ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1904.02144
  4. Cited By
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack

HopSkipJumpAttack: A Query-Efficient Decision-Based Attack

3 April 2019
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
    AAML
ArXivPDFHTML

Papers citing "HopSkipJumpAttack: A Query-Efficient Decision-Based Attack"

50 / 142 papers shown
Title
A Robust Optimisation Perspective on Counterexample-Guided Repair of
  Neural Networks
A Robust Optimisation Perspective on Counterexample-Guided Repair of Neural Networks
David Boetius
Stefan Leue
Tobias Sutter
38
4
0
26 Jan 2023
On the feasibility of attacking Thai LPR systems with adversarial
  examples
On the feasibility of attacking Thai LPR systems with adversarial examples
Chissanupong Jiamsuchon
Jakapan Suaboot
Norrathep Rattanavipanon
AAML
14
0
0
13 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
34
27
0
01 Jan 2023
Tracing the Origin of Adversarial Attack for Forensic Investigation and
  Deterrence
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Han Fang
Jiyi Zhang
Yupeng Qiu
Ke Xu
Chengfang Fang
E. Chang
AAML
33
2
0
31 Dec 2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
36
75
0
29 Dec 2022
Learned Systems Security
Learned Systems Security
R. Schuster
Jinyi Zhou
Thorsten Eisenhofer
Paul Grubbs
Nicolas Papernot
AAML
14
2
0
20 Dec 2022
Understanding the Vulnerability of Skeleton-based Human Activity
  Recognition via Black-box Attack
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack
Yunfeng Diao
He Wang
Tianjia Shao
Yong-Liang Yang
Kun Zhou
David C. Hogg
Meng Wang
AAML
45
7
0
21 Nov 2022
Adversarial Detection by Approximation of Ensemble Boundary
Adversarial Detection by Approximation of Ensemble Boundary
T. Windeatt
AAML
26
0
0
18 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
Universal Distributional Decision-based Black-box Adversarial Attack
  with Reinforcement Learning
Universal Distributional Decision-based Black-box Adversarial Attack with Reinforcement Learning
Yiran Huang
Yexu Zhou
Michael Hefenbrock
T. Riedel
Likun Fang
Michael Beigl
AAML
24
3
0
15 Nov 2022
Ares: A System-Oriented Wargame Framework for Adversarial ML
Ares: A System-Oriented Wargame Framework for Adversarial ML
Farhan Ahmed
Pratik Vaishnavi
Kevin Eykholt
Amir Rahmati
AAML
25
7
0
24 Oct 2022
DeltaBound Attack: Efficient decision-based attack in low queries regime
DeltaBound Attack: Efficient decision-based attack in low queries regime
L. Rossi
AAML
20
0
0
01 Oct 2022
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Dongbin Na
Sangwoo Ji
Jong Kim
AAML
35
17
0
24 Aug 2022
Membership-Doctor: Comprehensive Assessment of Membership Inference
  Against Machine Learning Models
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models
Xinlei He
Zheng Li
Weilin Xu
Cory Cornelius
Yang Zhang
MIACV
38
24
0
22 Aug 2022
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating
  Weather Conditions on the Camera Lens of Autonomous Systems
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems
Alberto Marchisio
Giovanni Caramia
Maurizio Martina
Mohamed Bennai
AAML
33
8
0
27 May 2022
Membership Inference Attack Using Self Influence Functions
Membership Inference Attack Using Self Influence Functions
Gilad Cohen
Raja Giryes
TDI
32
12
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
110
28
0
24 May 2022
Randomized Smoothing under Attack: How Good is it in Pratice?
Randomized Smoothing under Attack: How Good is it in Pratice?
Thibault Maho
Teddy Furon
Erwan Le Merrer
AAML
11
10
0
28 Apr 2022
Leveraging Adversarial Examples to Quantify Membership Information
  Leakage
Leveraging Adversarial Examples to Quantify Membership Information Leakage
Ganesh Del Grosso
Hamid Jalalzai
Georg Pichler
C. Palamidessi
Pablo Piantanida
MIACV
44
21
0
17 Mar 2022
Defending Black-box Skeleton-based Human Activity Classifiers
Defending Black-box Skeleton-based Human Activity Classifiers
He Wang
Yunfeng Diao
Zichang Tan
G. Guo
AAML
53
10
0
09 Mar 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
41
21
0
09 Mar 2022
Label-Only Model Inversion Attacks via Boundary Repulsion
Label-Only Model Inversion Attacks via Boundary Repulsion
Mostafa Kahla
Si-An Chen
H. Just
R. Jia
35
74
0
03 Mar 2022
MIAShield: Defending Membership Inference Attacks via Preemptive
  Exclusion of Members
MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Ismat Jarin
Birhanu Eshete
42
9
0
02 Mar 2022
Attacks and Faults Injection in Self-Driving Agents on the Carla
  Simulator -- Experience Report
Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Niccolò Piazzesi
Massimo Hong
Andrea Ceccarelli
AAML
24
5
0
25 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
24
6
0
15 Feb 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning Models
Pin-Yu Chen
