ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
Decompiling x86 Deep Neural Network Executables
Decompiling x86 Deep Neural Network Executables
Zhibo Liu
Yuanyuan Yuan
Shuai Wang
Xiaofei Xie
Lei Ma
AAML
85
15
0
03 Oct 2022
Robust Empirical Risk Minimization with Tolerance
Robust Empirical Risk Minimization with Tolerance
Robi Bhattacharjee
Max Hopkins
Akash Kumar
Hantao Yu
Kamalika Chaudhuri
OOD
75
8
0
02 Oct 2022
DeltaBound Attack: Efficient decision-based attack in low queries regime
DeltaBound Attack: Efficient decision-based attack in low queries regime
L. Rossi
AAML
78
0
0
01 Oct 2022
On the Adversarial Transferability of ConvMixer Models
On the Adversarial Transferability of ConvMixer Models
Ryota Iijima
Miki Tanaka
Isao Echizen
Hitoshi Kiya
AAML
60
2
0
19 Sep 2022
Robust Ensemble Morph Detection with Domain Generalization
Robust Ensemble Morph Detection with Domain Generalization
Hossein Kashiani
S. Sami
Sobhan Soleymani
Nasser M. Nasrabadi
OODAAML
83
8
0
16 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via
  Attention-based Network in Face Recognition
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
103
9
0
11 Sep 2022
Enhancing the Self-Universality for Transferable Targeted Attacks
Enhancing the Self-Universality for Transferable Targeted Attacks
Zhipeng Wei
Jingjing Chen
Zuxuan Wu
Yueping Jiang
AAML
83
35
0
08 Sep 2022
Attacking the Spike: On the Transferability and Security of Spiking
  Neural Networks to Adversarial Examples
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples
Nuo Xu
Kaleel Mahmood
Haowen Fang
Ethan Rathbun
Caiwen Ding
Wujie Wen
AAML
104
13
0
07 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
84
4
0
07 Sep 2022
Demystifying Arch-hints for Model Extraction: An Attack in Unified
  Memory System
Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System
Zhendong Wang
Xiaoming Zeng
Xulong Tang
Qiang Yan
Xingbo Hu
Yang Hu
AAMLMIACVFedML
43
6
0
29 Aug 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models
  with Transferred Evolutionary Strategies
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
65
1
0
28 Aug 2022
SA: Sliding attack for synthetic speech detection with resistance to clipping and self-splicing
JiaCheng Deng
Dong Li
Yan Diqun
Rangding Wang
Zeng Jiaming
AAML
60
0
0
27 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
69
2
0
18 Aug 2022
An Efficient Multi-Step Framework for Malware Packing Identification
An Efficient Multi-Step Framework for Malware Packing Identification
Jong-Wouk Kim
Yang-Sae Moon
Mi-Jung Choi
23
0
0
17 Aug 2022
Blackbox Attacks via Surrogate Ensemble Search
Blackbox Attacks via Surrogate Ensemble Search
Zikui Cai
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
108
21
0
07 Aug 2022
Rank-based Decomposable Losses in Machine Learning: A Survey
Rank-based Decomposable Losses in Machine Learning: A Survey
Shu Hu
Xin Wang
Siwei Lyu
100
32
0
18 Jul 2022
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial
  Training
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Xiaoyu Liang
Yaguan Qian
Jianchang Huang
Xiang Ling
Bin Wang
Chunming Wu
Wassim Swaileh
AAML
45
4
0
16 Jul 2022
Exploring Adversarial Examples and Adversarial Robustness of
  Convolutional Neural Networks by Mutual Information
Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
GANAAML
61
0
0
12 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
103
167
0
12 Jul 2022
Jacobian Norm with Selective Input Gradient Regularization for Improved
  and Interpretable Adversarial Defense
Jacobian Norm with Selective Input Gradient Regularization for Improved and Interpretable Adversarial Defense
Deyin Liu
Lin Wu
Haifeng Zhao
F. Boussaïd
Bennamoun
Xianghua Xie
AAML
75
3
0
09 Jul 2022
Online Evasion Attacks on Recurrent Models:The Power of Hallucinating
  the Future
Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future
Byunggill Joe
I. Shin
Jihun Hamm
AAML
22
0
0
08 Jul 2022
Adversarial Ensemble Training by Jointly Learning Label Dependencies and
  Member Models
Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Lele Wang
B. Liu
UQCV
57
5
0
29 Jun 2022
