ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1805.11770
  4. Cited By
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks

AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks

30 May 2018
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
    MLAU
    AAML
ArXivPDFHTML

Papers citing "AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks"

50 / 76 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
47
0
0
17 Mar 2025
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial
  Contrastive Prompt Tuning
AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning
Xin Wang
Kai-xiang Chen
Xingjun Ma
Zhineng Chen
Jingjing Chen
Yu-Gang Jiang
AAML
43
4
0
04 Aug 2024
$L_p$-norm Distortion-Efficient Adversarial Attack
LpL_pLp​-norm Distortion-Efficient Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Zi-Jia Wang
Xiangui Kang
37
0
0
03 Jul 2024
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Zhun Zhang
Yi Zeng
Qihe Liu
Shijie Zhou
AAML
39
0
0
16 Apr 2024
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial
  Attack
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
38
5
0
08 Apr 2024
Trust Regions for Explanations via Black-Box Probabilistic Certification
Trust Regions for Explanations via Black-Box Probabilistic Certification
Amit Dhurandhar
Swagatam Haldar
Dennis L. Wei
K. Ramamurthy
FAtt
40
2
0
17 Feb 2024
Black-Box Tuning of Vision-Language Models with Effective Gradient
  Approximation
Black-Box Tuning of Vision-Language Models with Effective Gradient Approximation
Zixian Guo
Yuxiang Wei
Ming-Yu Liu
Zhilong Ji
Jinfeng Bai
Yiwen Guo
Wangmeng Zuo
VLM
36
8
0
26 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
18
0
0
12 Dec 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
Mirror Natural Evolution Strategies
Mirror Natural Evolution Strategies
Haishan Ye
19
2
0
01 Aug 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
23
11
0
21 Jun 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
37
4
0
13 Apr 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
M. Salman Asif
AAML
33
14
0
25 Mar 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
29
27
0
01 Jan 2023
Understanding the Vulnerability of Skeleton-based Human Activity
  Recognition via Black-box Attack
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack
Yunfeng Diao
He Wang
Tianjia Shao
Yong-Liang Yang
Kun Zhou
David C. Hogg
Meng Wang
AAML
40
7
0
21 Nov 2022
An Empirical Evaluation of Zeroth-Order Optimization Methods on
  AI-driven Molecule Optimization
An Empirical Evaluation of Zeroth-Order Optimization Methods on AI-driven Molecule Optimization
Elvin Lo
Pin-Yu Chen
37
0
0
27 Oct 2022
Object-Attentional Untargeted Adversarial Attack
Object-Attentional Untargeted Adversarial Attack
Chao Zhou
Yuan-Gen Wang
Guopu Zhu
AAML
21
2
0
16 Oct 2022
Robust Models are less Over-Confident
Robust Models are less Over-Confident
Julia Grabinski
Paul Gavrikov
J. Keuper
M. Keuper
AAML
36
24
0
12 Oct 2022
Zeroth-Order Negative Curvature Finding: Escaping Saddle Points without
  Gradients
Zeroth-Order Negative Curvature Finding: Escaping Saddle Points without Gradients
Hualin Zhang
Huan Xiong
Bin Gu
35
7
0
04 Oct 2022
Constraining Representations Yields Models That Know What They Don't
  Know
Constraining Representations Yields Models That Know What They Don't Know
João Monteiro
Pau Rodríguez López
Pierre-Andre Noel
I. Laradji
David Vazquez
AAML
44
0
0
30 Aug 2022
Lazy Queries Can Reduce Variance in Zeroth-order Optimization
Lazy Queries Can Reduce Variance in Zeroth-order Optimization
Quan-Wu Xiao
Qing Ling
Tianyi Chen
41
0
0
14 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
19
2
0
08 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
29
11
0
04 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
35
50
0
26 May 2022
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization
  Perspective
How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Yimeng Zhang
Yuguang Yao
Jinghan Jia
Jinfeng Yi
Min-Fong Hong
Shiyu Chang
Sijia Liu
AAML
26
33
0
27 Mar 2022
Enhancing Transferability of Adversarial Examples with Spatial Momentum
