ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
    AAML
ArXivPDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 375 papers shown
Title
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
57
0
0
08 May 2025
REVEAL: Multi-turn Evaluation of Image-Input Harms for Vision LLM
REVEAL: Multi-turn Evaluation of Image-Input Harms for Vision LLM
Madhur Jindal
Saurabh Deshpande
AAML
52
0
0
07 May 2025
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Kai Hu
Weichen Yu
Lefei Zhang
Alexander Robey
Andy Zou
Chengming Xu
Haoqi Hu
Matt Fredrikson
AAML
VLM
72
1
0
02 May 2025
A Simple DropConnect Approach to Transfer-based Targeted Attack
A Simple DropConnect Approach to Transfer-based Targeted Attack
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAML
69
0
0
24 Apr 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
223
0
0
20 Apr 2025
Harnessing the Computation Redundancy in ViTs to Boost Adversarial Transferability
Harnessing the Computation Redundancy in ViTs to Boost Adversarial Transferability
Jiani Liu
Zhiyuan Wang
Zeliang Zhang
Chao Huang
Susan Liang
Yunlong Tang
Chenliang Xu
AAML
39
0
0
15 Apr 2025
TarPro: Targeted Protection against Malicious Image Editing
TarPro: Targeted Protection against Malicious Image Editing
Kaixin Shen
Ruijie Quan
Jiaxu Miao
Jun Xiao
Yi Yang
62
1
0
18 Mar 2025
AMUN: Adversarial Machine UNlearning
AMUN: Adversarial Machine UNlearning
A. Boroojeny
Hari Sundaram
Varun Chandrasekaran
MU
AAML
48
0
0
02 Mar 2025
A Transfer Attack to Image Watermarks
A Transfer Attack to Image Watermarks
Yuepeng Hu
Zhengyuan Jiang
Moyang Guo
Neil Zhenqiang Gong
77
10
0
20 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
52
0
0
16 Feb 2025
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Hui Zeng
Sanshuai Cui
Biwei Chen
Anjie Peng
AAML
49
0
0
31 Dec 2024
Adversarial Hubness in Multi-Modal Retrieval
Adversarial Hubness in Multi-Modal Retrieval
Tingwei Zhang
Fnu Suya
Rishi Jha
Collin Zhang
Vitaly Shmatikov
AAML
90
1
0
18 Dec 2024
Transferable Adversarial Face Attack with Text Controlled Attribute
Transferable Adversarial Face Attack with Text Controlled Attribute
Wenyun Li
Zheng Zhang
X. Lan
D. Jiang
AAML
83
1
0
16 Dec 2024
Improving Transferable Targeted Attacks with Feature Tuning Mixup
Improving Transferable Targeted Attacks with Feature Tuning Mixup
K. Liang
Xuelong Dai
Yanjie Li
Dong Wang
Bin Xiao
AAML
230
0
0
23 Nov 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAML
SILM
66
6
0
26 Oct 2024
Uncovering, Explaining, and Mitigating the Superficial Safety of
  Backdoor Defense
Uncovering, Explaining, and Mitigating the Superficial Safety of Backdoor Defense
Rui Min
Zeyu Qin
Nevin L. Zhang
Li Shen
Minhao Cheng
AAML
41
4
0
13 Oct 2024
S$^4$ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
S4^44ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
168
0
0
13 Oct 2024
Understanding Model Ensemble in Transferable Adversarial Attack
Understanding Model Ensemble in Transferable Adversarial Attack
Wei Yao
Zeliang Zhang
Huayi Tang
Yong Liu
33
2
0
09 Oct 2024
Dormant: Defending against Pose-driven Human Image Animation
Dormant: Defending against Pose-driven Human Image Animation
Jiachen Zhou
Mingsi Wang
Tianlin Li
Guozhu Meng
Kai Chen
69
3
0
22 Sep 2024
Learning to Learn Transferable Generative Attack for Person Re-Identification
Learning to Learn Transferable Generative Attack for Person Re-Identification
Yuan Bian
Min Liu
Xueping Wang
Yunfeng Ma
Yaonan Wang
AAML
OOD
71
1
0
06 Sep 2024
Constructing Adversarial Examples for Vertical Federated Learning:
  Optimal Client Corruption through Multi-Armed Bandit
Constructing Adversarial Examples for Vertical Federated Learning: Optimal Client Corruption through Multi-Armed Bandit
Duanyi Yao
Songze Li
Ye Xue
Jin Liu
FedML
AAML
37
1
0
08 Aug 2024
Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors
Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors
Peter Lorenz
Mario Fernandez
Jens Müller
Ullrich Kothe
AAML
78
1
0
21 Jun 2024
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation
Zhaoyi Lu
Wenchao Xu
Ming Tu
Xin Xie
Cunqing Hua
Nan Cheng
59
1
0
11 Jun 2024
HOLMES: to Detect Adversarial Examples with Multiple Detectors
HOLMES: to Detect Adversarial Examples with Multiple Detectors
Jing Wen
AAML
43
0
0
30 May 2024
Benchmarking and Improving Bird's Eye View Perception Robustness in Autonomous Driving
Benchmarking and Improving Bird's Eye View Perception Robustness in Autonomous Driving
Shaoyuan Xie
Lingdong Kong
Wenwei Zhang
Jiawei Ren
Liang Pan
Kai-xiang Chen
Ziwei Liu
AAML
60
10
0
27 May 2024
Effective and Robust Adversarial Training against Data and Label
  Corruptions
Effective and Robust Adversarial Training against Data and Label Corruptions
Pengfei Zhang
Zi Huang
Xin-Shun Xu
Guangdong Bai
51
4
0
07 May 2024
Don't Say No: Jailbreaking LLM by Suppressing Refusal
Don't Say No: Jailbreaking LLM by Suppressing Refusal
Yukai Zhou
Wenjie Wang
AAML
44
15
0
25 Apr 2024
Unsegment Anything by Simulating Deformation
Unsegment Anything by Simulating Deformation
Jiahao Lu
Xingyi Yang
Xinchao Wang
36
4
0
03 Apr 2024
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise
  Regression Tasks
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks
Zhiyuan Cheng
Zhaoyi Liu
Tengda Guo
Shiwei Feng
Dongfang Liu
Mingjie Tang
Xiangyu Zhang
AAML
41
3
0
01 Apr 2024
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Bo Yang
Hengwei Zhang
Jin-dong Wang
Yulong Yang
Chenhao Lin
Chao Shen
Zhengyu Zhao
SILM
AAML
71
2
0
27 Feb 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
38
6
0
11 Feb 2024
Black-Box Access is Insufficient for Rigorous AI Audits
Black-Box Access is Insufficient for Rigorous AI Audits
Stephen Casper
Carson Ezell
Charlotte Siegmann
Noam Kolt
Taylor Lynn Curtis
...
