ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
Universal, transferable and targeted adversarial attacks
Universal, transferable and targeted adversarial attacks
Junde Wu
Rao Fu
AAMLSILM
85
10
0
29 Aug 2019
Deep Neural Network Ensembles against Deception: Ensemble Diversity,
  Accuracy and Robustness
Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness
Ling Liu
Wenqi Wei
Ka-Ho Chow
Margaret Loper
Emre Gursoy
Stacey Truex
Yanzhao Wu
UQCVAAMLFedML
72
60
0
29 Aug 2019
advPattern: Physical-World Attacks on Deep Person Re-Identification via
  Adversarially Transformable Patterns
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns
Peng Kuang
Siyan Zheng
Mengkai Song
Qian Wang
Alireza Rahimpour
Hairong Qi
AAMLOOD
73
59
0
25 Aug 2019
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with
  Limited Queries
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
AAML
94
86
0
19 Aug 2019
On the Robustness of Human Pose Estimation
On the Robustness of Human Pose Estimation
Sahil Shah
Naman Jain
Abhishek Sharma
Arjun Jain
AAMLOOD
69
20
0
18 Aug 2019
Implicit Deep Learning
Implicit Deep Learning
L. Ghaoui
Fangda Gu
Bertrand Travacca
Armin Askari
Alicia Y. Tsai
AI4CE
64
182
0
17 Aug 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial
  Attacks
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
John E. Hopcroft
AAML
142
576
0
17 Aug 2019
AdvFaces: Adversarial Face Synthesis
AdvFaces: Adversarial Face Synthesis
Debayan Deb
Jianbang Zhang
Anil K. Jain
GANCVBMAAMLPICV
99
129
0
14 Aug 2019
Universal Adversarial Audio Perturbations
Universal Adversarial Audio Perturbations
Sajjad Abdoli
L. G. Hafemann
Jérôme Rony
Ismail Ben Ayed
P. Cardinal
Alessandro Lameiras Koerich
AAML
91
52
0
08 Aug 2019
MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks
MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks
Chen Ma
Chenxu Zhao
Hailin Shi
Li Chen
Junhai Yong
Dan Zeng
AAML
55
17
0
06 Aug 2019
On the Design of Black-box Adversarial Examples by Leveraging
  Gradient-free Optimization and Operator Splitting Method
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Pu Zhao
Sijia Liu
Pin-Yu Chen
Nghia Hoang
Kaidi Xu
B. Kailkhura
Xue Lin
AAML
119
54
0
26 Jul 2019
Enhancing Adversarial Example Transferability with an Intermediate Level
  Attack
Enhancing Adversarial Example Transferability with an Intermediate Level Attack
Qian Huang
Isay Katsman
Horace He
Zeqi Gu
Serge J. Belongie
Ser-Nam Lim
SILMAAML
106
248
0
23 Jul 2019
Adversarial Security Attacks and Perturbations on Machine Learning and
  Deep Learning Methods
Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods
Arif Siddiqi
AAML
64
11
0
17 Jul 2019
Graph Interpolating Activation Improves Both Natural and Robust
  Accuracies in Data-Efficient Deep Learning
Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning
Bao Wang
Stanley J. Osher
AAMLAI4CE
77
10
0
16 Jul 2019
Measuring the Transferability of Adversarial Examples
Measuring the Transferability of Adversarial Examples
D. Petrov
Timothy M. Hospedales
SILMAAML
32
23
0
14 Jul 2019
PhysGAN: Generating Physical-World-Resilient Adversarial Examples for
  Autonomous Driving
PhysGAN: Generating Physical-World-Resilient Adversarial Examples for Autonomous Driving
Zelun Kong
Junfeng Guo
Ang Li
Cong Liu
AAML
105
130
0
09 Jul 2019
Diminishing the Effect of Adversarial Perturbations via Refining Feature
  Representation
Diminishing the Effect of Adversarial Perturbations via Refining Feature Representation
