ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep
  Receviers
Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep Receviers
Kunze Wu
Weiheng Jiang
Dusit Niyato
Yinghuan Li
Chuang Luo
AAML
118
0
0
04 Sep 2024
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language
  Models
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language Models
Zelin Li
Kehai Chen
Lemao Liu
Xuefeng Bai
Mingming Yang
Yang Xiang
Min Zhang
AAML
83
1
0
26 Aug 2024
Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models
Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models
Cong Wan
Yuhang He
Xiang Song
Yihong Gong
DiffMAAML
97
7
0
20 Aug 2024
Enhancing Adversarial Transferability with Adversarial Weight Tuning
Enhancing Adversarial Transferability with Adversarial Weight Tuning
Jiahao Chen
Zhou Feng
Rui Zeng
Yuwen Pu
Chunyi Zhou
Yi Jiang
Yuyou Gan
Jinbao Li
Shouling Ji
AAML
106
1
0
18 Aug 2024
Constructing Adversarial Examples for Vertical Federated Learning:
  Optimal Client Corruption through Multi-Armed Bandit
Constructing Adversarial Examples for Vertical Federated Learning: Optimal Client Corruption through Multi-Armed Bandit
Duanyi Yao
Songze Li
Ye Xue
Jin Liu
FedMLAAML
78
1
0
08 Aug 2024
Downstream Transfer Attack: Adversarial Attacks on Downstream Models
  with Pre-trained Vision Transformers
Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Weijie Zheng
Xingjun Ma
Hanxun Huang
Zuxuan Wu
Yu-Gang Jiang
AAML
102
0
0
03 Aug 2024
Securing the Diagnosis of Medical Imaging: An In-depth Analysis of
  AI-Resistant Attacks
Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks
A. Biswas
Md Abdullah Al Nasim
Chen Chen
Weiming Zhuang
Abdur Rashid
AAML
71
3
0
01 Aug 2024
Boosting Adversarial Transferability for Skeleton-based Action
  Recognition via Exploring the Model Posterior Space
Boosting Adversarial Transferability for Skeleton-based Action Recognition via Exploring the Model Posterior Space
Yunfeng Diao
Baiqi Wu
Ruixuan Zhang
Xun Yang
Meng Wang
He Wang
85
0
0
11 Jul 2024
Invisible Optical Adversarial Stripes on Traffic Sign against Autonomous
  Vehicles
Invisible Optical Adversarial Stripes on Traffic Sign against Autonomous Vehicles
Dongfang Guo
Yuting Wu
Yimin Dai
Pengfei Zhou
Xin Lou
Rui Tan
65
4
0
10 Jul 2024
A Survey of Attacks on Large Vision-Language Models: Resources,
  Advances, and Future Trends
A Survey of Attacks on Large Vision-Language Models: Resources, Advances, and Future Trends
Daizong Liu
Mingyu Yang
Xiaoye Qu
Pan Zhou
Yu Cheng
Wei Hu
ELMAAML
108
32
0
10 Jul 2024
DLOVE: A new Security Evaluation Tool for Deep Learning Based
  Watermarking Techniques
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques
Sudev Kumar Padhi
Sk. Subidh Ali
AAML
104
0
0
09 Jul 2024
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition
  Systems
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems
Zheng Fang
Tao Wang
Lingchen Zhao
Shenyi Zhang
Bowen Li
Yunjie Ge
Q. Li
Chao Shen
Qian Wang
53
9
0
27 Jun 2024
JailbreakZoo: Survey, Landscapes, and Horizons in Jailbreaking Large
  Language and Vision-Language Models
JailbreakZoo: Survey, Landscapes, and Horizons in Jailbreaking Large Language and Vision-Language Models
Haibo Jin
Leyang Hu
Xinuo Li
Peiyan Zhang
Chonghan Chen
Jun Zhuang
Haohan Wang
PILM
99
32
0
26 Jun 2024
Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors
Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors
Peter Lorenz
Mario Fernandez
Jens Müller
Ullrich Kothe
AAML
244
1
0
21 Jun 2024
Contextual Interaction via Primitive-based Adversarial Training For
  Compositional Zero-shot Learning
Contextual Interaction via Primitive-based Adversarial Training For Compositional Zero-shot Learning
Suyi Li
Chenyi Jiang
Shidong Wang
Yang Long
Zheng Zhang
Haofeng Zhang
CoGe
92
0
0
21 Jun 2024
Enhancing robustness of data-driven SHM models: adversarial training
  with circle loss
