16
0
02 Feb 2024
Sparse and Transferable Universal Singular Vectors Attack
Sparse and Transferable Universal Singular Vectors Attack
Kseniia Kuvshinova
Olga Tsymboi
Ivan Oseledets
AAML
38
0
0
25 Jan 2024
A Training-Free Defense Framework for Robust Learned Image Compression
A Training-Free Defense Framework for Robust Learned Image Compression
Myungseo Song
Jinyoung Choi
Bohyung Han
AAML
27
4
0
22 Jan 2024
Exploring Vulnerabilities of No-Reference Image Quality Assessment
  Models: A Query-Based Black-Box Method
Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Chenxi Yang
Yujia Liu
Dingquan Li
Tingting Jiang
40
6
0
10 Jan 2024
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches
  Generation
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation
Wenyi Tan
Yang Li
Chenxing Zhao
Zhunga Liu
Quanbiao Pan
AAML
28
3
0
28 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
68
3
0
20 Nov 2023
On The Relationship Between Universal Adversarial Attacks And Sparse
  Representations
On The Relationship Between Universal Adversarial Attacks And Sparse Representations
Dana Weitzner
Raja Giryes
AAML
32
0
0
14 Nov 2023
PubDef: Defending Against Transfer Attacks From Public Models
PubDef: Defending Against Transfer Attacks From Public Models
Chawin Sitawarin
Jaewon Chang
David Huang
Wesson Altoyan
David Wagner
AAML
39
6
0
26 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
Hejia Geng
Peng Li
AAML
42
3
0
20 Aug 2023
CGBA: Curvature-aware Geometric Black-box Attack
CGBA: Curvature-aware Geometric Black-box Attack
Md. Farhamdur Reza
A. Rahmati
Tianfu Wu
H. Dai
AAML
30
17
0
06 Aug 2023
Adversarial Learning in Real-World Fraud Detection: Challenges and
  Perspectives
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives
Daniele Lunghi
A. Simitsis
O. Caelen
Gianluca Bontempi
AAML
FaML
45
4
0
03 Jul 2023
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey
  of Vulnerabilities, Datasets, and Defenses
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
M. Ferrag
Othmane Friha
B. Kantarci
Norbert Tihanyi
Lucas C. Cordeiro
Merouane Debbah
Djallel Hamouda
Muna Al-Hawawreh
K. Choo
37
44
0
17 Jun 2023
Adversarial Clean Label Backdoor Attacks and Defenses on Text
  Classification Systems
Adversarial Clean Label Backdoor Attacks and Defenses on Text Classification Systems
Ashim Gupta
Amrith Krishna
AAML
22
16
0
31 May 2023
Don't Retrain, Just Rewrite: Countering Adversarial Perturbations by
  Rewriting Text
Don't Retrain, Just Rewrite: Countering Adversarial Perturbations by Rewriting Text
Ashim Gupta
Carter Blum
Temma Choji
Yingjie Fei
Shalin S Shah
Alakananda Vempala
Vivek Srikumar
AAML
32
9
0
25 May 2023
Boosting Big Brother: Attacking Search Engines with Encodings
Boosting Big Brother: Attacking Search Engines with Encodings
Nicholas Boucher
Luca Pajola
Ilia Shumailov
Ross J. Anderson
Mauro Conti
SILM
37
10
0
27 Apr 2023
Understanding the Robustness of 3D Object Detection with Bird's-Eye-View
  Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bird's-Eye-View Representations in Autonomous Driving
Zijian Zhu
Yichi Zhang
Hai Chen
Yinpeng Dong
Shu Zhao
Wenbo Ding
Jiachen Zhong
Shibao Zheng
AAML
3DPC
40
38
0
30 Mar 2023
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment
  using Adversarial Learning
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Thorsten Eisenhofer
Erwin Quiring
Jonas Moller
Doreen Riepel
Thorsten Holz
Konrad Rieck
AAML
31
6
0
25 Mar 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
Ulugbek S. Kamilov
AAML
38
14
0
25 Mar 2023
Effective black box adversarial attack with handcrafted kernels
Effective black box adversarial attack with handcrafted kernels
P. Dvorácek
P. Hurtík
Petra Stevuliáková
AAML
30
0
0
24 Mar 2023
Did You Train on My Dataset? Towards Public Dataset Protection with
  Clean-Label Backdoor Watermarking
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Xia Hu
31
36
0
20 Mar 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the
  Generation of Adversarial Examples
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
Jinwei Wang
Hao Wu
Haihua Wang
Jiawei Zhang
X. Luo
Bin Ma
AAML
31
0
0
08 Mar 2023
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Christian Westbrook
S. Pasricha
AAML
25
3
0
03 Mar 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILM
AAML
35
20
0
14 Feb 2023
Making Substitute Models More Bayesian Can Enhance Transferability of
  Adversarial Examples
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
39
36
0
10 Feb 2023
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan
Jenna Cryan
Emily Wenger
Haitao Zheng
Rana Hanocka
Ben Y. Zhao
WIGM
17
177
0
08 Feb 2023
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks
  against Interpretable Models
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Interpretable Models
Abdullah Çaglar Öksüz
Anisa Halimi
Erman Ayday
ELM
AAML
23
2
0
04 Feb 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
34
27
0
01 Jan 2023
12345678
Next