Enhancing Transferability of Adversarial Examples with Spatial Momentum
Guoqiu Wang
Huanqian Yan
Xingxing Wei
AAML
22
9
0
25 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
Shape-invariant 3D Adversarial Point Clouds
Shape-invariant 3D Adversarial Point Clouds
Qidong Huang
Xiaoyi Dong
Dongdong Chen
Hang Zhou
Weiming Zhang
Nenghai Yu
3DPC
21
67
0
08 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
24
2
0
07 Mar 2022
Adversarially Robust Models may not Transfer Better: Sufficient
  Conditions for Domain Transferability from the View of Regularization
Adversarially Robust Models may not Transfer Better: Sufficient Conditions for Domain Transferability from the View of Regularization
Xiaojun Xu
Jacky Y. Zhang
Evelyn Ma
Danny Son
Oluwasanmi Koyejo
Bo-wen Li
20
10
0
03 Feb 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
21
6
0
31 Jan 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
22
70
0
22 Jan 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera
  Image Pipelines
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Xiaosen Wang
Zeliang Zhang
Kangheng Tong
Dihong Gong
Kun He
Zhifeng Li
Wei Liu
AAML
24
56
0
13 Dec 2021
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to
  CNNs
Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Philipp Benz
Soomin Ham
Chaoning Zhang
Adil Karjauv
In So Kweon
AAML
ViT
47
78
0
06 Oct 2021
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Manjushree B. Aithal
Xiaohua Li
AAML
60
6
0
30 Sep 2021
Improving Transferability of Adversarial Patches on Face Recognition
  with Generative Models
Improving Transferability of Adversarial Patches on Face Recognition with Generative Models
Zihao Xiao
Xianfeng Gao
Chilin Fu
Yinpeng Dong
Wei-zhe Gao
Xiaolu Zhang
Jun Zhou
Jun Zhu
AAML
CVBM
36
109
0
29 Jun 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
60
63
0
26 Apr 2021
3D Adversarial Attacks Beyond Point Cloud
3D Adversarial Attacks Beyond Point Cloud
Jinlai Zhang
Lyujie Chen
Binbin Liu
Bojun Ouyang
Qizhi Xie
Jihong Zhu
Weiming Li
Yanmei Meng
3DPC
24
38
0
25 Apr 2021
Performance Evaluation of Adversarial Attacks: Discrepancies and
  Solutions
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Jing Wu
Mingyi Zhou
Ce Zhu
Yipeng Liu
Mehrtash Harandi
Li Li
AAML
52
10
0
22 Apr 2021
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities
  in Machine Learning Systems
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
27
10
0
18 Apr 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial
  Attack
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Ajmal Mian
AAML
35
2
0
19 Mar 2021
Nonlinear Projection Based Gradient Estimation for Query Efficient
  Blackbox Attacks
Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Huichen Li
Linyi Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo-wen Li
AAML
20
17
0
25 Feb 2021
Non-Singular Adversarial Robustness of Neural Networks
Non-Singular Adversarial Robustness of Neural Networks
Yu-Lin Tsai
Chia-Yi Hsu
Chia-Mu Yu
Pin-Yu Chen
AAML
OOD
11
5
0
23 Feb 2021
Resilient Machine Learning for Networked Cyber Physical Systems: A
  Survey for Machine Learning Security to Securing Machine Learning for CPS
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Felix O. Olowononi
D. Rawat
Chunmei Liu
34
132
0
14 Feb 2021
High-Dimensional Bayesian Optimization via Tree-Structured Additive
  Models
High-Dimensional Bayesian Optimization via Tree-Structured Additive Models
E. Han
Ishank Arora
Jonathan Scarlett
TPM
AI4CE
30
17
0
24 Dec 2020
Efficient On-Chip Learning for Optical Neural Networks Through
  Power-Aware Sparse Zeroth-Order Optimization
Efficient On-Chip Learning for Optical Neural Networks Through Power-Aware Sparse Zeroth-Order Optimization
Jiaqi Gu
Chenghao Feng
Zheng Zhao
Zhoufeng Ying
Ray T. Chen
David Z. Pan
27
28
0
21 Dec 2020
DSRNA: Differentiable Search of Robust Neural Architectures
DSRNA: Differentiable Search of Robust Neural Architectures
Ramtin Hosseini
Xingyi Yang
P. Xie
OOD
AAML
29
50
0
11 Dec 2020
Data-Free Model Extraction
Data-Free Model Extraction
Jean-Baptiste Truong
Pratyush Maini
R. Walls
Nicolas Papernot
MIACV
15
181
0
30 Nov 2020
12
Next