ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.02770
  4. Cited By
Delving into Transferable Adversarial Examples and Black-box Attacks
v1v2v3 (latest)

Delving into Transferable Adversarial Examples and Black-box Attacks

8 November 2016
Yanpei Liu
Xinyun Chen
Chang-rui Liu
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Delving into Transferable Adversarial Examples and Black-box Attacks"

50 / 928 papers shown
Title
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models
  against Adversarial Attacks
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Jun-Ho Choi
Huan Zhang
Jun-Hyuk Kim
Cho-Jui Hsieh
Jong-Seok Lee
VLM
62
8
0
30 Apr 2021
Staircase Sign Method for Boosting Adversarial Attacks
Staircase Sign Method for Boosting Adversarial Attacks
Qilong Zhang
Xiaosu Zhu
Jingkuan Song
Lianli Gao
Heng Tao Shen
AAML
88
13
0
20 Apr 2021
Removing Adversarial Noise in Class Activation Feature Space
Removing Adversarial Noise in Class Activation Feature Space
Dawei Zhou
N. Wang
Chunlei Peng
Xinbo Gao
Xiaoyu Wang
Jun Yu
Tongliang Liu
AAML
61
29
0
19 Apr 2021
Direction-Aggregated Attack for Transferable Adversarial Examples
Direction-Aggregated Attack for Transferable Adversarial Examples
Tianjin Huang
Vlado Menkovski
Yulong Pei
Yuhao Wang
Mykola Pechenizkiy
AAML
78
15
0
19 Apr 2021
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure
  DNN Accelerators
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
AAMLMQ
68
18
0
16 Apr 2021
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Xingxing Wei
Yingjie Guo
Jie Yu
AAML
85
124
0
14 Apr 2021
Mitigating Adversarial Attack for Compute-in-Memory Accelerator
  Utilizing On-chip Finetune
Mitigating Adversarial Attack for Compute-in-Memory Accelerator Utilizing On-chip Finetune
Shanshi Huang
Hongwu Jiang
Shimeng Yu
AAML
54
3
0
13 Apr 2021
FACESEC: A Fine-grained Robustness Evaluation Framework for Face
  Recognition Systems
FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems
Liang Tong
Zhengzhang Chen
Jingchao Ni
Wei Cheng
Dongjin Song
Haifeng Chen
Yevgeniy Vorobeychik
CVBMAAML
75
19
0
08 Apr 2021
Universal Spectral Adversarial Attacks for Deformable Shapes
Universal Spectral Adversarial Attacks for Deformable Shapes
Arianna Rampini
Franco Pestarini
Luca Cosmo
Simone Melzi
Emanuele Rodolà
AAML
120
18
0
07 Apr 2021
TRS: Transferability Reduced Ensemble via Encouraging Gradient Diversity
  and Model Smoothness
TRS: Transferability Reduced Ensemble via Encouraging Gradient Diversity and Model Smoothness
Zhuolin Yang
Linyi Li
Xiaojun Xu
Shiliang Zuo
Qiang Chen
Benjamin I. P. Rubinstein
Pan Zhou
Ce Zhang
Yue Liu
AAML
129
56
0
01 Apr 2021
On the Robustness of Vision Transformers to Adversarial Examples
On the Robustness of Vision Transformers to Adversarial Examples
Kaleel Mahmood
Rigel Mahmood
Marten van Dijk
ViT
140
225
0
31 Mar 2021
IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for
  Visual Object Tracking
IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking
Shuai Jia
Yibing Song
Chao Ma
Xiaokang Yang
AAML
106
49
0
27 Mar 2021
On Generating Transferable Targeted Perturbations
On Generating Transferable Targeted Perturbations
Muzammal Naseer
Salman Khan
Munawar Hayat
Fahad Shahbaz Khan
Fatih Porikli
AAML
109
75
0
26 Mar 2021
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison
  Linear Classifiers?
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Antonio Emanuele Cinà
Sebastiano Vascon
Ambra Demontis
Battista Biggio
Fabio Roli
Marcello Pelillo
AAML
66
10
0
23 Mar 2021
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection
R. Vardhan
Ninghao Liu
Phakpoom Chinprutthiwong
Weijie Fu
Zhen Hu
Helen Zhou
G. Gu
AAML
117
4
0
22 Mar 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial
  Attack
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Ajmal Mian
AAML
97
2
0
19 Mar 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
78
17
0
19 Mar 2021
Boosting Adversarial Transferability through Enhanced Momentum
Boosting Adversarial Transferability through Enhanced Momentum
Xiaosen Wang
Jiadong Lin
Han Hu
Jingdong Wang
Kun He
AAML
117
77
0
19 Mar 2021
Model Extraction and Adversarial Transferability, Your BERT is
  Vulnerable!
