ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
On the Limitations of Denoising Strategies as Adversarial Defenses
On the Limitations of Denoising Strategies as Adversarial Defenses
Zhonghan Niu
Zhaoxi Chen
Linyi Li
Yubin Yang
Yue Liu
Jinfeng Yi
AAML
74
14
0
17 Dec 2020
FoggySight: A Scheme for Facial Lookup Privacy
FoggySight: A Scheme for Facial Lookup Privacy
Ivan Evtimov
Pascal Sturmfels
Tadayoshi Kohno
PICVFedML
76
24
0
15 Dec 2020
Adaptive Verifiable Training Using Pairwise Class Similarity
Adaptive Verifiable Training Using Pairwise Class Similarity
Shiqi Wang
Kevin Eykholt
Taesung Lee
Jiyong Jang
Ian Molloy
OOD
33
1
0
14 Dec 2020
An Empirical Review of Adversarial Defenses
An Empirical Review of Adversarial Defenses
Ayush Goel
AAML
37
0
0
10 Dec 2020
Backpropagating Linearly Improves Transferability of Adversarial
  Examples
Backpropagating Linearly Improves Transferability of Adversarial Examples
Yiwen Guo
Qizhang Li
Hao Chen
FedMLAAML
82
116
0
07 Dec 2020
Learning to Separate Clusters of Adversarial Representations for Robust
  Adversarial Detection
Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection
Byunggill Joe
Jihun Hamm
Sung Ju Hwang
Sooel Son
I. Shin
AAMLOOD
57
0
0
07 Dec 2020
An Empirical Study of Derivative-Free-Optimization Algorithms for
  Targeted Black-Box Attacks in Deep Neural Networks
An Empirical Study of Derivative-Free-Optimization Algorithms for Targeted Black-Box Attacks in Deep Neural Networks
Giuseppe Ughi
V. Abrol
Jared Tanner
AAML
65
13
0
03 Dec 2020
Boosting Adversarial Attacks on Neural Networks with Better Optimizer
Boosting Adversarial Attacks on Neural Networks with Better Optimizer
Heng Yin
Hengwei Zhang
Jin-dong Wang
Ruiyu Dou
AAML
76
8
0
01 Dec 2020
Just One Moment: Structural Vulnerability of Deep Action Recognition
  against One Frame Attack
Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame Attack
Ian Ryu
Jun-Hyuk Kim
Jun-Ho Choi
Jong-Seok Lee
AAML
97
17
0
30 Nov 2020
A Study on the Uncertainty of Convolutional Layers in Deep Neural
  Networks
A Study on the Uncertainty of Convolutional Layers in Deep Neural Networks
Hao Shen
Sihong Chen
Ran Wang
70
5
0
27 Nov 2020
Use the Spear as a Shield: A Novel Adversarial Example based
  Privacy-Preserving Technique against Membership Inference Attacks
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks
Mingfu Xue
Chengxiang Yuan
Can He
Zhiyu Wu
Yushu Zhang
Zhe Liu
Weiqiang Liu
MIACV
16
12
0
27 Nov 2020
Adversarial Evaluation of Multimodal Models under Realistic Gray Box
  Assumption
Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption
Ivan Evtimov
Russ Howes
Brian Dolhansky
Hamed Firooz
Cristian Canton Ferrer
AAML
46
10
0
25 Nov 2020
Learnable Boundary Guided Adversarial Training
Learnable Boundary Guided Adversarial Training
Jiequan Cui
Shu Liu
Liwei Wang
Jiaya Jia
OODAAML
113
132
0
23 Nov 2020
Adversarial Threats to DeepFake Detection: A Practical Perspective
Adversarial Threats to DeepFake Detection: A Practical Perspective
Paarth Neekhara
Brian Dolhansky
Joanna Bitton
Cristian Canton Ferrer
AAML
61
85
0
19 Nov 2020
Shaping Deep Feature Space towards Gaussian Mixture for Visual
  Classification
Shaping Deep Feature Space towards Gaussian Mixture for Visual Classification
Weitao Wan
Jiansheng Chen
Cheng Yu
Tong Wu
Yuanyi Zhong
Ming-Hsuan Yang
36
7
0
18 Nov 2020
On the Transferability of Adversarial Attacksagainst Neural Text
  Classifier
On the Transferability of Adversarial Attacksagainst Neural Text Classifier
Liping Yuan
Xiaoqing Zheng
Yi Zhou