Enhancing robustness of data-driven SHM models: adversarial training with circle loss
Xiangli Yang
Xijie Deng
Hanwei Zhang
Yang Zou
Jianxi Yang
AAML
62
0
0
20 Jun 2024
MirrorCheck: Efficient Adversarial Defense for Vision-Language Models
MirrorCheck: Efficient Adversarial Defense for Vision-Language Models
Samar Fares
Klea Ziu
Toluwani Aremu
Nikita Durasov
Martin Takáč
Pascal Fua
Karthik Nandakumar
Ivan Laptev
VLMAAML
99
5
0
13 Jun 2024
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation
Zhaoyi Lu
Wenchao Xu
Ming Tu
Xin Xie
Cunqing Hua
Nan Cheng
72
1
0
11 Jun 2024
Fast White-Box Adversarial Streaming Without a Random Oracle
Fast White-Box Adversarial Streaming Without a Random Oracle
Ying Feng
Aayush Jain
David P. Woodruff
AAML
82
1
0
10 Jun 2024
Perturbation Towards Easy Samples Improves Targeted Adversarial
  Transferability
Perturbation Towards Easy Samples Improves Targeted Adversarial Transferability
Junqi Gao
Biqing Qi
Yao Li
Zhichang Guo
Dong Li
Yuming Xing
Dazhi Zhang
AAML
75
7
0
08 Jun 2024
Enhancing Adversarial Transferability via Information Bottleneck
  Constraints
Enhancing Adversarial Transferability via Information Bottleneck Constraints
Biqing Qi
Junqi Gao
Jianxing Liu
Ligang Wu
Bowen Zhou
AAML
71
2
0
08 Jun 2024
Principles of Designing Robust Remote Face Anti-Spoofing Systems
Principles of Designing Robust Remote Face Anti-Spoofing Systems
Xiang Xu
Tianchen Zhao
Zheng Zhang
Zhihua Li
Jon Wu
Alessandro Achille
Mani Srivastava
AAML
84
4
0
06 Jun 2024
HOLMES: to Detect Adversarial Examples with Multiple Detectors
HOLMES: to Detect Adversarial Examples with Multiple Detectors
Jing Wen
AAML
78
0
0
30 May 2024
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided
  by a Function Prior
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior
Shuyu Cheng
Yibo Miao
Yinpeng Dong
Xiao Yang
Xiao-Shan Gao
Jun Zhu
AAML
99
5
0
29 May 2024
Improved Generation of Adversarial Examples Against Safety-aligned LLMs
Improved Generation of Adversarial Examples Against Safety-aligned LLMs
Qizhang Li
Yiwen Guo
Wangmeng Zuo
Hao Chen
AAMLSILM
85
7
0
28 May 2024
Benchmarking and Improving Bird's Eye View Perception Robustness in Autonomous Driving
Benchmarking and Improving Bird's Eye View Perception Robustness in Autonomous Driving
Shaoyuan Xie
Lingdong Kong
Wenwei Zhang
Jiawei Ren
Liang Pan
Kai-xiang Chen
Ziwei Liu
AAML
94
12
0
27 May 2024
Enhancing Adversarial Transferability Through Neighborhood Conditional
  Sampling
Enhancing Adversarial Transferability Through Neighborhood Conditional Sampling
Chunlin Qiu
Yiheng Duan
Lingchen Zhao
Qian Wang
AAML
90
3
0
25 May 2024
Learning to Transform Dynamically for Better Adversarial Transferability
Learning to Transform Dynamically for Better Adversarial Transferability
Rongyi Zhu
Zeliang Zhang
Susan Liang
Zhuo Liu
Chenliang Xu
AAML
121
18
0
23 May 2024
Properties that allow or prohibit transferability of adversarial attacks
  among quantized networks
Properties that allow or prohibit transferability of adversarial attacks among quantized networks
Abhishek Shrestha
Jürgen Grossmann
AAML
40
0
0
15 May 2024
Evaluating Adversarial Robustness in the Spatial Frequency Domain
Evaluating Adversarial Robustness in the Spatial Frequency Domain
Keng-Hsin Liao
Chin-Yuan Yeh
Hsi-Wen Chen
Ming-Syan Chen
69
0
0
10 May 2024
Universal Adversarial Perturbations for Vision-Language Pre-trained
  Models
Universal Adversarial Perturbations for Vision-Language Pre-trained Models
Pengfei Zhang
Zi Huang
Guangdong Bai
AAML
87
13
0
09 May 2024
Effective and Robust Adversarial Training against Data and Label
  Corruptions
Effective and Robust Adversarial Training against Data and Label Corruptions
Pengfei Zhang
Zi Huang
Xin-Shun Xu
Guangdong Bai
93
4
0
07 May 2024
Don't Say No: Jailbreaking LLM by Suppressing Refusal
Don't Say No: Jailbreaking LLM by Suppressing Refusal
Yukai Zhou
Jian Lou
Zhijie Huang
Zhan Qin
Yibei Yang
Wenjie Wang
AAML
116
19
0
