ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
MULDEF: Multi-model-based Defense Against Adversarial Examples for
  Neural Networks
MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks
Siwakorn Srisakaokul
Yuhao Zhang
Zexuan Zhong
Wei Yang
Tao Xie
Bo Li
AAML
87
19
0
31 Aug 2018
Targeted Nonlinear Adversarial Perturbations in Images and Videos
Targeted Nonlinear Adversarial Perturbations in Images and Videos
R. Rey-de-Castro
H. Rabitz
AAML
81
10
0
27 Aug 2018
Stochastic Combinatorial Ensembles for Defending Against Adversarial
  Examples
Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples
George Adam
P. Smirnov
David Duvenaud
B. Haibe-Kains
Anna Goldenberg
AAML
49
10
0
20 Aug 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
89
291
0
16 Aug 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
80
246
0
10 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
69
24
0
06 Aug 2018
Gray-box Adversarial Training
Gray-box Adversarial Training
S. VivekB.
Konda Reddy Mopuri
R. Venkatesh Babu
AAML
57
35
0
06 Aug 2018
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the
  Robustness of 18 Deep Image Classification Models
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D. Su
Huan Zhang
Hongge Chen
Jinfeng Yi
Pin-Yu Chen
Yupeng Gao
VLM
140
393
0
05 Aug 2018
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak
  Processes
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
Mehmet Sinan Inci
T. Eisenbarth
B. Sunar
AAML
64
8
0
03 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class
  Impressions
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
80
85
0
03 Aug 2018
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Andrew Ilyas
Logan Engstrom
Aleksander Madry
MLAUAAML
104
375
0
20 Jul 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity
  of A3C Path Finding
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Tong Chen
Wenjia Niu
Yingxiao Xiang
XiaoXuan Bai
Jiqiang Liu
Zhen Han
Gang Li
AAML
62
22
0
18 Jul 2018
Defend Deep Neural Networks Against Adversarial Examples via Fixed and
  Dynamic Quantized Activation Functions
Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions
Adnan Siraj Rakin
Jinfeng Yi
Boqing Gong
Deliang Fan
AAMLMQ
80
50
0
18 Jul 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based
  Approach
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
112
348
0
12 Jul 2018
Implicit Generative Modeling of Random Noise during Training for
  Adversarial Robustness
Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness
Priyadarshini Panda
Kaushik Roy
AAML
50
4
0
05 Jul 2018
Adversarial Examples in Deep Learning: Characterization and Divergence
Adversarial Examples in Deep Learning: Characterization and Divergence
Wenqi Wei
Ling Liu
Margaret Loper
Stacey Truex
Lei Yu
Mehmet Emre Gursoy
Yanzhao Wu
AAMLSILM
119
18
0
29 Jun 2018
Adversarial Reprogramming of Neural Networks
Adversarial Reprogramming of Neural Networks
Gamaleldin F. Elsayed
Ian Goodfellow
Jascha Narain Sohl-Dickstein
OODAAML
55
183
0
28 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
73
7
0
19 Jun 2018
PAC-learning in the presence of evasion adversaries
PAC-learning in the presence of evasion adversaries
Daniel Cullina
A. Bhagoji
Prateek Mittal
AAML
90
55
0
05 Jun 2018
Detecting Adversarial Examples via Key-based Network
Detecting Adversarial Examples via Key-based Network
Pinlong Zhao
Zhouyu Fu
Ou Wu
Q. Hu
Jun Wang
AAMLGAN
59
8
0
02 Jun 2018
Resisting Adversarial Attacks using Gaussian Mixture Variational
  Autoencoders
Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders
Partha Ghosh
Arpan Losalka
Michael J. Black
AAML
69
78
0
31 May 2018
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
MLAUAAML
94
399
0
30 May 2018
Adversarial Noise Attacks of Deep Learning Architectures -- Stability
  Analysis via Sparse Modeled Signals
Adversarial Noise Attacks of Deep Learning Architectures -- Stability Analysis via Sparse Modeled Signals
Yaniv Romano
Aviad Aberdam
Jeremias Sulam
Michael Elad
AAML
73
22
0
29 May 2018
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
M. Alzantot
Yash Sharma
Supriyo Chakraborty
Huan Zhang
Cho-Jui Hsieh
Mani B. Srivastava
AAML
100
258
0
28 May 2018
Towards Robust Training of Neural Networks by Regularizing Adversarial
  Gradients
Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients
Fuxun Yu
Zirui Xu
Yanzhi Wang
Chenchen Liu
Xiang Chen
AAML
42
10
0
23 May 2018
Adversarially Robust Training through Structured Gradient Regularization
Adversarially Robust Training through Structured Gradient Regularization
Kevin Roth
Aurelien Lucchi
Sebastian Nowozin
Thomas Hofmann
72
23
0
22 May 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GANAAML
218
307
0
21 May 2018
Targeted Adversarial Examples for Black Box Audio Systems
Targeted Adversarial Examples for Black Box Audio Systems
Rohan Taori
Amog Kamsetty
Brenton Chu