Cho-Jui Hsieh
Kai-Wei Chang
SILMAAML
71
26
0
17 Nov 2020
Adversarial Image Color Transformations in Explicit Color Filter Space
Adversarial Image Color Transformations in Explicit Color Filter Space
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
110
14
0
12 Nov 2020
Fooling the primate brain with minimal, targeted image manipulation
Fooling the primate brain with minimal, targeted image manipulation
Li-xin Yuan
Will Xiao
Giorgia Dellaferrera
Gabriel Kreiman
Francis E. H. Tay
Jiashi Feng
Margaret Livingstone
AAML
38
1
0
11 Nov 2020
Efficient and Transferable Adversarial Examples from Bayesian Neural
  Networks
Efficient and Transferable Adversarial Examples from Bayesian Neural Networks
Martin Gubri
Maxime Cordy
Mike Papadakis
Yves Le Traon
Koushik Sen
AAML
151
11
0
10 Nov 2020
Risk Assessment for Machine Learning Models
Risk Assessment for Machine Learning Models
Paul Schwerdtner
Florens Greßner
Nikhil Kapoor
F. Assion
René Sass
W. Günther
Fabian Hüger
Peter Schlicht
38
6
0
09 Nov 2020
Bridging the Performance Gap between FGSM and PGD Adversarial Training
Bridging the Performance Gap between FGSM and PGD Adversarial Training
Tianjin Huang
Vlado Menkovski
Yulong Pei
Mykola Pechenizkiy
AAML
46
20
0
07 Nov 2020
Frequency-based Automated Modulation Classification in the Presence of
  Adversaries
Frequency-based Automated Modulation Classification in the Presence of Adversaries
R. Sahay
Christopher G. Brinton
David J. Love
AAML
61
9
0
02 Nov 2020
The Vulnerability of the Neural Networks Against Adversarial Examples in
  Deep Learning Algorithms
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Rui Zhao
AAML
60
1
0
02 Nov 2020
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of
  Point Cloud-based Deep Networks
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks
Hang Zhou
Dongdong Chen
Jing Liao
Weiming Zhang
Kejiang Chen
Xiaoyi Dong
Kunlin Liu
G. Hua
Nenghai Yu
3DPC
122
103
0
01 Nov 2020
Perception Matters: Exploring Imperceptible and Transferable
  Anti-forensics for GAN-generated Fake Face Imagery Detection
Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection
Yongwei Wang
Xin Ding
Li Ding
Rabab Ward
Z. J. Wang
AAML
41
21
0
29 Oct 2020
Beyond cross-entropy: learning highly separable feature distributions
  for robust and accurate classification
Beyond cross-entropy: learning highly separable feature distributions for robust and accurate classification
Arslan Ali
A. Migliorati
T. Bianchi
E. Magli
AAMLOODOODD
26
1
0
29 Oct 2020
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine
  Learning
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning
Ibrahim Yilmaz
Ambareen Siraj
AAML
42
21
0
23 Oct 2020
Towards Robust Neural Networks via Orthogonal Diversity
Towards Robust Neural Networks via Orthogonal Diversity
Kun Fang
Qinghua Tao
Yingwen Wu
Tao Li
Jia Cai
Feipeng Cai
Xiaolin Huang
Jie Yang
AAML
80
8
0
23 Oct 2020
Defense-guided Transferable Adversarial Attacks
Defense-guided Transferable Adversarial Attacks
Zifei Zhang
Kai Qiao
Jian Chen
Ningning Liang
AAML
21
0
0
22 Oct 2020
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Jiancheng Yang
Yangzhou Jiang
Xiaoyang Huang
Bingbing Ni
Chenglong Zhao
AAML
135
82
0
21 Oct 2020
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Thomas Cilloni
Wei Wang
Charles Walter
Charles Fleming
PICVAAML
37
8
0
20 Oct 2020
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack
  and Learning
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning
Hongjun Wang
Guanbin Li
Xiaobai Liu
Liang Lin
GANAAML
