ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
Transferable Perturbations of Deep Feature Distributions
Transferable Perturbations of Deep Feature Distributions
Nathan Inkawhich
Kevin J. Liang
Lawrence Carin
Yiran Chen
AAML
73
87
0
27 Apr 2020
Single-step Adversarial training with Dropout Scheduling
Single-step Adversarial training with Dropout Scheduling
S. VivekB.
R. Venkatesh Babu
OODAAML
65
73
0
18 Apr 2020
Extending Adversarial Attacks to Produce Adversarial Class Probability
  Distributions
Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions
Jon Vadillo
Roberto Santana
Jose A. Lozano
AAML
51
0
0
14 Apr 2020
Adversarial Robustness Guarantees for Random Deep Neural Networks
Adversarial Robustness Guarantees for Random Deep Neural Networks
Giacomo De Palma
B. Kiani
S. Lloyd
AAMLOOD
51
8
0
13 Apr 2020
Towards Transferable Adversarial Attack against Deep Face Recognition
Towards Transferable Adversarial Attack against Deep Face Recognition
Yaoyao Zhong
Weihong Deng
AAML
105
162
0
13 Apr 2020
PatchAttack: A Black-box Texture-based Attack with Reinforcement
  Learning
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning
Chenglin Yang
Adam Kortylewski
Cihang Xie
Yinzhi Cao
Alan Yuille
AAML
79
109
0
12 Apr 2020
Transferable, Controllable, and Inconspicuous Adversarial Attacks on
  Person Re-identification With Deep Mis-Ranking
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
AAML
62
85
0
08 Apr 2020
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Nicholas Carlini
Hany Farid
AAML
79
150
0
01 Apr 2020
Adversarial Imitation Attack
Adversarial Imitation Attack
Mingyi Zhou
Jing Wu
Yipeng Liu
Xiaolin Huang
Shuaicheng Liu
Xiang Zhang
Ce Zhu
AAML
39
0
0
28 Mar 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial Attacks
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
84
145
0
28 Mar 2020
Do Deep Minds Think Alike? Selective Adversarial Attacks for
  Fine-Grained Manipulation of Multiple Deep Neural Networks
Do Deep Minds Think Alike? Selective Adversarial Attacks for Fine-Grained Manipulation of Multiple Deep Neural Networks
Zain Khan
Jirong Yi
R. Mudumbai
Xiaodong Wu
Weiyu Xu
AAMLMLAU
51
1
0
26 Mar 2020
Defense Through Diverse Directions
Defense Through Diverse Directions
Christopher M. Bender
Yang Li
Yifeng Shi
Michael K. Reiter
Junier B. Oliva
AAML
51
4
0
24 Mar 2020
Architectural Resilience to Foreground-and-Background Adversarial Noise
Architectural Resilience to Foreground-and-Background Adversarial Noise
Carl Cheng
Evan Hu
AAML
23
0
0
23 Mar 2020
Quantum noise protects quantum classifiers against adversaries
Quantum noise protects quantum classifiers against adversaries
Yuxuan Du
Min-hsiu Hsieh
Tongliang Liu
Dacheng Tao
Nana Liu
AAML
78
112
0
20 Mar 2020
Face-Off: Adversarial Face Obfuscation
Face-Off: Adversarial Face Obfuscation
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
PICV
81
44
0
19 Mar 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face
  Recognition
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
72
54
0
16 Mar 2020
Diversity can be Transferred: Output Diversification for White- and
  Black-box Attacks
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks
Y. Tashiro
Yang Song
Stefano Ermon
AAML
81
13
0
15 Mar 2020
Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic
  Segmentation
Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic Segmentation
Xiaogang Xu
Hengshuang Zhao
Jiaya Jia
AAML
49
40
0
14 Mar 2020
When are Non-Parametric Methods Robust?
When are Non-Parametric Methods Robust?
Robi Bhattacharjee
Kamalika Chaudhuri
AAML
89
27
0
13 Mar 2020
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical
  Systems
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Jin Young Lee
AAML
117
55
0
12 Mar 2020
MAB-Malware: A Reinforcement Learning Framework for Attacking Static
  Malware Classifiers
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers
Wei Song
Xuezixiang Li
Sadia Afroz
D. Garg
Dmitry Kuznetsov
Heng Yin
AAML
117
27
0
06 Mar 2020
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Bai Li
Shiqi Wang
Yunhan Jia
Yantao Lu
Zhenyu Zhong
Lawrence Carin
Suman Jana
AAML
142
14
0
06 Mar 2020
Search Space of Adversarial Perturbations against Image Filters
Search Space of Adversarial Perturbations against Image Filters
D. D. Thang
Toshihiro Matsui
AAML
31
1
0
05 Mar 2020
A Closer Look at Accuracy vs. Robustness
A Closer Look at Accuracy vs. Robustness
Yao-Yuan Yang
Cyrus Rashtchian
Hongyang R. Zhang
Ruslan Salakhutdinov
Kamalika Chaudhuri
OOD
145
26
0
05 Mar 2020
Colored Noise Injection for Training Adversarially Robust Neural
  Networks
Colored Noise Injection for Training Adversarially Robust Neural Networks
Evgenii Zheltonozhskii
Chaim Baskin
Yaniv Nemcovsky
Brian Chmiel
A. Mendelson
A. Bronstein
AAML
32
5
0
04 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
  Adversarial Robustness