Nader Asadi
Amirm. Sarfi
Mehrdad Hosseinzadeh
Sahba Tahsini
M. Eftekhari
AAML
32
2
0
01 Jul 2019
Fooling a Real Car with Adversarial Traffic Signs
Fooling a Real Car with Adversarial Traffic Signs
N. Morgulis
Alexander Kreines
Shachar Mendelowitz
Yuval Weisglass
AAML
83
93
0
30 Jun 2019
Cellular State Transformations using Generative Adversarial Networks
Cellular State Transformations using Generative Adversarial Networks
Colin Targonski
Benjamin T. Shealy
M. C. Smith
F. Feltus
16
1
0
28 Jun 2019
Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case
  Study on CNN-Based Lithographic Hotspot Detection
Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection
Kang Liu
Haoyu Yang
Yuzhe Ma
Benjamin Tan
Bei Yu
Evangeline F. Y. Young
Ramesh Karri
S. Garg
AAML
41
10
0
25 Jun 2019
A Cyclically-Trained Adversarial Network for Invariant Representation
  Learning
A Cyclically-Trained Adversarial Network for Invariant Representation Learning
Jiawei Chen
Janusz Konrad
Prakash Ishwar
AAMLGANOOD
24
8
0
21 Jun 2019
Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with
  Adversarial Perturbations
Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations
Yuezun Li
Xin Yang
Baoyuan Wu
Siwei Lyu
AAMLPICVCVBM
95
38
0
21 Jun 2019
Cloud-based Image Classification Service Is Not Robust To Simple
  Transformations: A Forgotten Battlefield
Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield
Dou Goodman
Tao Wei
AAML
69
6
0
19 Jun 2019
Trade-offs and Guarantees of Adversarial Representation Learning for
  Information Obfuscation
Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation
Han Zhao
Jianfeng Chi
Yuan Tian
Geoffrey J. Gordon
MIACV
51
2
0
19 Jun 2019
The Attack Generator: A Systematic Approach Towards Constructing
  Adversarial Attacks
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
F. Assion
Peter Schlicht
Florens Greßner
W. Günther
Fabian Hüger
Nico M. Schmidt
Umair Rasheed
AAML
75
14
0
17 Jun 2019
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Shuyu Cheng
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
AAML
94
274
0
17 Jun 2019
Defending Against Adversarial Attacks Using Random Forests
Defending Against Adversarial Attacks Using Random Forests
Yifan Ding
Liqiang Wang
Huan Zhang
Jinfeng Yi
Deliang Fan
Boqing Gong
AAML
64
14
0
16 Jun 2019
Mimic and Fool: A Task Agnostic Adversarial Attack
Mimic and Fool: A Task Agnostic Adversarial Attack
Akshay Chaturvedi
Utpal Garain
AAML
57
27
0
11 Jun 2019
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient
  Black-box Attacks
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Ziang Yan
Yiwen Guo
Changshui Zhang
AAML
79
111
0
11 Jun 2019
Robustness Verification of Tree-based Models
Robustness Verification of Tree-based Models
Hongge Chen
Huan Zhang
Si Si
Yang Li
Duane S. Boning
Cho-Jui Hsieh
AAML
103
77
0
10 Jun 2019
Adversarial Attack Generation Empowered by Min-Max Optimization
Adversarial Attack Generation Empowered by Min-Max Optimization
Jingkang Wang
Tianyun Zhang
Sijia Liu
Pin-Yu Chen
Jiacen Xu
M. Fardad
Yangqiu Song
AAML
74
37
0
09 Jun 2019
ML-LOO: Detecting Adversarial Examples with Feature Attribution
ML-LOO: Detecting Adversarial Examples with Feature Attribution
Puyudi Yang
Jianbo Chen
Cho-Jui Hsieh
Jane-ling Wang
Michael I. Jordan
AAML
93
101
0
08 Jun 2019
Defending Against Universal Attacks Through Selective Feature
  Regeneration
Defending Against Universal Attacks Through Selective Feature Regeneration