95
23
0
15 Oct 2020
GreedyFool: Multi-Factor Imperceptibility and Its Application to
  Designing a Black-box Adversarial Attack
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial Attack
Hui Liu
Bo Zhao
Minzhi Ji
Peng Liu
AAML
42
6
0
14 Oct 2020
A Unified Approach to Interpreting and Boosting Adversarial
  Transferability
A Unified Approach to Interpreting and Boosting Adversarial Transferability
Xin Eric Wang
Jie Ren
Shuyu Lin
Xiangming Zhu
Yisen Wang
Quanshi Zhang
AAML
143
96
0
08 Oct 2020
Uncovering the Limits of Adversarial Training against Norm-Bounded
  Adversarial Examples
Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples
Sven Gowal
Chongli Qin
J. Uesato
Timothy A. Mann
Pushmeet Kohli
AAML
73
331
0
07 Oct 2020
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit
  Neural Network Inference
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference
Sanghyun Hong
Yigitcan Kaya
Ionut-Vlad Modoranu
Tudor Dumitras
AAML
83
73
0
06 Oct 2020
CorrAttack: Black-box Adversarial Attack with Structured Search
CorrAttack: Black-box Adversarial Attack with Structured Search
Zhichao Huang
Yaowei Huang
Tong Zhang
AAML
64
8
0
03 Oct 2020
Query complexity of adversarial attacks
Query complexity of adversarial attacks
Grzegorz Gluch
R. Urbanke
AAML
56
5
0
02 Oct 2020
Attention Meets Perturbations: Robust and Interpretable Attention with
  Adversarial Training
Attention Meets Perturbations: Robust and Interpretable Attention with Adversarial Training
Shunsuke Kitada
Hitoshi Iyatomi
OODAAML
49
26
0
25 Sep 2020
Adversarial Examples in Deep Learning for Multivariate Time Series
  Regression
Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Gautam Raj Mode
K. A. Hoque
AAMLAI4TS
72
58
0
24 Sep 2020
Improving Ensemble Robustness by Collaboratively Promoting and Demoting
  Adversarial Robustness
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness
Tuan-Anh Bui
Trung Le
He Zhao
Paul Montague
O. deVel
Tamas Abraham
Dinh Q. Phung
AAMLFedML
73
11
0
21 Sep 2020
ES Attack: Model Stealing against Deep Neural Networks without Data
  Hurdles
ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Xiaoyong Yuan
Lei Ding
Lan Zhang
Xiaolin Li
D. Wu
54
42
0
21 Sep 2020
Switching Transferable Gradient Directions for Query-Efficient Black-Box
  Adversarial Attacks
Switching Transferable Gradient Directions for Query-Efficient Black-Box Adversarial Attacks
Chen Ma
Shuyu Cheng
Li Chen
Jun Zhu
Junhai Yong
AAML
50
7
0
15 Sep 2020
Decision-based Universal Adversarial Attack
Decision-based Universal Adversarial Attack
Jing Wu
Mingyi Zhou
Shuaicheng Liu
Yipeng Liu
Ce Zhu
AAML
78
13
0
15 Sep 2020
A black-box adversarial attack for poisoning clustering
A black-box adversarial attack for poisoning clustering
Antonio Emanuele Cinà
Alessandro Torcinovich
Marcello Pelillo
AAML
121
41
0
09 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
136
162
0
08 Sep 2020
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Jonas Geiping
Liam H. Fowl
Wenjie Huang
W. Czaja
Gavin Taylor
Michael Moeller
Tom Goldstein
AAML
100
222
0
04 Sep 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
Lixing Chen
Junhai Yong
MLAUOOD
93
17
0
02 Sep 2020
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
Chi Liu
Tianqing Zhu
Jun Zhang
Wanlei Zhou
PICV
81
31
0
27 Aug 2020
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer
  Learning
Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning
Yinghua Zhang
Yangqiu Song
Jian Liang
Kun Bai
Qiang Yang
AAML
79
28
0
25 Aug 2020
Previous
123...91011...171819
Next