Model Extraction and Adversarial Transferability, Your BERT is Vulnerable!
Xuanli He
Lingjuan Lyu
Xingliang Yuan
Lichao Sun
MIACVSILM
95
96
0
18 Mar 2021
Understanding Generalization in Adversarial Training via the
  Bias-Variance Decomposition
Understanding Generalization in Adversarial Training via the Bias-Variance Decomposition
Yaodong Yu
Zitong Yang
Yan Sun
Jacob Steinhardt
Yi-An Ma
64
17
0
17 Mar 2021
Can Targeted Adversarial Examples Transfer When the Source and Target
  Models Have No Label Space Overlap?
Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Nathan Inkawhich
Kevin J. Liang
Jingyang Zhang
Huanrui Yang
H. Li
Yiran Chen
AAML
42
5
0
17 Mar 2021
A Unified Game-Theoretic Interpretation of Adversarial Robustness
A Unified Game-Theoretic Interpretation of Adversarial Robustness
Jie Ren
Die Zhang
Yisen Wang
Lu Chen
Zhanpeng Zhou
...
Xu Cheng
Xin Eric Wang
Meng Zhou
Jie Shi
Quanshi Zhang
AAML
136
23
0
12 Mar 2021
Improving Adversarial Robustness via Channel-wise Activation Suppressing
Improving Adversarial Robustness via Channel-wise Activation Suppressing
Yang Bai
Yuyuan Zeng
Yong Jiang
Shutao Xia
Xingjun Ma
Yisen Wang
AAML
86
131
0
11 Mar 2021
Nonlinear Projection Based Gradient Estimation for Query Efficient
  Blackbox Attacks
Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Huichen Li
Linyi Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Yue Liu
AAML
80
17
0
25 Feb 2021
Consistent Non-Parametric Methods for Maximizing Robustness
Consistent Non-Parametric Methods for Maximizing Robustness
Robi Bhattacharjee
Kamalika Chaudhuri
AAML
109
8
0
18 Feb 2021
CAP-GAN: Towards Adversarial Robustness with Cycle-consistent
  Attentional Purification
CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification
Mingu Kang
T. Tran
Seungju Cho
Daeyoung Kim
AAML
49
3
0
15 Feb 2021
Resilient Machine Learning for Networked Cyber Physical Systems: A
  Survey for Machine Learning Security to Securing Machine Learning for CPS
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Felix O. Olowononi
D. Rawat
Chunmei Liu
95
138
0
14 Feb 2021
Adversarial Robustness: What fools you makes you stronger
Adversarial Robustness: What fools you makes you stronger
Grzegorz Gluch
R. Urbanke
AAML
104
2
0
10 Feb 2021
Adversarial Perturbations Are Not So Weird: Entanglement of Robust and
  Non-Robust Features in Neural Network Classifiers
Adversarial Perturbations Are Not So Weird: Entanglement of Robust and Non-Robust Features in Neural Network Classifiers
Jacob Mitchell Springer
Melanie Mitchell
Garrett Kenyon
AAML
56
13
0
09 Feb 2021
"What's in the box?!": Deflecting Adversarial Attacks by Randomly
  Deploying Adversarially-Disjoint Models
"What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models
Sahar Abdelnabi
Mario Fritz
AAML
44
7
0
09 Feb 2021
Adversarial Imaging Pipelines
Adversarial Imaging Pipelines
Buu Phan
Fahim Mannan
Felix Heide
AAML
53
26
0
07 Feb 2021
Adversarial example generation with AdaBelief Optimizer and Crop
  Invariance
Adversarial example generation with AdaBelief Optimizer and Crop Invariance
Bo Yang
Hengwei Zhang
Yuchen Zhang
Kaiyong Xu
Jin-dong Wang
AAML
71
29
0
07 Feb 2021
PredCoin: Defense against Query-based Hard-label Attack
PredCoin: Defense against Query-based Hard-label Attack
Junfeng Guo
Yaswanth Yadlapalli
Lothar Thiele
Ang Li
Cong Liu
AAML
49
0
0
04 Feb 2021
Admix: Enhancing the Transferability of Adversarial Attacks
