ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information

Black-box Adversarial Attacks with Limited Queries and Information

23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 651 papers shown
Title
GraphDefense: Towards Robust Graph Convolutional Networks
GraphDefense: Towards Robust Graph Convolutional Networks
Xiaoyun Wang
Xuanqing Liu
Cho-Jui Hsieh
OOD
AAML
GNN
25
31
0
11 Nov 2019
Active Learning for Black-Box Adversarial Attacks in EEG-Based
  Brain-Computer Interfaces
Active Learning for Black-Box Adversarial Attacks in EEG-Based Brain-Computer Interfaces
Xue Jiang
Xiao Zhang
Dongrui Wu
AAML
21
16
0
07 Nov 2019
The Threat of Adversarial Attacks on Machine Learning in Network
  Security -- A Survey
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Olakunle Ibitoye
Rana Abou-Khamis
Mohamed el Shehaby
Ashraf Matrawy
M. O. Shafiq
AAML
37
68
0
06 Nov 2019
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
19
194
0
03 Nov 2019
ATZSL: Defensive Zero-Shot Recognition in the Presence of Adversaries
ATZSL: Defensive Zero-Shot Recognition in the Presence of Adversaries
Xingxing Zhang
Shupeng Gui
Zhenfeng Zhu
Yao Zhao
Ji Liu
VLM
22
5
0
24 Oct 2019
A New Defense Against Adversarial Images: Turning a Weakness into a
  Strength
A New Defense Against Adversarial Images: Turning a Weakness into a Strength
Tao Yu
Shengyuan Hu
Chuan Guo
Wei-Lun Chao
Kilian Q. Weinberger
AAML
58
101
0
16 Oct 2019
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box
  Optimization
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization
Xiangyi Chen
Sijia Liu
Kaidi Xu
Xingguo Li
Xue Lin
Mingyi Hong
David Cox
ODL
6
105
0
15 Oct 2019
DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural
  Networks
DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks
Fuyuan Zhang
Sankalan Pal Chowdhury
M. Christakis
AAML
20
8
0
14 Oct 2019
Confidence-Calibrated Adversarial Training: Generalizing to Unseen
  Attacks
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks
David Stutz
Matthias Hein
Bernt Schiele
AAML
25
5
0
14 Oct 2019
Man-in-the-Middle Attacks against Machine Learning Classifiers via
  Malicious Generative Models
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
Derui Wang
Wang
Chaoran Li
S. Wen
Surya Nepal
Yang Xiang
AAML
13
32
0
14 Oct 2019
Yet another but more efficient black-box adversarial attack: tiling and
  evolution strategies
Yet another but more efficient black-box adversarial attack: tiling and evolution strategies
Laurent Meunier
Cen Chen
Li Wang
MLAU
AAML
22
40
0
05 Oct 2019
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Yang Zhang
Shiyu Chang
Mo Yu
Kaizhi Qian
AAML
15
2
0
01 Oct 2019
Black-box Adversarial Attacks with Bayesian Optimization
Black-box Adversarial Attacks with Bayesian Optimization
Satya Narayan Shukla
Anit Kumar Sahu
Devin Willmott
J. Zico Kolter
AAML
MLAU
14
30
0
30 Sep 2019
Min-Max Optimization without Gradients: Convergence and Applications to
  Adversarial ML
Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML
Sijia Liu
Songtao Lu
Xiangyi Chen
Yao Feng
Kaidi Xu
Abdullah Al-Dujaili
Mingyi Hong
Una-May Obelilly
33
26
0
30 Sep 2019
Techniques for Adversarial Examples Threatening the Safety of Artificial
  Intelligence Based Systems
Techniques for Adversarial Examples Threatening the Safety of Artificial Intelligence Based Systems
Utku Kose
SILM
AAML
14
2
0
29 Sep 2019
HumanGAN: generative adversarial network with human-based discriminator
  and its evaluation in speech perception modeling
HumanGAN: generative adversarial network with human-based discriminator and its evaluation in speech perception modeling
