ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
Exploring the Back Alleys: Analysing The Robustness of Alternative
  Neural Network Architectures against Adversarial Attacks
Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Y. Tan
Yuval Elovici
Alexander Binder
AAML
84
3
0
08 Dec 2019
A Survey of Game Theoretic Approaches for Adversarial Machine Learning
  in Cybersecurity Tasks
A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks
P. Dasgupta
J. B. Collins
AAML
46
43
0
04 Dec 2019
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas
Yuxuan Zhang
Florian Kerschbaum
MLAUFedMLAAML
112
146
0
02 Dec 2019
A Method for Computing Class-wise Universal Adversarial Perturbations
A Method for Computing Class-wise Universal Adversarial Perturbations
Tejus Gupta
Abhishek Sinha
Nupur Kumari
M. Singh
Balaji Krishnamurthy
AAML
38
10
0
01 Dec 2019
Indirect Local Attacks for Context-aware Semantic Segmentation Networks
Indirect Local Attacks for Context-aware Semantic Segmentation Networks
Krishna Kanth Nakka
Mathieu Salzmann
SSegAAML
61
31
0
29 Nov 2019
SpoC: Spoofing Camera Fingerprints
SpoC: Spoofing Camera Fingerprints
D. Cozzolino
Justus Thies
Andreas Rossler
Matthias Nießner
L. Verdoliva
85
39
0
27 Nov 2019
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Minghong Fang
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAMLOODFedML
128
1,129
0
26 Nov 2019
ColorFool: Semantic Adversarial Colorization
ColorFool: Semantic Adversarial Colorization
Ali Shahin Shamsabadi
Ricardo Sánchez-Matilla
Andrea Cavallaro
AAML
103
122
0
25 Nov 2019
Enhancing Cross-task Black-Box Transferability of Adversarial Examples
  with Dispersion Reduction
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Yantao Lu
Yunhan Jia
Jianyu Wang
Bai Li
Weiheng Chai
Lawrence Carin
Senem Velipasalar
AAML
72
81
0
22 Nov 2019
Heuristic Black-box Adversarial Attacks on Video Recognition Models
Heuristic Black-box Adversarial Attacks on Video Recognition Models
Zhipeng Wei
Jingjing Chen
Xingxing Wei
Linxi Jiang
Tat-Seng Chua
Fengfeng Zhou
Yueping Jiang
AAML
79
70
0
21 Nov 2019
Controversial stimuli: pitting neural networks against each other as
  models of human recognition
Controversial stimuli: pitting neural networks against each other as models of human recognition
Tal Golan
Prashant C. Raju
N. Kriegeskorte
AAML
78
39
0
21 Nov 2019
Defective Convolutional Networks
Defective Convolutional Networks
Tiange Luo
Tianle Cai
Mengxiao Zhang
Siyu Chen
Di He
Liwei Wang
AAML
46
3
0
19 Nov 2019
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories
Zhaohui Che
Ali Borji
Guangtao Zhai
Suiyi Ling
Jing Li
P. Le Callet
AAMLFedML
49
30
0
18 Nov 2019
Smoothed Inference for Adversarially-Trained Models
Smoothed Inference for Adversarially-Trained Models
Yaniv Nemcovsky
Evgenii Zheltonozhskii
Chaim Baskin
Brian Chmiel
Maxim Fishman
A. Bronstein
A. Mendelson
AAMLFedML
53
2
0
17 Nov 2019
Black-Box Adversarial Attack with Transferable Model-based Embedding
Black-Box Adversarial Attack with Transferable Model-based Embedding
Zhichao Huang
Tong Zhang
77
119
0
17 Nov 2019
Adversarial Embedding: A robust and elusive Steganography and
  Watermarking technique
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique
Salah Ghamizi
Maxime Cordy
Mike Papadakis
Yves Le Traon
WIGMAAML
47
7
0
14 Nov 2019
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
127
105
0
13 Nov 2019
Imperceptible Adversarial Attacks on Tabular Data
Imperceptible Adversarial Attacks on Tabular Data
