ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1804.08598
  4. Cited By
Black-box Adversarial Attacks with Limited Queries and Information

Black-box Adversarial Attacks with Limited Queries and Information

23 April 2018
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Black-box Adversarial Attacks with Limited Queries and Information"

50 / 651 papers shown
Title
A Review of Adversarial Attacks in Computer Vision
A Review of Adversarial Attacks in Computer Vision
Yutong Zhang
Yao Li
Yin Li
Zhichang Guo
AAML
26
3
0
15 Aug 2023
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D
  Point Cloud Attack
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
Yunbo Tao
Daizong Liu
Pan Zhou
Yulai Xie
Wei Du
Wei Hu
3DPC
AAML
26
11
0
15 Aug 2023
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network
  Intrusion Detection
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection
João Vitorino
Isabel Praça
Eva Maia
AAML
30
22
0
13 Aug 2023
On the Interplay of Convolutional Padding and Adversarial Robustness
On the Interplay of Convolutional Padding and Adversarial Robustness
Paul Gavrikov
J. Keuper
AAML
38
3
0
12 Aug 2023
Symmetry Defense Against XGBoost Adversarial Perturbation Attacks
Symmetry Defense Against XGBoost Adversarial Perturbation Attacks
Blerta Lindqvist
AAML
43
0
0
10 Aug 2023
Enhancing Adversarial Robustness in Low-Label Regime via Adaptively
  Weighted Regularization and Knowledge Distillation
Enhancing Adversarial Robustness in Low-Label Regime via Adaptively Weighted Regularization and Knowledge Distillation
Dongyoon Yang
Insung Kong
Yongdai Kim
44
4
0
08 Aug 2023
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity
  Deep Hiding
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding
Hangcheng Liu
Tao Xiang
Shangwei Guo
Han Li
Tianwei Zhang
Xiaofeng Liao
24
5
0
03 Aug 2023
Mirror Natural Evolution Strategies
Mirror Natural Evolution Strategies
Haishan Ye
27
2
0
01 Aug 2023
Theoretically Principled Trade-off for Stateful Defenses against
  Query-Based Black-Box Attacks
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Ashish Hooda
Neal Mangaokar
Ryan Feng
Kassem Fawaz
S. Jha
Atul Prakash
AAML
24
3
0
30 Jul 2023
Towards Building More Robust Models with Frequency Bias
Towards Building More Robust Models with Frequency Bias
Qingwen Bu
Dong Huang
Heming Cui
AAML
17
10
0
19 Jul 2023
On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Akshay Mehra
Yunbei Zhang
B. Kailkhura
Jihun Hamm
36
2
0
17 Jul 2023
Vulnerability-Aware Instance Reweighting For Adversarial Training
Vulnerability-Aware Instance Reweighting For Adversarial Training
Olukorede Fakorede
Ashutosh Nirala
Modeste Atsague
Jin Tian
AAML
25
2
0
14 Jul 2023
Query-Efficient Decision-based Black-Box Patch Attack
Query-Efficient Decision-based Black-Box Patch Attack
Zhaoyu Chen
Bo-wen Li
Shuang Wu
Shouhong Ding
Wenqiang Zhang
AAML
27
33
0
02 Jul 2023
Neural Polarizer: A Lightweight and Effective Backdoor Defense via
  Purifying Poisoned Features
Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
H. Zha
Baoyuan Wu
AAML
35
37
0
29 Jun 2023
Document Image Cleaning using Budget-Aware Black-Box Approximation
Document Image Cleaning using Budget-Aware Black-Box Approximation
Ganesh Tata
Katyani Singh
E. V. Oeveren
Nilanjan Ray
AAML
23
0
0
22 Jun 2023
Visual Adversarial Examples Jailbreak Aligned Large Language Models
Visual Adversarial Examples Jailbreak Aligned Large Language Models
Xiangyu Qi
Kaixuan Huang
Ashwinee Panda
Peter Henderson
Mengdi Wang
Prateek Mittal
AAML
30
138
0
22 Jun 2023
Rethinking the Backward Propagation for Adversarial Transferability
Rethinking the Backward Propagation for Adversarial Transferability
Xiaosen Wang
Kangheng Tong
Kun He
AAML
SILM
32
25
0
22 Jun 2023
HumanDiffusion: diffusion model using perceptual gradients
HumanDiffusion: diffusion model using perceptual gradients
Yota Ueda
Shinnosuke Takamichi
Yuki Saito
Norihiro Takamune
Hiroshi Saruwatari
DiffM
26
0
0
21 Jun 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
28
11
0
21 Jun 2023
Wasserstein distributional robustness of neural networks
Wasserstein distributional robustness of neural networks
Xingjian Bai
Guangyi He
Yifan Jiang
J. Obłój
OOD
AAML
36
6
0
16 Jun 2023
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models
Raz Lapid
Moshe Sipper
AAML
27
17
0
13 Jun 2023
Faithful Knowledge Distillation
Faithful Knowledge Distillation
Tom A. Lamb
Rudy Bunel
Krishnamurthy Dvijotham
M. P. Kumar
Philip Torr
Francisco Eiras
AAML
17
0
0
07 Jun 2023
On Evaluating Adversarial Robustness of Large Vision-Language Models
On Evaluating Adversarial Robustness of Large Vision-Language Models
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Chongxuan Li
Ngai-man Cheung
Min Lin
VLM
AAML
MLLM
33
166
0
26 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