25 Apr 2024
SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam
  Detection
SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
Yekai Li
Rufan Zhang
Wenxin Rong
Xianghang Mi
92
3
0
15 Apr 2024
Watermark-embedded Adversarial Examples for Copyright Protection against
  Diffusion Models
Watermark-embedded Adversarial Examples for Copyright Protection against Diffusion Models
Peifei Zhu
Tsubasa Takahashi
Hirokatsu Kataoka
WIGM
88
16
0
15 Apr 2024
PASA: Attack Agnostic Unsupervised Adversarial Detection using
  Prediction & Attribution Sensitivity Analysis
PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Dipkamal Bhusal
Md Tanvirul Alam
M. K. Veerabhadran
Michael Clifford
Sara Rampazzi
Nidhi Rastogi
AAML
95
1
0
12 Apr 2024
Towards Robust Domain Generation Algorithm Classification
Towards Robust Domain Generation Algorithm Classification
Arthur Drichel
Marc Meyer
Ulrike Meyer
AAML
72
3
0
09 Apr 2024
Unsegment Anything by Simulating Deformation
Unsegment Anything by Simulating Deformation
Jiahao Lu
Xingyi Yang
Xinchao Wang
104
4
0
03 Apr 2024
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise
  Regression Tasks
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks
Zhiyuan Cheng
Zhaoyi Liu
Tengda Guo
Shiwei Feng
Dongfang Liu
Mingjie Tang
Xiangyu Zhang
AAML
108
3
0
01 Apr 2024
On Inherent Adversarial Robustness of Active Vision Systems
On Inherent Adversarial Robustness of Active Vision Systems
Amitangshu Mukherjee
Timur Ibrayev
Kaushik Roy
AAML
79
0
0
29 Mar 2024
Testing the Limits of Jailbreaking Defenses with the Purple Problem
Testing the Limits of Jailbreaking Defenses with the Purple Problem
Taeyoun Kim
Suhas Kotha
Aditi Raghunathan
AAML
84
6
0
20 Mar 2024
As Firm As Their Foundations: Can open-sourced foundation models be used
  to create adversarial examples for downstream tasks?
As Firm As Their Foundations: Can open-sourced foundation models be used to create adversarial examples for downstream tasks?
Anjun Hu
Jindong Gu
Francesco Pinto
Konstantinos Kamnitsas
Philip Torr
AAMLSILM
86
5
0
19 Mar 2024
Interactive Trimming against Evasive Online Data Manipulation Attacks: A
  Game-Theoretic Approach
Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach
Yue Fu
Qingqing Ye
Rong Du
Haibo Hu
AAML
50
0
0
15 Mar 2024
An Image Is Worth 1000 Lies: Adversarial Transferability across Prompts
  on Vision-Language Models
An Image Is Worth 1000 Lies: Adversarial Transferability across Prompts on Vision-Language Models
Haochen Luo
Jindong Gu
Fengyuan Liu
Philip Torr
VLMVPVLMAAML
84
24
0
14 Mar 2024
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Bo Yang
Hengwei Zhang
Jin-dong Wang
Yulong Yang
Chenhao Lin
Chao Shen
Zhengyu Zhao
SILMAAML
176
3
0
27 Feb 2024
Distilling Adversarial Robustness Using Heterogeneous Teachers
Distilling Adversarial Robustness Using Heterogeneous Teachers
Jieren Deng
A. Palmer
Rigel Mahmood
Ethan Rathbun
Jinbo Bi
Kaleel Mahmood
Derek Aguiar
AAML
78
1
0
23 Feb 2024
Is LLM-as-a-Judge Robust? Investigating Universal Adversarial Attacks on
  Zero-shot LLM Assessment
Is LLM-as-a-Judge Robust? Investigating Universal Adversarial Attacks on Zero-shot LLM Assessment
Vyas Raina
Adian Liusie
Mark Gales
AAMLELM
94
63
0
21 Feb 2024
Query-Based Adversarial Prompt Generation
Query-Based Adversarial Prompt Generation
Jonathan Hayase
Ema Borevkovic
Nicholas Carlini
Florian Tramèr
Milad Nasr
AAMLSILM
99
32
0
19 Feb 2024
Stealing the Invisible: Unveiling Pre-Trained CNN Models through
  Adversarial Examples and Timing Side-Channels
Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels
Shubhi Shukla
Manaar Alam
Pabitra Mitra
Debdeep Mukhopadhyay
MLAUAAML
130
1
0
19 Feb 2024
Evaluating Adversarial Robustness of Low dose CT Recovery
Evaluating Adversarial Robustness of Low dose CT Recovery
Kanchana Vaishnavi Gandikota
Paramanand Chandramouli
Hannah Dröge
Michael Moeller
OODAAML
60
3
0
18 Feb 2024
Previous
12345...171819
Next