N. Vemuri
AAML
63
186
0
20 May 2018
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using
  Generative Models
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models
Pouya Samangouei
Maya Kabkab
Rama Chellappa
AAMLGAN
111
1,182
0
17 May 2018
Detecting Adversarial Samples for Deep Neural Networks through Mutation
  Testing
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing
Jingyi Wang
Jun Sun
Peixin Zhang
Xinyu Wang
AAML
76
41
0
14 May 2018
AttriGuard: A Practical Defense Against Attribute Inference Attacks via
  Adversarial Machine Learning
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia
Neil Zhenqiang Gong
AAML
72
166
0
13 May 2018
Curriculum Adversarial Training
Curriculum Adversarial Training
Qi-Zhi Cai
Min Du
Chang-rui Liu
Basel Alomair
AAML
91
165
0
13 May 2018
Breaking Transferability of Adversarial Samples with Randomness
Breaking Transferability of Adversarial Samples with Randomness
Yan Zhou
Murat Kantarcioglu
B. Xi
AAML
52
12
0
11 May 2018
Formal Security Analysis of Neural Networks using Symbolic Intervals
Formal Security Analysis of Neural Networks using Symbolic Intervals
Shiqi Wang
Kexin Pei
Justin Whitehouse
Junfeng Yang
Suman Jana
AAML
86
478
0
28 Apr 2018
Towards Fast Computation of Certified Robustness for ReLU Networks
Towards Fast Computation of Certified Robustness for ReLU Networks
Tsui-Wei Weng
Huan Zhang
Hongge Chen
Zhao Song
Cho-Jui Hsieh
Duane S. Boning
Inderjit S. Dhillon
Luca Daniel
AAML
136
695
0
25 Apr 2018
Black-box Adversarial Attacks with Limited Queries and Information
Black-box Adversarial Attacks with Limited Queries and Information
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
MLAUAAML
184
1,208
0
23 Apr 2018
Pathologies of Neural Models Make Interpretations Difficult
Pathologies of Neural Models Make Interpretations Difficult
Shi Feng
Eric Wallace
Alvin Grissom II
Mohit Iyyer
Pedro Rodriguez
Jordan L. Boyd-Graber
AAMLFAtt
97
322
0
20 Apr 2018
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object
  Detector
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
Shang-Tse Chen
Cory Cornelius
Jason Martin
Duen Horng Chau
ObjD
213
429
0
16 Apr 2018
On the Limitation of MagNet Defense against $L_1$-based Adversarial
  Examples
On the Limitation of MagNet Defense against L1L_1L1​-based Adversarial Examples
Pei-Hsuan Lu
Pin-Yu Chen
Kang-Cheng Chen
Chia-Mu Yu
AAML
114
19
0
14 Apr 2018
Adversarial Attacks and Defences Competition
Adversarial Attacks and Defences Competition
Alexey Kurakin
Ian Goodfellow
Samy Bengio
Yinpeng Dong
Fangzhou Liao
...
Junjiajia Long
Yerkebulan Berdibekov
Takuya Akiba
Seiya Tokui
Motoki Abe
AAMLSILM
95
322
0
31 Mar 2018
Defending against Adversarial Images using Basis Functions
  Transformations
Defending against Adversarial Images using Basis Functions Transformations
Uri Shaham
J. Garritano
Yutaro Yamada
Ethan Weinberger
A. Cloninger
Xiuyuan Cheng
Kelly P. Stanton
Y. Kluger
AAML
69
57
0
28 Mar 2018
Bypassing Feature Squeezing by Increasing Adversary Strength
Bypassing Feature Squeezing by Increasing Adversary Strength
Yash Sharma
Pin-Yu Chen
AAML
46
34
0
27 Mar 2018
On the Limitation of Local Intrinsic Dimensionality for Characterizing
  the Subspaces of Adversarial Examples
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
66
26
0
26 Mar 2018
Adversarial Defense based on Structure-to-Signal Autoencoders
Adversarial Defense based on Structure-to-Signal Autoencoders
Joachim Folz
Sebastián M. Palacio
Jörn Hees
Damian Borth
Andreas Dengel
AAML
71
32
0
21 Mar 2018
Improving Transferability of Adversarial Examples with Input Diversity
Improving Transferability of Adversarial Examples with Input Diversity
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
AAML
119
1,131
0
19 Mar 2018
Technical Report: When Does Machine Learning FAIL? Generalized
  Transferability for Evasion and Poisoning Attacks
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Octavian Suciu
R. Marginean
Yigitcan Kaya
Hal Daumé
Tudor Dumitras
AAML
86
287
0
19 Mar 2018
Defending against Adversarial Attack towards Deep Neural Networks via
  Collaborative Multi-task Training
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-task Training
Derui Wang
Chaoran Li
S. Wen
Surya Nepal
Yang Xiang
AAML
74
30
0
14 Mar 2018
Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust
  Deep Learning
Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning
Nicolas Papernot
Patrick McDaniel
OODAAML
156
508
0
13 Mar 2018
Invisible Mask: Practical Attacks on Face Recognition with Infrared
Invisible Mask: Practical Attacks on Face Recognition with Infrared
Zhe Zhou
Di Tang
Xiaofeng Wang
Weili Han
Xiangyu Liu
Kehuan Zhang
CVBMAAML
68
103
0
13 Mar 2018
Sparse Adversarial Perturbations for Videos
Sparse Adversarial Perturbations for Videos
Xingxing Wei
Jun Zhu
Hang Su
AAML
77
142
0
07 Mar 2018
Previous
123...16171819
Next