Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1805.11770
Cited By
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
30 May 2018
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
MLAU
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks"
50 / 76 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
GSBA
K
^K
K
:
t
o
p
top
t
o
p
-
K
K
K
Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
47
0
0
17 Mar 2025
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning
Xin Wang
Kai-xiang Chen
Xingjun Ma
Zhineng Chen
Jingjing Chen
Yu-Gang Jiang
AAML
43
4
0
04 Aug 2024
L
p
L_p
L
p
-norm Distortion-Efficient Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Zi-Jia Wang
Xiangui Kang
37
0
0
03 Jul 2024
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Zhun Zhang
Yi Zeng
Qihe Liu
Shijie Zhou
AAML
39
0
0
16 Apr 2024
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
38
5
0
08 Apr 2024
Trust Regions for Explanations via Black-Box Probabilistic Certification
Amit Dhurandhar
Swagatam Haldar
Dennis L. Wei
K. Ramamurthy
FAtt
40
2
0
17 Feb 2024
Black-Box Tuning of Vision-Language Models with Effective Gradient Approximation
Zixian Guo
Yuxiang Wei
Ming-Yu Liu
Zhilong Ji
Jinfeng Bai
Yiwen Guo
Wangmeng Zuo
VLM
36
8
0
26 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
18
0
0
12 Dec 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
Mirror Natural Evolution Strategies
Haishan Ye
19
2
0
01 Aug 2023
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
23
11
0
21 Jun 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
37
4
0
13 Apr 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
M. Salman Asif
AAML
33
14
0
25 Mar 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
29
27
0
01 Jan 2023
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack
Yunfeng Diao
He Wang
Tianjia Shao
Yong-Liang Yang
Kun Zhou
David C. Hogg
Meng Wang
AAML
40
7
0
21 Nov 2022
An Empirical Evaluation of Zeroth-Order Optimization Methods on AI-driven Molecule Optimization
Elvin Lo
Pin-Yu Chen
37
0
0
27 Oct 2022
Object-Attentional Untargeted Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Guopu Zhu
AAML
21
2
0
16 Oct 2022
Robust Models are less Over-Confident
Julia Grabinski
Paul Gavrikov
J. Keuper
M. Keuper
AAML
36
24
0
12 Oct 2022
Zeroth-Order Negative Curvature Finding: Escaping Saddle Points without Gradients
Hualin Zhang
Huan Xiong
Bin Gu
35
7
0
04 Oct 2022
Constraining Representations Yields Models That Know What They Don't Know
João Monteiro
Pau Rodríguez López
Pierre-Andre Noel
I. Laradji
David Vazquez
AAML
44
0
0
30 Aug 2022
Lazy Queries Can Reduce Variance in Zeroth-order Optimization
Quan-Wu Xiao
Qing Ling
Tianyi Chen
41
0
0
14 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
19
2
0
08 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
29
11
0
04 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
35
50
0
26 May 2022
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Yimeng Zhang
Yuguang Yao
Jinghan Jia
Jinfeng Yi
Min-Fong Hong
Shiyu Chang
Sijia Liu
AAML
26
33
0
27 Mar 2022
Enhancing Transferability of Adversarial Examples with Spatial Momentum
Guoqiu Wang
Huanqian Yan
Xingxing Wei
AAML
22
9
0
25 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
Shape-invariant 3D Adversarial Point Clouds
Qidong Huang
Xiaoyi Dong
Dongdong Chen
Hang Zhou
Weiming Zhang
Nenghai Yu
3DPC
21
67
0
08 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
24
2
0
07 Mar 2022
Adversarially Robust Models may not Transfer Better: Sufficient Conditions for Domain Transferability from the View of Regularization
Xiaojun Xu
Jacky Y. Zhang
Evelyn Ma
Danny Son
Oluwasanmi Koyejo
Bo-wen Li
20
10
0
03 Feb 2022
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
21
6
0
31 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
22
70
0
22 Jan 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Xiaosen Wang
Zeliang Zhang
Kangheng Tong
Dihong Gong
Kun He
Zhifeng Li
Wei Liu
AAML
24
56
0
13 Dec 2021
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
47
78
0
06 Oct 2021
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Manjushree B. Aithal
Xiaohua Li
AAML
60
6
0
30 Sep 2021
Improving Transferability of Adversarial Patches on Face Recognition with Generative Models
Zihao Xiao
Xianfeng Gao
Chilin Fu
Yinpeng Dong
Wei-zhe Gao
Xiaolu Zhang
Jun Zhou
Jun Zhu
AAML
CVBM
36
109
0
29 Jun 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
60
63
0
26 Apr 2021
3D Adversarial Attacks Beyond Point Cloud
Jinlai Zhang
Lyujie Chen
Binbin Liu
Bojun Ouyang
Qizhi Xie
Jihong Zhu
Weiming Li
Yanmei Meng
3DPC
24
38
0
25 Apr 2021
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Jing Wu
Mingyi Zhou
Ce Zhu
Yipeng Liu
Mehrtash Harandi
Li Li
AAML
52
10
0
22 Apr 2021
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
27
10
0
18 Apr 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Ajmal Mian
AAML
35
2
0
19 Mar 2021
Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Huichen Li
Linyi Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo-wen Li
AAML
20
17
0
25 Feb 2021
Non-Singular Adversarial Robustness of Neural Networks
Yu-Lin Tsai
Chia-Yi Hsu
Chia-Mu Yu
Pin-Yu Chen
AAML
OOD
11
5
0
23 Feb 2021
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Felix O. Olowononi
D. Rawat
Chunmei Liu
34
132
0
14 Feb 2021
High-Dimensional Bayesian Optimization via Tree-Structured Additive Models
E. Han
Ishank Arora
Jonathan Scarlett
TPM
AI4CE
30
17
0
24 Dec 2020
Efficient On-Chip Learning for Optical Neural Networks Through Power-Aware Sparse Zeroth-Order Optimization
Jiaqi Gu
Chenghao Feng
Zheng Zhao
Zhoufeng Ying
Ray T. Chen
David Z. Pan
27
28
0
21 Dec 2020
DSRNA: Differentiable Search of Robust Neural Architectures
Ramtin Hosseini
Xingyi Yang
P. Xie
OOD
AAML
29
50
0
11 Dec 2020
Data-Free Model Extraction
Jean-Baptiste Truong
Pratyush Maini
R. Walls
Nicolas Papernot
MIACV
15
181
0
30 Nov 2020
1
2
Next