Kazuki Fujii
Yuki Saito
Shinnosuke Takamichi
Yukino Baba
Hiroshi Saruwatari
18
7
0
25 Sep 2019
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
134
219
0
24 Sep 2019
Absum: Simple Regularization Method for Reducing Structural Sensitivity
  of Convolutional Neural Networks
Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks
Sekitoshi Kanai
Yasutoshi Ida
Yasuhiro Fujiwara
Masanori Yamada
S. Adachi
AAML
23
1
0
19 Sep 2019
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Han Xu
Yao Ma
Haochen Liu
Debayan Deb
Hui Liu
Jiliang Tang
Anil K. Jain
AAML
33
669
0
17 Sep 2019
White-Box Adversarial Defense via Self-Supervised Data Estimation
White-Box Adversarial Defense via Self-Supervised Data Estimation
Zudi Lin
Hanspeter Pfister
Ziming Zhang
AAML
16
2
0
13 Sep 2019
Sparse and Imperceivable Adversarial Attacks
Sparse and Imperceivable Adversarial Attacks
Francesco Croce
Matthias Hein
AAML
39
199
0
11 Sep 2019
Universal Physical Camouflage Attacks on Object Detectors
Universal Physical Camouflage Attacks on Object Detectors
Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
C. Zou
Ning Liu
AAML
143
162
0
10 Sep 2019
Learning to Disentangle Robust and Vulnerable Features for Adversarial
  Detection
Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection
Byunggill Joe
Sung Ju Hwang
I. Shin
AAML
11
1
0
10 Sep 2019
BOSH: An Efficient Meta Algorithm for Decision-based Attacks
BOSH: An Efficient Meta Algorithm for Decision-based Attacks
Zhenxin Xiao
Puyudi Yang
Yuchen Eleanor Jiang
Kai-Wei Chang
Cho-Jui Hsieh
AAML
18
1
0
10 Sep 2019
Blackbox Attacks on Reinforcement Learning Agents Using Approximated
  Temporal Information
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Yiren Zhao
Ilia Shumailov
Han Cui
Xitong Gao
Robert D. Mullins
Ross J. Anderson
AAML
9
28
0
06 Sep 2019
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with
  Limited Queries
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
AAML
22
84
0
19 Aug 2019
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
  Recognition Systems
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
Lea Schonherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
54
63
0
05 Aug 2019
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor
  Contamination Detection
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection
Di Tang
Xiaofeng Wang
Haixu Tang
Kehuan Zhang
AAML
19
197
0
02 Aug 2019
On the Design of Black-box Adversarial Examples by Leveraging
  Gradient-free Optimization and Operator Splitting Method
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Pu Zhao
Sijia Liu
Pin-Yu Chen
Nghia Hoang
Kaidi Xu
B. Kailkhura
Xue Lin
AAML
27
54
0
26 Jul 2019
Stateful Detection of Black-Box Adversarial Attacks
Stateful Detection of Black-Box Adversarial Attacks
Steven Chen
Nicholas Carlini
D. Wagner
AAML
MLAU
17
119
0
12 Jul 2019
Metamorphic Detection of Adversarial Examples in Deep Learning Models
  With Affine Transformations
Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine Transformations
R. Mekala
Gudjon Magnusson
Adam A. Porter
Mikael Lindvall
Madeline Diep
AAML
6
16
0
10 Jul 2019
Diminishing the Effect of Adversarial Perturbations via Refining Feature
  Representation
Diminishing the Effect of Adversarial Perturbations via Refining Feature Representation
Nader Asadi
Amirm. Sarfi
Mehrdad Hosseinzadeh
Sahba Tahsini
M. Eftekhari
AAML
18
2
0
01 Jul 2019
Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with
  Adversarial Perturbations
Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations
