ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1605.07277
  4. Cited By
Transferability in Machine Learning: from Phenomena to Black-Box Attacks
  using Adversarial Samples

Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples

24 May 2016
Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
    SILM
    AAML
ArXivPDFHTML

Papers citing "Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples"

50 / 363 papers shown
Title
Mixed Nash Equilibria in the Adversarial Examples Game
Mixed Nash Equilibria in the Adversarial Examples Game
Laurent Meunier
M. Scetbon
Rafael Pinot
Jamal Atif
Y. Chevaleyre
AAML
25
29
0
13 Feb 2021
Dompteur: Taming Audio Adversarial Examples
Dompteur: Taming Audio Adversarial Examples
Thorsten Eisenhofer
Lea Schonherr
Joel Frank
Lars Speckemeier
D. Kolossa
Thorsten Holz
AAML
39
24
0
10 Feb 2021
Robust Adversarial Attacks Against DNN-Based Wireless Communication
  Systems
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems
Alireza Bahramali
Milad Nasr
Amir Houmansadr
Dennis Goeckel
Don Towsley
AAML
45
53
0
01 Feb 2021
Copycat CNN: Are Random Non-Labeled Data Enough to Steal Knowledge from
  Black-box Models?
Copycat CNN: Are Random Non-Labeled Data Enough to Steal Knowledge from Black-box Models?
Jacson Rodrigues Correia-Silva
Rodrigo Berriel
C. Badue
Alberto F. de Souza
Thiago Oliveira-Santos
MLAU
21
14
0
21 Jan 2021
Adversarial Attacks for Tabular Data: Application to Fraud Detection and
  Imbalanced Data
Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data
F. Cartella
Orlando Anunciação
Yuki Funabiki
D. Yamaguchi
Toru Akishita
Olivier Elshocht
AAML
65
71
0
20 Jan 2021
Black-box Adversarial Attacks in Autonomous Vehicle Technology
Black-box Adversarial Attacks in Autonomous Vehicle Technology
K. N. Kumar
Vishnu Chalavadi
Reshmi Mitra
C.Krishna Mohan
AAML
23
70
0
15 Jan 2021
Exploring Adversarial Fake Images on Face Manifold
Exploring Adversarial Fake Images on Face Manifold
Dongze Li
Wei Wang
Hongxing Fan
Jing Dong
AAML
45
42
0
09 Jan 2021
Improving DGA-Based Malicious Domain Classifiers for Malware Defense
  with Adversarial Machine Learning
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Ibrahim Yilmaz
Ambareen Siraj
D. Ulybyshev
AAML
19
14
0
02 Jan 2021
Efficient Training of Robust Decision Trees Against Adversarial Examples
Efficient Training of Robust Decision Trees Against Adversarial Examples
D. Vos
S. Verwer
AAML
6
36
0
18 Dec 2020
Robustness and Transferability of Universal Attacks on Compressed Models
Robustness and Transferability of Universal Attacks on Compressed Models
Alberto G. Matachana
Kenneth T. Co
Luis Muñoz-González
David Martínez
Emil C. Lupu
AAML
29
10
0
10 Dec 2020
Visually Imperceptible Adversarial Patch Attacks on Digital Images
Visually Imperceptible Adversarial Patch Attacks on Digital Images
Yaguan Qian
Jiamin Wang
Bin Wang
Xiang Ling
Zhaoquan Gu
Chunming Wu
Wassim Swaileh
AAML
44
2
0
02 Dec 2020
A Study on the Uncertainty of Convolutional Layers in Deep Neural
  Networks
A Study on the Uncertainty of Convolutional Layers in Deep Neural Networks
Hao Shen
Sihong Chen
Ran Wang
30
5
0
27 Nov 2020
Omni: Automated Ensemble with Unexpected Models against Adversarial
  Evasion Attack
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
Rui Shu
Tianpei Xia
Laurie A. Williams
Tim Menzies
AAML
32
15
0
23 Nov 2020
Adversarial Threats to DeepFake Detection: A Practical Perspective
Adversarial Threats to DeepFake Detection: A Practical Perspective
Paarth Neekhara
Brian Dolhansky
Joanna Bitton
Cristian Canton Ferrer
AAML
13
79
0
19 Nov 2020
Solving Inverse Problems With Deep Neural Networks -- Robustness
  Included?
Solving Inverse Problems With Deep Neural Networks -- Robustness Included?
Martin Genzel
Jan Macdonald
M. März
AAML
OOD
34
101
0
09 Nov 2020
The Vulnerability of the Neural Networks Against Adversarial Examples in
  Deep Learning Algorithms
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Rui Zhao
AAML
34
1
0
02 Nov 2020
Transferable Universal Adversarial Perturbations Using Generative Models
Transferable Universal Adversarial Perturbations Using Generative Models
Atiyeh Hashemi
Andreas Bär
S. Mozaffari
Tim Fingscheidt
AAML
30
17
0
28 Oct 2020
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine
  Learning
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning
Ibrahim Yilmaz
Ambareen Siraj
AAML
20
21
0
23 Oct 2020
Boosting Gradient for White-Box Adversarial Attacks
Boosting Gradient for White-Box Adversarial Attacks
Hongying Liu
Zhenyu Zhou
Fanhua Shang
Xiaoyu Qi
Yuanyuan Liu
L. Jiao
AAML
24
7
0
21 Oct 2020
Data-driven Identification of 2D Partial Differential Equations using
  extracted physical features
Data-driven Identification of 2D Partial Differential Equations using extracted physical features
Kazem Meidani
A. Farimani
21
17
0
20 Oct 2020
