ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
$β$-Variational Classifiers Under Attack
βββ-Variational Classifiers Under Attack
Marco Maggipinto
M. Terzi
Gian Antonio Susto
AAMLOOD
19
1
0
20 Aug 2020
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
59
52
0
20 Aug 2020
A Deep Dive into Adversarial Robustness in Zero-Shot Learning
A Deep Dive into Adversarial Robustness in Zero-Shot Learning
M. K. Yucel
R. G. Cinbis
P. D. Sahin
VLM
68
7
0
17 Aug 2020
Relevance Attack on Detectors
Relevance Attack on Detectors
Sizhe Chen
Fan He
Xiaolin Huang
Kun Zhang
AAML
77
17
0
16 Aug 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
118
73
0
07 Aug 2020
TREND: Transferability based Robust ENsemble Design
TREND: Transferability based Robust ENsemble Design
Deepak Ravikumar
Sangamesh Kodge
Isha Garg
Kaushik Roy
OODAAML
33
4
0
04 Aug 2020
Anti-Bandit Neural Architecture Search for Model Defense
Anti-Bandit Neural Architecture Search for Model Defense
Hanlin Chen
Baochang Zhang
Shenjun Xue
Xuan Gong
Hong Liu
Rongrong Ji
David Doermann
AAML
55
35
0
03 Aug 2020
Membership Leakage in Label-Only Exposures
Membership Leakage in Label-Only Exposures
Zheng Li
Yang Zhang
108
247
0
30 Jul 2020
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture
  of Compact DNNs
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs
N. Jha
Sparsh Mittal
Binod Kumar
Govardhan Mattela
AAML
66
13
0
30 Jul 2020
Attacking and Defending Machine Learning Applications of Public Cloud
Attacking and Defending Machine Learning Applications of Public Cloud
Dou Goodman
Xin Hao
SILMAAML
66
7
0
27 Jul 2020
Adversarial Privacy-preserving Filter
Adversarial Privacy-preserving Filter
Jiaming Zhang
Jitao Sang
Xian Zhao
Xiaowen Huang
Yanfeng Sun
Yongli Hu
PICV
81
42
0
25 Jul 2020
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
Yuzhen Ding
Nupur Thakur
Baoxin Li
AAML
73
3
0
20 Jul 2020
Technologies for Trustworthy Machine Learning: A Survey in a
  Socio-Technical Context
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context
Ehsan Toreini
Mhairi Aitken
Kovila P. L. Coopamootoo
Karen Elliott
Vladimiro González-Zelaya
P. Missier
Magdalene Ng
Aad van Moorsel
74
18
0
17 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Patch-wise Attack for Fooling Deep Neural Network
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
91
144
0
14 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
78
129
0
13 Jul 2020
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low
  Query Budget Regimes
Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAML
59
34
0
13 Jul 2020
Generating Adversarial Inputs Using A Black-box Differential Technique
Generating Adversarial Inputs Using A Black-box Differential Technique
J. Matos
Lucas C. Cordeiro
Marcelo d’Amorim
Xiaowei Huang
AAML
24
0
0
10 Jul 2020
Making Adversarial Examples More Transferable and Indistinguishable
Making Adversarial Examples More Transferable and Indistinguishable
Junhua Zou
Yexin Duan
Xin Liu
Junyang Qiu
Yu Pan
Zhisong Pan
AAML
75
32
0
08 Jul 2020
Adversarial Machine Learning Attacks and Defense Methods in the Cyber
  Security Domain
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Ishai Rosenberg
A. Shabtai
Yuval Elovici
Lior Rokach
AAML
85
12
0
05 Jul 2020
Generating Adversarial Examples with Controllable Non-transferability
Generating Adversarial Examples with Controllable Non-transferability
Renzhi Wang
Tianwei Zhang
Xiaofei Xie
Lei Ma
Cong Tian
Felix Juefei Xu
Yang Liu
SILMAAML
80
3
0
02 Jul 2020
Query-Free Adversarial Transfer via Undertrained Surrogates
Query-Free Adversarial Transfer via Undertrained Surrogates
Chris Miller
Soroush Vosoughi
AAML
33
0
0
01 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAMLGAN
100
52
0
01 Jul 2020
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware
  Detection
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Deqiang Li
Qianmu Li
AAML
77
126
0
30 Jun 2020
Orthogonal Deep Models As Defense Against Black-Box Attacks
Orthogonal Deep Models As Defense Against Black-Box Attacks
M. Jalwana
Naveed Akhtar
Bennamoun
Ajmal Mian
AAML
45
11
0
26 Jun 2020
Backdoor Attacks Against Deep Learning Systems in the Physical World
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger
Josephine Passananti
A. Bhagoji
Yuanshun Yao
Haitao Zheng
Ben Y. Zhao
AAML
126
205
0
25 Jun 2020
Uncovering the Connections Between Adversarial Transferability and
  Knowledge Transferability
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
140
26
0
25 Jun 2020
Blacklight: Scalable Defense for Neural Networks against Query-Based
  Black-Box Attacks
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Huiying Li
Shawn Shan
Emily Wenger
Jiayun Zhang
Haitao Zheng
Ben Y. Zhao
AAML
85
45
0
24 Jun 2020