Admix: Enhancing the Transferability of Adversarial Attacks
Xiaosen Wang
Xu He
Jingdong Wang
Kun He
AAML
151
201
0
31 Jan 2021
Adversarial Learning with Cost-Sensitive Classes
Adversarial Learning with Cost-Sensitive Classes
Hao Shen
Sihong Chen
Ran Wang
Xizhao Wang
AAML
70
11
0
29 Jan 2021
The Effect of Class Definitions on the Transferability of Adversarial
  Attacks Against Forensic CNNs
The Effect of Class Definitions on the Transferability of Adversarial Attacks Against Forensic CNNs
Xinwei Zhao
Matthew C. Stamm
AAML
49
4
0
26 Jan 2021
Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers
Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers
Xinwei Zhao
Matthew C. Stamm
AAML
47
3
0
26 Jan 2021
Spectral Leakage and Rethinking the Kernel Size in CNNs
Spectral Leakage and Rethinking the Kernel Size in CNNs
Nergis Tomen
Jan van Gemert
AAML
61
19
0
25 Jan 2021
A Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative
  Adversarial Network
A Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative Adversarial Network
Xinwei Zhao
Chen Chen
Matthew C. Stamm
GANAAML
41
4
0
23 Jan 2021
Adversarial Interaction Attack: Fooling AI to Misinterpret Human
  Intentions
Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions
Nodens Koren
Qiuhong Ke
Yisen Wang
James Bailey
Xingjun Ma
AAML
41
1
0
17 Jan 2021
Black-box Adversarial Attacks in Autonomous Vehicle Technology
Black-box Adversarial Attacks in Autonomous Vehicle Technology
K. N. Kumar
Vishnu Chalavadi
Reshmi Mitra
C.Krishna Mohan
AAML
51
70
0
15 Jan 2021
Random Transformation of Image Brightness for Adversarial Attack
Random Transformation of Image Brightness for Adversarial Attack
Bo Yang
Kaiyong Xu
Hengjun Wang
Hengwei Zhang
AAML
49
8
0
12 Jan 2021
Exploring Adversarial Fake Images on Face Manifold
Exploring Adversarial Fake Images on Face Manifold
Dongze Li
Wei Wang
Hongxing Fan
Jing Dong
AAML
88
44
0
09 Jan 2021
Local Black-box Adversarial Attacks: A Query Efficient Approach
Local Black-box Adversarial Attacks: A Query Efficient Approach
Tao Xiang
Hangcheng Liu
Shangwei Guo
Tianwei Zhang
X. Liao
AAMLMLAU
46
15
0
04 Jan 2021
Patch-wise++ Perturbation for Adversarial Targeted Attacks
Patch-wise++ Perturbation for Adversarial Targeted Attacks
Lianli Gao
Qilong Zhang
Jingkuan Song
Heng Tao Shen
AAML
111
19
0
31 Dec 2020
Black-box Adversarial Attacks on Monocular Depth Estimation Using
  Evolutionary Multi-objective Optimization
Black-box Adversarial Attacks on Monocular Depth Estimation Using Evolutionary Multi-objective Optimization
Renya Daimo
S. Ono
Takahiro Suzuki
AAMLMDE
18
4
0
29 Dec 2020
With False Friends Like These, Who Can Notice Mistakes?
With False Friends Like These, Who Can Notice Mistakes?
Lue Tao
Lei Feng
Jinfeng Yi
Songcan Chen
AAML
70
6
0
29 Dec 2020
On Success and Simplicity: A Second Look at Transferable Targeted
  Attacks
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
167
126
0
21 Dec 2020
Sample Complexity of Adversarially Robust Linear Classification on
  Separated Data
Sample Complexity of Adversarially Robust Linear Classification on Separated Data
Robi Bhattacharjee
S. Jha
Kamalika Chaudhuri
75
6
0
19 Dec 2020
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
  and Defenses
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Micah Goldblum
Dimitris Tsipras
Chulin Xie
Xinyun Chen
Avi Schwarzschild
Basel Alomair
Aleksander Madry
Yue Liu
Tom Goldstein
SILM
129
282
0
18 Dec 2020
Previous
123...8910...171819
Next