Sijia Liu
AAML
54
16
0
15 Feb 2022
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint
  Ensembles
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles
Ashish Hooda
Neal Mangaokar
Ryan Feng
Kassem Fawaz
S. Jha
Atul Prakash
32
11
0
11 Feb 2022
Adversarially Robust Models may not Transfer Better: Sufficient
  Conditions for Domain Transferability from the View of Regularization
Adversarially Robust Models may not Transfer Better: Sufficient Conditions for Domain Transferability from the View of Regularization
Xiaojun Xu
Jacky Y. Zhang
Evelyn Ma
Danny Son
Oluwasanmi Koyejo
Bo-wen Li
20
10
0
03 Feb 2022
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep
  Learning Models
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep Learning Models
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
38
14
0
31 Jan 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
26
6
0
31 Jan 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for
  Black-box Domains
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
67
64
0
27 Jan 2022
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Xiaosen Wang
Zeliang Zhang
Kangheng Tong
Dihong Gong
Kun He
Zhifeng Li
Wei Liu
AAML
24
56
0
13 Dec 2021
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction
  Models in Healthcare
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Muchao Ye
Junyu Luo
Guanjie Zheng
Cao Xiao
Ting Wang
Fenglong Ma
AAML
35
3
0
11 Dec 2021
Improving the Transferability of Adversarial Examples with
  Resized-Diverse-Inputs, Diversity-Ensemble and Region Fitting
Improving the Transferability of Adversarial Examples with Resized-Diverse-Inputs, Diversity-Ensemble and Region Fitting
Junhua Zou
Zhisong Pan
Junyang Qiu
Xin Liu
Ting Rui
Wei Li
15
67
0
11 Dec 2021
RamBoAttack: A Robust Query Efficient Deep Neural Network Decision
  Exploit
RamBoAttack: A Robust Query Efficient Deep Neural Network Decision Exploit
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
30
9
0
10 Dec 2021
Decision-based Black-box Attack Against Vision Transformers via
  Patch-wise Adversarial Removal
Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal
Yucheng Shi
Yahong Han
Yu-an Tan
Xiaohui Kuang
50
30
0
07 Dec 2021
Mitigating Adversarial Attacks by Distributing Different Copies to
  Different Users
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Jiyi Zhang
Hansheng Fang
W. Tann
Ke Xu
Chengfang Fang
E. Chang
AAML
34
3
0
30 Nov 2021
Meta-Learning the Search Distribution of Black-Box Random Search Based
  Adversarial Attacks
Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks
Maksym Yatsura
J. H. Metzen
Matthias Hein
OOD
26
14
0
02 Nov 2021
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value
  Analysis
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Junfeng Guo
Ang Li
Cong Liu
AAML
67
74
0
28 Oct 2021
Fast Gradient Non-sign Methods
Fast Gradient Non-sign Methods
Yaya Cheng
Jingkuan Song
Xiaosu Zhu
Qilong Zhang
Lianli Gao
Heng Tao Shen
AAML
29
11
0
25 Oct 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with
  Minimal Information
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
AAML
18
69
0
19 Oct 2021
Adversarial examples by perturbing high-level features in intermediate
  decoder layers
Adversarial examples by perturbing high-level features in intermediate decoder layers
Vojtěch Čermák
Lukáš Adam
AAML
GAN
35
0
0
14 Oct 2021
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
Shawn Shan
A. Bhagoji
Haitao Zheng
Ben Y. Zhao
AAML
94
50
0
13 Oct 2021
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Manjushree B. Aithal
Xiaohua Li
AAML
60
6
0
30 Sep 2021
An Empirical Study of Accuracy, Fairness, Explainability, Distributional
  Robustness, and Adversarial Robustness
An Empirical Study of Accuracy, Fairness, Explainability, Distributional Robustness, and Adversarial Robustness
Moninder Singh
Gevorg Ghalachyan
Kush R. Varshney
R. Bryant
24
9
0
29 Sep 2021
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art
  Black-Box Attacks
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks
Kaleel Mahmood
Rigel Mahmood
Ethan Rathbun
Marten van Dijk
AAML
19
22
0
29 Sep 2021
Morphence: Moving Target Defense Against Adversarial Examples
Morphence: Moving Target Defense Against Adversarial Examples
Abderrahmen Amich
Birhanu Eshete
AAML
34
24
0
31 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
41
236
0
01 Aug 2021
Who's Afraid of Thomas Bayes?
Who's Afraid of Thomas Bayes?
Erick Galinkin
AAML
28
0
0
30 Jul 2021
The Care Label Concept: A Certification Suite for Trustworthy and
  Resource-Aware Machine Learning
The Care Label Concept: A Certification Suite for Trustworthy and Resource-Aware Machine Learning
K. Morik
Helena Kotthaus
Lukas Heppe
Danny Heinrich
Raphael Fischer
Andrea Pauly
Nico Piatkowski
23
4
0
01 Jun 2021
Previous
123
Next