Michael Gerovitch
David Bau
Max Tegmark
David M. Krueger
Dylan Hadfield-Menell
AAML
38
78
0
25 Jan 2024
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches
  Generation
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation
Wenyi Tan
Yang Li
Chenxing Zhao
Zhunga Liu
Quanbiao Pan
AAML
28
3
0
28 Dec 2023
Towards Transferable Adversarial Attacks with Centralized Perturbation
Towards Transferable Adversarial Attacks with Centralized Perturbation
Shangbo Wu
Yu-an Tan
Yajie Wang
Ruinan Ma
Wencong Ma
Yuan-zhang Li
AAML
35
9
0
11 Dec 2023
InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language
  Models
InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language Models
Xunguang Wang
Zhenlan Ji
Pingchuan Ma
Zongjie Li
Shuai Wang
MLLM
48
11
0
04 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
68
3
0
20 Nov 2023
On The Relationship Between Universal Adversarial Attacks And Sparse
  Representations
On The Relationship Between Universal Adversarial Attacks And Sparse Representations
Dana Weitzner
Raja Giryes
AAML
32
0
0
14 Nov 2023
PubDef: Defending Against Transfer Attacks From Public Models
PubDef: Defending Against Transfer Attacks From Public Models
Chawin Sitawarin
Jaewon Chang
David Huang
Wesson Altoyan
David Wagner
AAML
39
6
0
26 Oct 2023
Finite-context Indexing of Restricted Output Space for NLP Models Facing
  Noisy Input
Finite-context Indexing of Restricted Output Space for NLP Models Facing Noisy Input
Minh Nguyen
Nancy F. Chen
30
0
0
21 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in
  Machine Unlearning Services
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services
Hongsheng Hu
Shuo Wang
Jiamin Chang
Haonan Zhong
Ruoxi Sun
Shuang Hao
Haojin Zhu
Minhui Xue
MU
21
26
0
15 Sep 2023
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake
  Detection
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Weijie Wang
Zhengyu Zhao
N. Sebe
Bruno Lepri
AAML
41
2
0
03 Sep 2023
Adversarial Illusions in Multi-Modal Embeddings
Adversarial Illusions in Multi-Modal Embeddings
Tingwei Zhang
Rishi Jha
Eugene Bagdasaryan
Vitaly Shmatikov
AAML
34
8
0
22 Aug 2023
Enhancing Adversarial Attacks: The Similar Target Method
Enhancing Adversarial Attacks: The Similar Target Method
Shuo Zhang
Ziruo Wang
Zikai Zhou
Huanran Chen
AAML
57
1
0
21 Aug 2023
Boosting Adversarial Transferability by Block Shuffle and Rotation
Boosting Adversarial Transferability by Block Shuffle and Rotation
Kunyu Wang
Xu He
Wenxuan Wang
Xiaosen Wang
AAML
33
36
0
20 Aug 2023
Backpropagation Path Search On Adversarial Transferability
Backpropagation Path Search On Adversarial Transferability
Zhuoer Xu
Zhangxuan Gu
Jianping Zhang
Shiwen Cui
Changhua Meng
Weiqiang Wang
AAML
40
5
0
15 Aug 2023
Why Does Little Robustness Help? Understanding and Improving Adversarial
  Transferability from Surrogate Training
Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate Training
Yechao Zhang
Shengshan Hu
Leo Yu Zhang
Junyu Shi
Minghui Li
Xiaogeng Liu
Wei Wan
Hai Jin
AAML
27
21
0
15 Jul 2023
GNP Attack: Transferable Adversarial Examples via Gradient Norm Penalty
GNP Attack: Transferable Adversarial Examples via Gradient Norm Penalty
Tao Wu
Tie-Mei Luo
D. Wunsch
AAML
30
9
0
09 Jul 2023
A Theoretical Perspective on Subnetwork Contributions to Adversarial
  Robustness
A Theoretical Perspective on Subnetwork Contributions to Adversarial Robustness
Jovon Craig
Joshua Andle
Theodore S. Nowak
Salimeh Yasaei Sekeh
AAML
50
0
0
07 Jul 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
28
11
0
21 Jun 2023
12345678
Next