Yuezun Li
Xin Yang
Baoyuan Wu
Siwei Lyu
AAML
PICV
CVBM
26
38
0
21 Jun 2019
Convergence of Adversarial Training in Overparametrized Neural Networks
Convergence of Adversarial Training in Overparametrized Neural Networks
Ruiqi Gao
Tianle Cai
Haochuan Li
Liwei Wang
Cho-Jui Hsieh
Jason D. Lee
AAML
18
107
0
19 Jun 2019
The Attack Generator: A Systematic Approach Towards Constructing
  Adversarial Attacks
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
F. Assion
Peter Schlicht
Florens Greßner
W. Günther
Fabian Hüger
Nico M. Schmidt
Umair Rasheed
AAML
17
14
0
17 Jun 2019
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Improving Black-box Adversarial Attacks with a Transfer-based Prior
Shuyu Cheng
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
AAML
34
271
0
17 Jun 2019
Copy and Paste: A Simple But Effective Initialization Method for
  Black-Box Adversarial Attacks
Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks
T. Brunner
Frederik Diehl
Alois Knoll
AAML
6
8
0
14 Jun 2019
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking
Jiabao Guo
M. Potkonjak
AAML
WIGM
24
15
0
11 Jun 2019
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient
  Black-box Attacks
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Ziang Yan
Yiwen Guo
Changshui Zhang
AAML
30
110
0
11 Jun 2019
Robustness Verification of Tree-based Models
Robustness Verification of Tree-based Models
Hongge Chen
Huan Zhang
Si Si
Yang Li
Duane S. Boning
Cho-Jui Hsieh
AAML
17
76
0
10 Jun 2019
Attacking Graph Convolutional Networks via Rewiring
Attacking Graph Convolutional Networks via Rewiring
Yao Ma
Suhang Wang
Tyler Derr
Lingfei Wu
Jiliang Tang
AAML
GNN
27
84
0
10 Jun 2019
Provably Robust Boosted Decision Stumps and Trees against Adversarial
  Attacks
Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks
Maksym Andriushchenko
Matthias Hein
28
61
0
08 Jun 2019
ML-LOO: Detecting Adversarial Examples with Feature Attribution
ML-LOO: Detecting Adversarial Examples with Feature Attribution
Puyudi Yang
Jianbo Chen
Cho-Jui Hsieh
Jane-ling Wang
Michael I. Jordan
AAML
22
101
0
08 Jun 2019
Making targeted black-box evasion attacks effective and efficient
Making targeted black-box evasion attacks effective and efficient
Mika Juuti
B. Atli
Nadarajah Asokan
AAML
MIACV
MLAU
17
8
0
08 Jun 2019
Robust Attacks against Multiple Classifiers
Robust Attacks against Multiple Classifiers
Juan C. Perdomo
Yaron Singer
AAML
18
10
0
06 Jun 2019
Query-efficient Meta Attack to Deep Neural Networks
Query-efficient Meta Attack to Deep Neural Networks
Jiawei Du
Hu Zhang
Qiufeng Wang
Yi Yang
Jiashi Feng
AAML
19
84
0
06 Jun 2019
Enhancing Transformation-based Defenses using a Distribution Classifier
Enhancing Transformation-based Defenses using a Distribution Classifier
C. Kou
H. Lee
E. Chang
Teck Khim Ng
37
3
0
01 Jun 2019
High Frequency Component Helps Explain the Generalization of
  Convolutional Neural Networks
High Frequency Component Helps Explain the Generalization of Convolutional Neural Networks
Haohan Wang
Xindi Wu
Pengcheng Yin
Eric Xing
13
512
0
28 May 2019
Thwarting finite difference adversarial attacks with output
  randomization
Thwarting finite difference adversarial attacks with output randomization
Haidar Khan
Daniel Park
Azer Khan
B. Yener
SILM
AAML
35
0
0
23 May 2019
Taking Care of The Discretization Problem: A Comprehensive Study of the
  Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer
  Domain
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain
Lei Bu
Yuchao Duan
Fu Song
Zhe Zhao
AAML
32
18
0
19 May 2019
Previous
123...11121314
Next