Bit Error Robustness for Energy-Efficient DNN Accelerators
Bit Error Robustness for Energy-Efficient DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
MQ
52
1
0
24 Jun 2020
Adversarial Attacks for Multi-view Deep Models
Adversarial Attacks for Multi-view Deep Models
Xuli Sun
Shiliang Sun
AAML
29
0
0
19 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to
  Adversarial Examples
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
90
24
0
18 Jun 2020
AdvMind: Inferring Adversary Intent of Black-Box Attacks
AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
MLAUAAML
64
30
0
16 Jun 2020
DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a
  Variational Graph Autoencoder
DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder
Ao Zhang
Jinwen Ma
AAMLGNN
88
21
0
16 Jun 2020
Boosting Black-Box Attack with Partially Transferred Conditional
  Adversarial Distribution
Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng
Baoyuan Wu
Yanbo Fan
Li Liu
Zhifeng Li
Shutao Xia
AAML
66
6
0
15 Jun 2020
Sparsity Turns Adversarial: Energy and Latency Attacks on Deep Neural
  Networks
Sparsity Turns Adversarial: Energy and Latency Attacks on Deep Neural Networks
Sarada Krithivasan
Sanchari Sen
A. Raghunathan
AAML
26
1
0
14 Jun 2020
Protecting Against Image Translation Deepfakes by Leaking Universal
  Perturbations from Black-Box Neural Networks
Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks
Nataniel Ruiz
Sarah Adel Bargal
Stan Sclaroff
AAML
63
11
0
11 Jun 2020
Adversarial Attack Vulnerability of Medical Image Analysis Systems:
  Unexplored Factors
Adversarial Attack Vulnerability of Medical Image Analysis Systems: Unexplored Factors
Gerda Bortsova
C. González-Gonzalo
S. Wetstein
Florian Dubost
Ioannis Katramados
...
Bram van Ginneken
J. Pluim
M. Veta
Clara I. Sánchez
Marleen de Bruijne
AAMLMedIm
38
131
0
11 Jun 2020
Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based
  Classifiers
Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based Classifiers
Fangfang Yang
Shaolei Ren
AAML
44
16
0
10 Jun 2020
GAP++: Learning to generate target-conditioned adversarial examples
GAP++: Learning to generate target-conditioned adversarial examples
Xiaofeng Mao
YueFeng Chen
Yuhong Li
Yuan He
Hui Xue
AAML
73
8
0
09 Jun 2020
Pick-Object-Attack: Type-Specific Adversarial Attack for Object
  Detection
Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection
Omid Mohamad Nezami
Akshay Chaturvedi
Mark Dras
Utpal Garain
AAMLObjD
61
19
0
05 Jun 2020
Characterizing the Weight Space for Different Learning Models
Characterizing the Weight Space for Different Learning Models
Saurav Musunuru
Jay N. Paranjape
R. Dubey
V. Venkoparao
AAML
16
0
0
04 Jun 2020
Exploring the role of Input and Output Layers of a Deep Neural Network
  in Adversarial Defense
Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense
Jay N. Paranjape
R. Dubey
Vijendran V. Gopalan
AAML
44
2
0
02 Jun 2020
Toward Adversarial Robustness by Diversity in an Ensemble of Specialized
  Deep Neural Networks
Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks
Mahdieh Abbasi
Arezoo Rajabi
Christian Gagné
R. Bobba
AAML
39
15
0
17 May 2020
Adversarial examples are useful too!
Adversarial examples are useful too!
Ali Borji
SILMAAML
37
1
0
13 May 2020
Increased-confidence adversarial examples for deep learning
  counter-forensics
Increased-confidence adversarial examples for deep learning counter-forensics
Wenjie Li
B. Tondi
R. Ni
Mauro Barni
AAML
24
2
0
12 May 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
82
12
0
11 May 2020
Blind Backdoors in Deep Learning Models
Blind Backdoors in Deep Learning Models
Eugene Bagdasaryan
Vitaly Shmatikov
AAMLFedMLSILM
160
310
0
08 May 2020
Defending Hardware-based Malware Detectors against Adversarial Attacks
Defending Hardware-based Malware Detectors against Adversarial Attacks
Abraham Peedikayil Kuruvila
Shamik Kundu
K. Basu
AAML
35
17
0
07 May 2020
Jacks of All Trades, Masters Of None: Addressing Distributional Shift
  and Obtrusiveness via Transparent Patch Attacks
Jacks of All Trades, Masters Of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks
Neil Fendley
M. Lennon
I-J. Wang
Philippe Burlina
Nathan G. Drenkow
15
7
0
01 May 2020
Imitation Attacks and Defenses for Black-box Machine Translation Systems
Imitation Attacks and Defenses for Black-box Machine Translation Systems
Eric Wallace
Mitchell Stern
Basel Alomair
AAML
109
123
0
30 Apr 2020
Perturbing Across the Feature Hierarchy to Improve Standard and Strict
  Blackbox Attack Transferability
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Nathan Inkawhich
Kevin J. Liang
Binghui Wang
Matthew J. Inkawhich
Lawrence Carin
Yiran Chen
AAML
87
90
0
29 Apr 2020
Previous
123...101112...171819
Next