A Survey of Machine Learning Techniques in Adversarial Image Forensics
A Survey of Machine Learning Techniques in Adversarial Image Forensics
Ehsan Nowroozi
Ali Dehghantanha
R. Parizi
K. Choo
AAML
25
72
0
19 Oct 2020
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial
  Examples
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Yael Mathov
Eden Levy
Ziv Katzir
A. Shabtai
Yuval Elovici
AAML
33
14
0
07 Oct 2020
Query complexity of adversarial attacks
Query complexity of adversarial attacks
Grzegorz Gluch
R. Urbanke
AAML
27
5
0
02 Oct 2020
Generating End-to-End Adversarial Examples for Malware Classifiers Using
  Explainability
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability
Ishai Rosenberg
Shai Meir
J. Berrebi
I. Gordon
Guillaume Sicard
Eli David
AAML
SILM
11
25
0
28 Sep 2020
The Intriguing Relation Between Counterfactual Explanations and
  Adversarial Examples
The Intriguing Relation Between Counterfactual Explanations and Adversarial Examples
Timo Freiesleben
GAN
46
62
0
11 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
33
157
0
08 Sep 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
L. Chen
Junhai Yong
MLAU
OOD
41
17
0
02 Sep 2020
Adversarially Robust Neural Architectures
Adversarially Robust Neural Architectures
Minjing Dong
Yanxi Li
Yunhe Wang
Chang Xu
AAML
OOD
47
48
0
02 Sep 2020
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
24
51
0
20 Aug 2020
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical
  Attacks on Machine Learning for Windows Malware Detection
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Christian Scano
Scott E. Coull
Battista Biggio
Giovanni Lagorio
A. Armando
Fabio Roli
AAML
35
59
0
17 Aug 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
32
73
0
07 Aug 2020
Membership Leakage in Label-Only Exposures
Membership Leakage in Label-Only Exposures
Zheng Li
Yang Zhang
34
237
0
30 Jul 2020
From Sound Representation to Model Robustness
From Sound Representation to Model Robustness
Mohamad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
20
6
0
27 Jul 2020
RANDOM MASK: Towards Robust Convolutional Neural Networks
RANDOM MASK: Towards Robust Convolutional Neural Networks
Tiange Luo
Tianle Cai
Mengxiao Zhang
Siyu Chen
Liwei Wang
AAML
OOD
24
17
0
27 Jul 2020
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
30
12
0
21 Jul 2020
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
19
66
0
15 Jul 2020
Adversarial Attacks against Neural Networks in Audio Domain: Exploiting
  Principal Components
Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Ken Alparslan
Yigit Can Alparslan
Matthew Burlick
AAML
24
8
0
14 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
32
128
0
13 Jul 2020
How benign is benign overfitting?
How benign is benign overfitting?
Amartya Sanyal
P. Dokania
Varun Kanade
Philip Torr
NoLa
AAML
25
57
0
08 Jul 2020
Generating Adversarial Examples with Controllable Non-transferability
Generating Adversarial Examples with Controllable Non-transferability
Renzhi Wang
Tianwei Zhang
Xiaofei Xie
Lei Ma
Cong Tian
Felix Juefei Xu
Yang Liu
SILM
AAML
17
3
0
02 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
38
51
0
01 Jul 2020
Uncovering the Connections Between Adversarial Transferability and
  Knowledge Transferability
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
38
25
0
25 Jun 2020
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Yuankun Zhu
Yueqiang Cheng
Husheng Zhou
Yantao Lu
MIACV
AAML
39
99
0
23 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to
  Adversarial Examples
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
25
22
0
18 Jun 2020
Boosting Black-Box Attack with Partially Transferred Conditional
  Adversarial Distribution
Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng
Baoyuan Wu
Yanbo Fan
Li Liu
Zhifeng Li
Shutao Xia
AAML
32
6
0
15 Jun 2020
Calibrated neighborhood aware confidence measure for deep metric
  learning
Calibrated neighborhood aware confidence measure for deep metric learning
Maryna Karpusha
Sunghee Yun
István Fehérvári
UQCV
FedML
27
2
0
08 Jun 2020
Tricking Adversarial Attacks To Fail
Tricking Adversarial Attacks To Fail
Blerta Lindqvist
AAML
16
0
0
08 Jun 2020
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label
  Classifiers
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
S. Melacci
Gabriele Ciravegna
Angelo Sotgiu
Ambra Demontis
Battista Biggio
Marco Gori
Fabio Roli
22
14
0
06 Jun 2020
Adversarial Attacks on Classifiers for Eye-based User Modelling
Adversarial Attacks on Classifiers for Eye-based User Modelling
Inken Hagestedt
Michael Backes
Andreas Bulling
AAML
26
6
0
01 Jun 2020
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless
  Signal Classifiers
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Brian Kim
Y. Sagduyu
Kemal Davaslioglu
T. Erpek
S. Ulukus
AAML
23
111
0
11 May 2020
Previous
12345678
Next