Vincent Ballet
X. Renard
Jonathan Aigrain
Thibault Laugel
P. Frossard
Marcin Detyniecki
102
76
0
08 Nov 2019
Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Xu Li
Jinghua Zhong
Xixin Wu
Jianwei Yu
Xunying Liu
Helen Meng
AAML
74
79
0
08 Nov 2019
The Threat of Adversarial Attacks on Machine Learning in Network
  Security -- A Survey
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Olakunle Ibitoye
Rana Abou-Khamis
Mohamed el Shehaby
Ashraf Matrawy
M. O. Shafiq
AAML
95
70
0
06 Nov 2019
Towards Large yet Imperceptible Adversarial Image Perturbations with
  Perceptual Color Distance
Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
116
149
0
06 Nov 2019
DLA: Dense-Layer-Analysis for Adversarial Example Detection
DLA: Dense-Layer-Analysis for Adversarial Example Detection
Philip Sperl
Ching-yu Kao
Peng Chen
Konstantin Böttinger
AAML
61
34
0
05 Nov 2019
Fast-UAP: An Algorithm for Speeding up Universal Adversarial
  Perturbation Generation with Orientation of Perturbation Vectors
Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors
Jiazhu Dai
Le Shu
AAML
50
3
0
04 Nov 2019
Beyond Universal Person Re-ID Attack
Beyond Universal Person Re-ID Attack
Wenjie Ding
Xing Wei
Rongrong Ji
Xiaopeng Hong
Qi Tian
Yihong Gong
AAML
64
7
0
30 Oct 2019
Detection of Adversarial Attacks and Characterization of Adversarial
  Subspace
Detection of Adversarial Attacks and Characterization of Adversarial Subspace
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
54
17
0
26 Oct 2019
Adversarial Example Detection by Classification for Deep Speech
  Recognition
Adversarial Example Detection by Classification for Deep Speech Recognition
Saeid Samizade
Zheng-Hua Tan
Chao Shen
X. Guan
AAML
79
35
0
22 Oct 2019
Structure Matters: Towards Generating Transferable Adversarial Images
Structure Matters: Towards Generating Transferable Adversarial Images
Dan Peng
Zizhan Zheng
Linhao Luo
Xiaofeng Zhang
AAML
70
2
0
22 Oct 2019
Exploring Simple and Transferable Recognition-Aware Image Processing
Exploring Simple and Transferable Recognition-Aware Image Processing
Zhuang Liu
H. Wang
Tinghui Zhou
Zhiqiang Shen
Bingyi Kang
Evan Shelhamer
Trevor Darrell
68
9
0
21 Oct 2019
A New Defense Against Adversarial Images: Turning a Weakness into a
  Strength
A New Defense Against Adversarial Images: Turning a Weakness into a Strength
Tao Yu
Shengyuan Hu
Chuan Guo
Wei-Lun Chao
Kilian Q. Weinberger
AAML
120
103
0
16 Oct 2019
Confidence-Calibrated Adversarial Training: Generalizing to Unseen
  Attacks
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks
David Stutz
Matthias Hein
Bernt Schiele
AAML
89
5
0
14 Oct 2019
Man-in-the-Middle Attacks against Machine Learning Classifiers via
  Malicious Generative Models
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
Derui Wang
Wang
Chaoran Li
S. Wen
Surya Nepal
Yang Xiang
AAML
34
35
0
14 Oct 2019
Learning deep forest with multi-scale Local Binary Pattern features for
  face anti-spoofing
Learning deep forest with multi-scale Local Binary Pattern features for face anti-spoofing
Rizhao Cai
Changsheng Chen
AAMLCVBM
54
12
0
09 Oct 2019
Adversarial Learning of Deepfakes in Accounting
Adversarial Learning of Deepfakes in Accounting
Marco Schreyer
Timur Sattarov
Bernd Reimer
Damian Borth
AAML
58
26
0
09 Oct 2019
BUZz: BUffer Zones for defending adversarial examples in image
  classification
BUZz: BUffer Zones for defending adversarial examples in image classification
Kaleel Mahmood
