Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1611.02770
Cited By
v1
v2
v3 (latest)
Delving into Transferable Adversarial Examples and Black-box Attacks
8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Delving into Transferable Adversarial Examples and Black-box Attacks"
50 / 928 papers shown
Title
Decompiling x86 Deep Neural Network Executables
Zhibo Liu
Yuanyuan Yuan
Shuai Wang
Xiaofei Xie
Lei Ma
AAML
85
15
0
03 Oct 2022
Robust Empirical Risk Minimization with Tolerance
Robi Bhattacharjee
Max Hopkins
Akash Kumar
Hantao Yu
Kamalika Chaudhuri
OOD
75
8
0
02 Oct 2022
DeltaBound Attack: Efficient decision-based attack in low queries regime
L. Rossi
AAML
78
0
0
01 Oct 2022
On the Adversarial Transferability of ConvMixer Models
Ryota Iijima
Miki Tanaka
Isao Echizen
Hitoshi Kiya
AAML
60
2
0
19 Sep 2022
Robust Ensemble Morph Detection with Domain Generalization
Hossein Kashiani
S. Sami
Sobhan Soleymani
Nasser M. Nasrabadi
OOD
AAML
83
8
0
16 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
103
9
0
11 Sep 2022
Enhancing the Self-Universality for Transferable Targeted Attacks
Zhipeng Wei
Jingjing Chen
Zuxuan Wu
Yueping Jiang
AAML
83
35
0
08 Sep 2022
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples
Nuo Xu
Kaleel Mahmood
Haowen Fang
Ethan Rathbun
Caiwen Ding
Wujie Wen
AAML
104
13
0
07 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
84
4
0
07 Sep 2022
Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System
Zhendong Wang
Xiaoming Zeng
Xulong Tang
Qiang Yan
Xingbo Hu
Yang Hu
AAML
MIACV
FedML
43
6
0
29 Aug 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
65
1
0
28 Aug 2022
SA: Sliding attack for synthetic speech detection with resistance to clipping and self-splicing
JiaCheng Deng
Dong Li
Yan Diqun
Rangding Wang
Zeng Jiaming
AAML
60
0
0
27 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
69
2
0
18 Aug 2022
An Efficient Multi-Step Framework for Malware Packing Identification
Jong-Wouk Kim
Yang-Sae Moon
Mi-Jung Choi
23
0
0
17 Aug 2022
Blackbox Attacks via Surrogate Ensemble Search
Zikui Cai
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
108
21
0
07 Aug 2022
Rank-based Decomposable Losses in Machine Learning: A Survey
Shu Hu
Xin Wang
Siwei Lyu
100
32
0
18 Jul 2022
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Xiaoyu Liang
Yaguan Qian
Jianchang Huang
Xiang Ling
Bin Wang
Chunming Wu
Wassim Swaileh
AAML
45
4
0
16 Jul 2022
Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
GAN
AAML
61
0
0
12 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
103
167
0
12 Jul 2022
Jacobian Norm with Selective Input Gradient Regularization for Improved and Interpretable Adversarial Defense
Deyin Liu
Lin Wu
Haifeng Zhao
F. Boussaïd
Bennamoun
Xianghua Xie
AAML
75
3
0
09 Jul 2022
Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future
Byunggill Joe
I. Shin
Jihun Hamm
AAML
22
0
0
08 Jul 2022
Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Lele Wang
B. Liu
UQCV
57
5
0
29 Jun 2022
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
96
39
0
21 Jun 2022
Low-Mid Adversarial Perturbation against Unauthorized Face Recognition System
Jiaming Zhang
Qiaomin Yi
Dongyuan Lu
Jitao Sang
PICV
AAML
CVBM
32
5
0
19 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
83
5
0
16 Jun 2022
Early Transferability of Adversarial Examples in Deep Neural Networks
Oriel BenShmuel
AAML
34
0
0
09 Jun 2022
Meet You Halfway: Explaining Deep Learning Mysteries
Oriel BenShmuel
AAML
FedML
FAtt
OOD
56
0
0
09 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
99
19
0
07 Jun 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training
Guodong Cao
Peng Kuang
Xiaowei Dong
Zhifei Zhang
Hengchang Guo
Zhan Qin
Kui Ren
AAML
41
2
0
05 Jun 2022
The Importance of Image Interpretation: Patterns of Semantic Misclassification in Real-World Adversarial Images
Zhengyu Zhao
Nga Dang
Martha Larson
48
0
0
03 Jun 2022
FACM: Intermediate Layer Still Retain Effective Features against Adversarial Examples
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
79
0
0
02 Jun 2022
Searching for the Essence of Adversarial Perturbations
Dennis Y. Menn
Tzu-hsun Feng
Hung-yi Lee
AAML
26
1
0
30 May 2022
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
85
54
0
26 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
75
11
0
21 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
65
0
0
21 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
67
56
0
12 May 2022
Structural Extensions of Basis Pursuit: Guarantees on Adversarial Robustness
Dávid Szeghy
Mahmoud Aslan
Á. Fóthi
Balázs Mészáros
Z. '. Milacski
András Lőrincz
AAML
44
0
0
05 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
89
7
0
05 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAML
MLAU
55
3
0
30 Apr 2022
Adversarial Fine-tune with Dynamically Regulated Adversary
Peng-Fei Hou
Ming Zhou
Jie Han
Petr Musílek
Xingyu Li
AAML
56
3
0
28 Apr 2022
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Huipeng Zhou
Yu-an Tan
Yajie Wang
Haoran Lyu
Shan-Hung Wu
Yuan-zhang Li
ViT
60
4
0
27 Apr 2022
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Xianglong He
Yuezun Li
Haipeng Qu
Junyu Dong
AAML
31
1
0
22 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
44
2
0
18 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
79
5
0
06 Apr 2022
Investigating Top-
k
k
k
White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
85
43
0
30 Mar 2022
Zero-Query Transfer Attacks on Context-Aware Object Detectors
Zikui Cai
S. Rane
Alejandro E. Brito
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
65
22
0
29 Mar 2022
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework
Jikun Chen
Feng Qiang
Na Ruan
FedML
41
2
0
27 Mar 2022
Reverse Engineering of Imperceptible Adversarial Image Perturbations
Yifan Gong
Yuguang Yao
Yize Li
Yimeng Zhang
Xiaoming Liu
Xinyu Lin
Sijia Liu
AAML
172
21
0
26 Mar 2022
Previous
1
2
3
...
5
6
7
...
17
18
19
Next