Tejas S. Borkar
Felix Heide
Lina Karam
AAML
30
1
0
08 Jun 2019
Making targeted black-box evasion attacks effective and efficient
Making targeted black-box evasion attacks effective and efficient
Mika Juuti
B. Atli
Nadarajah Asokan
AAMLMIACVMLAU
49
8
0
08 Jun 2019
Robustness for Non-Parametric Classification: A Generic Attack and
  Defense
Robustness for Non-Parametric Classification: A Generic Attack and Defense
Yao-Yuan Yang
Cyrus Rashtchian
Yizhen Wang
Kamalika Chaudhuri
SILMAAML
92
43
0
07 Jun 2019
Robust Attacks against Multiple Classifiers
Robust Attacks against Multiple Classifiers
Juan C. Perdomo
Yaron Singer
AAML
56
11
0
06 Jun 2019
Multi-way Encoding for Robustness
Multi-way Encoding for Robustness
Donghyun Kim
Sarah Adel Bargal
Jianming Zhang
Stan Sclaroff
AAML
38
2
0
05 Jun 2019
Adversarial Exploitation of Policy Imitation
Adversarial Exploitation of Policy Imitation
Vahid Behzadan
W. Hsu
66
24
0
03 Jun 2019
Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in
  Deep Learning with Provable Robustness
Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness
Nhathai Phan
Minh Nhat Vu
Yang Liu
R. Jin
Dejing Dou
Xintao Wu
My T. Thai
AAML
64
51
0
02 Jun 2019
Are Labels Required for Improving Adversarial Robustness?
Are Labels Required for Improving Adversarial Robustness?
J. Uesato
Jean-Baptiste Alayrac
Po-Sen Huang
Robert Stanforth
Alhussein Fawzi
Pushmeet Kohli
AAML
97
335
0
31 May 2019
Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty
  and Adversarial Robustness
Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty and Adversarial Robustness
A. Malinin
Mark Gales
UQCVAAML
92
177
0
31 May 2019
Identifying Classes Susceptible to Adversarial Attacks
Identifying Classes Susceptible to Adversarial Attacks
Rangeet Pan
Md Johirul Islam
Shibbir Ahmed
Hridesh Rajan
AAML
19
7
0
30 May 2019
Robust Sparse Regularization: Simultaneously Optimizing Neural Network
  Robustness and Compactness
Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness
Adnan Siraj Rakin
Zhezhi He
Li Yang
Yanzhi Wang
Liqiang Wang
Deliang Fan
AAML
93
21
0
30 May 2019
Snooping Attacks on Deep Reinforcement Learning
Snooping Attacks on Deep Reinforcement Learning
Matthew J. Inkawhich
Yiran Chen
Hai Helen Li
AAML
66
25
0
28 May 2019
Cross-Domain Transferability of Adversarial Perturbations
Cross-Domain Transferability of Adversarial Perturbations
Muzammal Naseer
Salman H. Khan
M. H. Khan
Fahad Shahbaz Khan
Fatih Porikli
AAML
115
145
0
28 May 2019
Brain-inspired reverse adversarial examples
Brain-inspired reverse adversarial examples
Shaokai Ye
S. Tan
Kaidi Xu
Yanzhi Wang
Chenglong Bao
Kaisheng Ma
AAML
25
5
0
28 May 2019
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Yuanshun Yao
Huiying Li
Haitao Zheng
Ben Y. Zhao
AAML
55
13
0
24 May 2019
Thwarting finite difference adversarial attacks with output
  randomization
Thwarting finite difference adversarial attacks with output randomization
Haidar Khan
Daniel Park
Azer Khan
B. Yener
SILMAAML
52
0
0
23 May 2019
A Direct Approach to Robust Deep Learning Using Adversarial Networks
A Direct Approach to Robust Deep Learning Using Adversarial Networks
Huaxia Wang
Chun-Nam Yu
GANAAMLOOD
76
77
0
23 May 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the
  Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer
  Domain
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
114
18
0
19 May 2019
Previous
123...131415...171819
Next