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OODAAML
129
67
0
02 Mar 2020
Adversarial Ranking Attack and Defense
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
150
39
0
26 Feb 2020
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Ziwen He
Wei Wang
Jing Dong
Tieniu Tan
AAML
80
25
0
22 Feb 2020
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Shawn Shan
Emily Wenger
Jiayun Zhang
Huiying Li
Haitao Zheng
Ben Y. Zhao
PICVMU
86
24
0
19 Feb 2020
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning
  Attacks on Computer Vision Systems
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems
Ryan Feng
Neal Mangaokar
Jiefeng Chen
Earlence Fernandes
S. Jha
Atul Prakash
OODAAML
43
11
0
17 Feb 2020
Skip Connections Matter: On the Transferability of Adversarial Examples
  Generated with ResNets
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
AAMLSILM
105
314
0
14 Feb 2020
Attacking Optical Character Recognition (OCR) Systems with Adversarial
  Watermarks
Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks
Lu Chen
Wenyuan Xu
AAML
44
21
0
08 Feb 2020
Renofeation: A Simple Transfer Learning Method for Improved Adversarial
  Robustness
Renofeation: A Simple Transfer Learning Method for Improved Adversarial Robustness
Ting-Wu Chin
Cha Zhang
Diana Marculescu
AAML
26
1
0
07 Feb 2020
An Analysis of Adversarial Attacks and Defenses on Autonomous Driving
  Models
An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Yao Deng
Xi Zheng
Tianyi Zhang
Chen Chen
Guannan Lou
Miryung Kim
AAML
59
143
0
06 Feb 2020
Defending Adversarial Attacks via Semantic Feature Manipulation
Defending Adversarial Attacks via Semantic Feature Manipulation
Shuo Wang
Tianle Chen
Surya Nepal
Carsten Rudolph
M. Grobler
Shangyu Chen
AAML
51
7
0
03 Feb 2020
Regularizers for Single-step Adversarial Training
Regularizers for Single-step Adversarial Training
S. VivekB.
R. Venkatesh Babu
AAML
53
7
0
03 Feb 2020
Tiny noise, big mistakes: Adversarial perturbations induce errors in
  Brain-Computer Interface spellers
Tiny noise, big mistakes: Adversarial perturbations induce errors in Brain-Computer Interface spellers
Xiao Zhang
Dongrui Wu
L. Ding
Hanbin Luo
Chin-Teng Lin
T. Jung
Ricardo Chavarriaga
AAML
91
60
0
30 Jan 2020
Zeroth-Order Algorithms for Nonconvex Minimax Problems with Improved
  Complexities
Zeroth-Order Algorithms for Nonconvex Minimax Problems with Improved Complexities
Zhongruo Wang
Krishnakumar Balasubramanian
Shiqian Ma
Meisam Razaviyayn
85
28
0
22 Jan 2020
GhostImage: Remote Perception Attacks against Camera-based Image
  Classification Systems
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems
Yanmao Man
Ming Li
Ryan M. Gerdes
AAML
83
8
0
21 Jan 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie Yang
Xiaolin Huang
AAML
112
105
0
16 Jan 2020
Transferability of Adversarial Examples to Attack Cloud-based Image
  Classifier Service
Transferability of Adversarial Examples to Attack Cloud-based Image Classifier Service
Dou Goodman
SILMAAML
72
10
0
08 Jan 2020
Generating Semantic Adversarial Examples via Feature Manipulation
Generating Semantic Adversarial Examples via Feature Manipulation
Shuo Wang
Surya Nepal
Carsten Rudolph
M. Grobler
Shangyu Chen
Tianle Chen
AAML
81
12
0
06 Jan 2020
Efficient Adversarial Training with Transferable Adversarial Examples
Efficient Adversarial Training with Transferable Adversarial Examples
Haizhong Zheng
Ziqi Zhang
Juncheng Gu
Honglak Lee
A. Prakash
AAML
85
109
0
27 Dec 2019
Explaining Classifiers using Adversarial Perturbations on the Perceptual
  Ball
Explaining Classifiers using Adversarial Perturbations on the Perceptual Ball
Andrew Elliott
Stephen Law
Chris Russell
AAML
55
4
0
19 Dec 2019
A New Ensemble Method for Concessively Targeted Multi-model Attack
A New Ensemble Method for Concessively Targeted Multi-model Attack
Ziwen He
Wei Wang
Xinsheng Xuan
Jing Dong
Tieniu Tan
AAML
39
2
0
19 Dec 2019
$n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically
  Manipulated Classifiers
nnn-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
AAML
46
6
0
19 Dec 2019
DAmageNet: A Universal Adversarial Dataset
DAmageNet: A Universal Adversarial Dataset
Sizhe Chen
Xiaolin Huang
Zhengbao He
Chengjin Sun
AAML
63
9
0
16 Dec 2019
What Else Can Fool Deep Learning? Addressing Color Constancy Errors on
  Deep Neural Network Performance
What Else Can Fool Deep Learning? Addressing Color Constancy Errors on Deep Neural Network Performance
Mahmoud Afifi
M. Brown
AAML
84
115
0
15 Dec 2019
Potential adversarial samples for white-box attacks
Potential adversarial samples for white-box attacks
Amir Nazemi
Paul Fieguth
AAML
34
18
0
13 Dec 2019
Appending Adversarial Frames for Universal Video Attack
Appending Adversarial Frames for Universal Video Attack
Zhikai Chen
Lingxi Xie
Shanmin Pang
Yong He
Qi Tian
AAML
70
32
0
10 Dec 2019
Previous
123...111213...171819
Next