Phuong Ha Nguyen
Lam M. Nguyen
THANH VAN NGUYEN
Marten van Dijk
AAML
62
6
0
03 Oct 2019
Sampling Unknown Decision Functions to Build Classifier Copies
Sampling Unknown Decision Functions to Build Classifier Copies
Irene Unceta
Diego Palacios
Jordi Nin
O. Pujol
39
8
0
01 Oct 2019
Black-box Adversarial Attacks with Bayesian Optimization
Black-box Adversarial Attacks with Bayesian Optimization
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAMLMLAU
68
31
0
30 Sep 2019
Min-Max Optimization without Gradients: Convergence and Applications to
  Adversarial ML
Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Sijia Liu
Songtao Lu
Xiangyi Chen
Yao Feng
Kaidi Xu
Abdullah Al-Dujaili
Mingyi Hong
Una-May Obelilly
94
26
0
30 Sep 2019
Techniques for Adversarial Examples Threatening the Safety of Artificial
  Intelligence Based Systems
Techniques for Adversarial Examples Threatening the Safety of Artificial Intelligence Based Systems
Utku Kose
SILMAAML
29
2
0
29 Sep 2019
Deep k-NN Defense against Clean-label Data Poisoning Attacks
Deep k-NN Defense against Clean-label Data Poisoning Attacks
Neehar Peri
Neal Gupta
Wenjie Huang
Liam H. Fowl
Chen Zhu
Soheil Feizi
Tom Goldstein
John P. Dickerson
AAML
59
6
0
29 Sep 2019
Lower Bounds on Adversarial Robustness from Optimal Transport
Lower Bounds on Adversarial Robustness from Optimal Transport
A. Bhagoji
Daniel Cullina
Prateek Mittal
OODOTAAML
70
94
0
26 Sep 2019
MemGuard: Defending against Black-Box Membership Inference Attacks via
  Adversarial Examples
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
Jinyuan Jia
Ahmed Salem
Michael Backes
Yang Zhang
Neil Zhenqiang Gong
106
398
0
23 Sep 2019
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments
Alesia Chernikova
Alina Oprea
AAML
119
40
0
23 Sep 2019
Robust Local Features for Improving the Generalization of Adversarial
  Training
Robust Local Features for Improving the Generalization of Adversarial Training
Chuanbiao Song
Kun He
Jiadong Lin
Liwei Wang
John E. Hopcroft
OODAAML
75
70
0
23 Sep 2019
Defending against Machine Learning based Inference Attacks via
  Adversarial Examples: Opportunities and Challenges
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges
Jinyuan Jia
Neil Zhenqiang Gong
AAMLSILM
87
17
0
17 Sep 2019
Adversarial Attack on Skeleton-based Human Action Recognition
Adversarial Attack on Skeleton-based Human Action Recognition
Jian Liu
Naveed Akhtar
Ajmal Mian
AAML
67
68
0
14 Sep 2019
Towards Model-Agnostic Adversarial Defenses using Adversarially Trained
  Autoencoders
Towards Model-Agnostic Adversarial Defenses using Adversarially Trained Autoencoders
Pratik Vaishnavi
Kevin Eykholt
A. Prakash
Amir Rahmati
AAML
46
2
0
12 Sep 2019
Sparse and Imperceivable Adversarial Attacks
Sparse and Imperceivable Adversarial Attacks
Francesco Croce
Matthias Hein
AAML
110
199
0
11 Sep 2019
Localized Adversarial Training for Increased Accuracy and Robustness in
  Image Classification
Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification
Eitan Rothberg
Tingting Chen
Luo Jie
Hao Ji
AAML
23
0
0
10 Sep 2019
Learning to Disentangle Robust and Vulnerable Features for Adversarial
  Detection
Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection
Byunggill Joe
Sung Ju Hwang
I. Shin
AAML
35
1
0
10 Sep 2019
STA: Adversarial Attacks on Siamese Trackers
STA: Adversarial Attacks on Siamese Trackers
Xugang Wu
Xiaoping Wang
Xu Zhou
Songlei Jian
GANAAML
41
6
0
08 Sep 2019
Previous
123...121314...171819
Next