Transferable Graph Backdoor Attack
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
96
39
0
21 Jun 2022
Low-Mid Adversarial Perturbation against Unauthorized Face Recognition
  System
Low-Mid Adversarial Perturbation against Unauthorized Face Recognition System
Jiaming Zhang
Qiaomin Yi
Dongyuan Lu
Jitao Sang
PICVAAMLCVBM
32
5
0
19 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
83
5
0
16 Jun 2022
Early Transferability of Adversarial Examples in Deep Neural Networks
Early Transferability of Adversarial Examples in Deep Neural Networks
Oriel BenShmuel
AAML
34
0
0
09 Jun 2022
Meet You Halfway: Explaining Deep Learning Mysteries
Meet You Halfway: Explaining Deep Learning Mysteries
Oriel BenShmuel
AAMLFedMLFAttOOD
56
0
0
09 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
99
19
0
07 Jun 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness
  Trade-Off in Adversarial Training
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training
Guodong Cao
Peng Kuang
Xiaowei Dong
Zhifei Zhang
Hengchang Guo
Zhan Qin
Kui Ren
AAML
41
2
0
05 Jun 2022
The Importance of Image Interpretation: Patterns of Semantic
  Misclassification in Real-World Adversarial Images
The Importance of Image Interpretation: Patterns of Semantic Misclassification in Real-World Adversarial Images
Zhengyu Zhao
Nga Dang
Martha Larson
48
0
0
03 Jun 2022
FACM: Intermediate Layer Still Retain Effective Features against
  Adversarial Examples
FACM: Intermediate Layer Still Retain Effective Features against Adversarial Examples
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
79
0
0
02 Jun 2022
Searching for the Essence of Adversarial Perturbations
Searching for the Essence of Adversarial Perturbations
Dennis Y. Menn
Tzu-hsun Feng
Hung-yi Lee
AAML
26
1
0
30 May 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
85
54
0
26 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Post-breach Recovery: Protection against White-box Adversarial Examples
  for Leaked DNN Models
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
75
11
0
21 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
65
0
0
21 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
67
56
0
12 May 2022
Structural Extensions of Basis Pursuit: Guarantees on Adversarial
  Robustness
Structural Extensions of Basis Pursuit: Guarantees on Adversarial Robustness
Dávid Szeghy
Mahmoud Aslan
Á. Fóthi
Balázs Mészáros
Z. '. Milacski
András Lőrincz
AAML
44
0
0
05 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
89
7
0
05 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAMLMLAU
55
3
0
30 Apr 2022
Adversarial Fine-tune with Dynamically Regulated Adversary
Adversarial Fine-tune with Dynamically Regulated Adversary
Peng-Fei Hou
Ming Zhou
Jie Han
Petr Musílek
Xingyu Li
AAML
56
3
0
28 Apr 2022
Improving the Transferability of Adversarial Examples with Restructure
  Embedded Patches
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Huipeng Zhou
Yu-an Tan
Yajie Wang
Haoran Lyu
Shan-Hung Wu
Yuan-zhang Li
ViT
60
4
0
27 Apr 2022
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Xianglong He
Yuezun Li
Haipeng Qu
Junyu Dong
AAML
31
1
0
22 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile
  Edge
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
44
2
0
18 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
79
5
0
06 Apr 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
85
43
0
30 Mar 2022
Zero-Query Transfer Attacks on Context-Aware Object Detectors
Zero-Query Transfer Attacks on Context-Aware Object Detectors
Zikui Cai
S. Rane
Alejandro E. Brito
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
65
22
0
29 Mar 2022
Adversarial Representation Sharing: A Quantitative and Secure
  Collaborative Learning Framework
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework
Jikun Chen
Feng Qiang
Na Ruan
FedML
41
2
0
27 Mar 2022
Reverse Engineering of Imperceptible Adversarial Image Perturbations
Reverse Engineering of Imperceptible Adversarial Image Perturbations
Yifan Gong
Yuguang Yao
Yize Li
Yimeng Zhang
Xiaoming Liu
Xinyu Lin
Sijia Liu
AAML
172
21
0
26 Mar 2022
Previous
123...567...171819
Next