52
51
0
18 May 2023
Improving Adversarial Transferability via Intermediate-level
  Perturbation Decay
Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
27
19
0
26 Apr 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing Guo
Yihao Huang
Xiaofei Xie
Lei Ma
Jianjun Zhao
AAML
34
48
0
23 Apr 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
52
18
0
20 Apr 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
45
4
0
13 Apr 2023
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via
  User-configurable Privacy Defense
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense
Yue-li Cui
Syed Imran Ali Meerza
Zhuohang Li
Luyang Liu
Jiaxin Zhang
Jian-Dong Liu
AAML
FedML
34
4
0
11 Apr 2023
Certifiable Black-Box Attacks with Randomized Adversarial Examples:
  Breaking Defenses with Provable Confidence
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
Hanbin Hong
Xinyu Zhang
Binghui Wang
Zhongjie Ba
Yuan Hong
AAML
30
2
0
10 Apr 2023
A Certified Radius-Guided Attack Framework to Image Segmentation Models
A Certified Radius-Guided Attack Framework to Image Segmentation Models
Wenjie Qu
Youqi Li
Binghui Wang
AAML
29
5
0
05 Apr 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
Ulugbek S. Kamilov
AAML
35
14
0
25 Mar 2023
An Extended Study of Human-like Behavior under Adversarial Training
An Extended Study of Human-like Behavior under Adversarial Training
Paul Gavrikov
J. Keuper
M. Keuper
AAML
31
9
0
22 Mar 2023
Reliable and Efficient Evaluation of Adversarial Robustness for Deep
  Hashing-Based Retrieval
Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Xunguang Wang
Jiawang Bai
Xin-Chao Xu
Xuelong Li
AAML
17
1
0
22 Mar 2023
Efficient Decision-based Black-box Patch Attacks on Video Recognition
Efficient Decision-based Black-box Patch Attacks on Video Recognition
Kaixun Jiang
Zhaoyu Chen
Tony Huang
Jiafeng Wang
Dingkang Yang
Bo-wen Li
Yan Wang
Wenqiang Zhang
AAML
22
21
0
21 Mar 2023
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Yuguang Yao
Jiancheng Liu
Yifan Gong
Xiaoming Liu
Yanzhi Wang
X. Lin
Sijia Liu
AAML
MLAU
37
1
0
13 Mar 2023
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against
  Black-box Attacks
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks
Ryan Feng
Ashish Hooda
Neal Mangaokar
Kassem Fawaz
S. Jha
Atul Prakash
AAML
65
11
0
11 Mar 2023
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional
  Gradient Estimation
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional Gradient Estimation
Geunhyeok Yu
Minwoo Jeon
Hyoseok Hwang
AAML
24
1
0
09 Mar 2023
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial
  Attacks on Object Detectors
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial Attacks on Object Detectors
Raz Lapid
Eylon Mizrahi
Moshe Sipper
AAML
26
1
0
07 Mar 2023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency
  Trigger
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Yi Yu
Yufei Wang
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
69
41
0
28 Feb 2023
Adversarial Attack with Raindrops
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
13
18
0
28 Feb 2023
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign
  Recognition: A Feasibility Study
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign Recognition: A Feasibility Study
Fabian Woitschek
G. Schneider
AAML
38
9
0
27 Feb 2023
Automatic Prompt Augmentation and Selection with Chain-of-Thought from
  Labeled Data
Automatic Prompt Augmentation and Selection with Chain-of-Thought from Labeled Data
Kashun Shum
Shizhe Diao
Tong Zhang
ReLM
LRM
28
129
0
24 Feb 2023
MalProtect: Stateful Defense Against Adversarial Query Attacks in
  ML-based Malware Detection
MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
43
8
0
21 Feb 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
32
1
0
21 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
46
21
0
19 Feb 2023
An End-to-End Framework for Marketing Effectiveness Optimization under
  Budget Constraint
An End-to-End Framework for Marketing Effectiveness Optimization under Budget Constraint
Ziang Yan
Shusen Wang
Guorui Zhou
Jingjian Lin
Peng Jiang
OffRL
26
8
0
09 Feb 2023
Shortcut Detection with Variational Autoencoders
Shortcut Detection with Variational Autoencoders
Nicolas Müller
Simon Roschmann
Shahbaz Khan
Philip Sperl
Konstantin Böttinger
AAML
DRL
37
1
0
08 Feb 2023
Black Box Adversarial Prompting for Foundation Models
Black Box Adversarial Prompting for Foundation Models
Natalie Maus
Patrick Chao
Eric Wong
Jacob R. Gardner
VLM
33
56
0
08 Feb 2023
CosPGD: an efficient white-box adversarial attack for pixel-wise
  prediction tasks
CosPGD: an efficient white-box adversarial attack for pixel-wise prediction tasks
Shashank Agnihotri
Steffen Jung
M. Keuper
AAML
37
21
0
04 Feb 2023
Previous
12345...121314
Next