ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.00441
  4. Cited By
NATTACK: Learning the Distributions of Adversarial Examples for an
  Improved Black-Box Attack on Deep Neural Networks
v1v2v3 (latest)

NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks

1 May 2019
Yandong Li
Lijun Li
Liqiang Wang
Tong Zhang
Boqing Gong
    AAML
ArXiv (abs)PDFHTML

Papers citing "NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks"

50 / 91 papers shown
Title
Improving Adversarial Robustness for 3D Point Cloud Recognition at
  Test-Time through Purified Self-Training
Improving Adversarial Robustness for 3D Point Cloud Recognition at Test-Time through Purified Self-Training
Jinpeng Lin
Xulei Yang
Tianrui Li
Xun Xu
3DPC
76
0
0
23 Sep 2024
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided
  by a Function Prior
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior
Shuyu Cheng
Yibo Miao
Yinpeng Dong
Xiao Yang
Xiao-Shan Gao
Jun Zhu
AAML
101
5
0
29 May 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited
  Black-box Scenario
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Renyang Liu
Kwok-Yan Lam
Wei Zhou
Sixing Wu
Jun Zhao
Dongting Hu
Mingming Gong
AAML
104
0
0
30 Mar 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
94
6
0
11 Feb 2024
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
63
0
0
12 Dec 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David Evans
AAML
104
6
0
26 Oct 2023
Probabilistically robust conformal prediction
Probabilistically robust conformal prediction
Subhankar Ghosh
Yuanjie Shi
Taha Belkhouja
Yan Yan
J. Doppa
Brian Jones
AAML
187
21
0
31 Jul 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
126
12
0
21 Jun 2023
Unlearnable Examples for Diffusion Models: Protect Data from
  Unauthorized Exploitation
Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Zhengyue Zhao
Jinhao Duan
Xingui Hu
Kaidi Xu
Chenan Wang
Rui Zhang
Zidong Du
Qi Guo
Yunji Chen
DiffMWIGM
102
28
0
02 Jun 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
129
22
0
20 Apr 2023
Feature Separation and Recalibration for Adversarial Robustness
Feature Separation and Recalibration for Adversarial Robustness
Woo Jae Kim
Y. Cho
Junsik Jung
Sung-eui Yoon
AAML
117
22
0
24 Mar 2023
Adversarial Attack with Raindrops
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
69
19
0
28 Feb 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
108
29
0
01 Jan 2023
Publishing Efficient On-device Models Increases Adversarial
  Vulnerability
Publishing Efficient On-device Models Increases Adversarial Vulnerability
Sanghyun Hong
Nicholas Carlini
Alexey Kurakin
AAML
77
3
0
28 Dec 2022
Boosting the Transferability of Adversarial Attacks with Global Momentum
  Initialization
Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Jiafeng Wang
Zhaoyu Chen
Kaixun Jiang
Dingkang Yang
Lingyi Hong
Pinxue Guo
Yan Wang
Wenqiang Zhang
AAML
126
31
0
21 Nov 2022
Emerging Threats in Deep Learning-Based Autonomous Driving: A
  Comprehensive Survey
Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Huiyun Cao
Wenlong Zou
Yinkun Wang
Ting Song
Mengjun Liu
AAML
100
6
0
19 Oct 2022
Understanding Adversarial Robustness Against On-manifold Adversarial
  Examples
Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
78
13
0
02 Oct 2022
On the Adversarial Transferability of ConvMixer Models
On the Adversarial Transferability of ConvMixer Models
Ryota Iijima
Miki Tanaka
Isao Echizen
Hitoshi Kiya
AAML
63
2
0
19 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
84
4
0
07 Sep 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition
  using a Mobile and Compact Printer
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAMLCVBM
79
5
0
25 Jun 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
110
40
0
07 Jun 2022
When adversarial examples are excusable
When adversarial examples are excusable
Pieter-Jan Kindermans
Charles Staats
AAML
52
0
0
25 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
79
5
0
20 Apr 2022
PublicCheck: Public Integrity Verification for Services of Run-time Deep
  Models
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models
Shuo Wang
Sharif Abuadbba
Sidharth Agarwal
Kristen Moore
Ruoxi Sun
Minhui Xue
Surya Nepal
S. Çamtepe
S. Kanhere
HILM
68
7
0
21 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAMLMLAU
141
25
0
16 Mar 2022
LAS-AT: Adversarial Training with Learnable Attack Strategy
LAS-AT: Adversarial Training with Learnable Attack Strategy
Xiaojun Jia
Yong Zhang
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
76
140
0
13 Mar 2022
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based
  Prior
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Yinpeng Dong
Shuyu Cheng
Tianyu Pang
Hang Su
Jun Zhu
AAML
62
60
0
13 Mar 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
76
6
0
31 Jan 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera
  Image Pipelines
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
59
8
0
16 Dec 2021
Adaptive Image Transformations for Transfer-based Adversarial Attack
Adaptive Image Transformations for Transfer-based Adversarial Attack
Zheng Yuan
Jie Zhang
Shiguang Shan
OOD
89
27
0
27 Nov 2021
Adaptive Perturbation for Adversarial Attack
Adaptive Perturbation for Adversarial Attack
Zheng Yuan
Jie Zhang
Zhaoyan Jiang
Liangliang Li
Shiguang Shan
AAML
115
3
0
27 Nov 2021
A Review of Adversarial Attack and Defense for Classification Methods
A Review of Adversarial Attack and Defense for Classification Methods
Yao Li
Minhao Cheng
Cho-Jui Hsieh
T. C. Lee
AAML
76
69
0
18 Nov 2021
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Manjushree B. Aithal
Xiaohua Li
AAML
101
6
0
30 Sep 2021
Improving the Robustness of Adversarial Attacks Using an
  Affine-Invariant Gradient Estimator
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator
Wenzhao Xiang
Hang Su
Chang-rui Liu
Yandong Guo
Shibao Zheng
AAML
83
6
0
13 Sep 2021
Regional Adversarial Training for Better Robust Generalization
Regional Adversarial Training for Better Robust Generalization
Chuanbiao Song
Yanbo Fan
Yichen Yang
Baoyuan Wu
Yiming Li
Zhifeng Li
Kun He
AAMLOOD
131
8
0
02 Sep 2021
On Procedural Adversarial Noise Attack And Defense
On Procedural Adversarial Noise Attack And Defense
Jun Yan
Xiaoyang Deng
Huilin Yin
Wancheng Ge
AAML
58
2
0
10 Aug 2021
Meta Gradient Adversarial Attack
Meta Gradient Adversarial Attack
Zheng Yuan
Jie Zhang
Yunpei Jia
Chuanqi Tan
Tao Xue
Shiguang Shan
AAML
117
79
0
09 Aug 2021
Probabilistic Margins for Instance Reweighting in Adversarial Training
Probabilistic Margins for Instance Reweighting in Adversarial Training
Qizhou Wang
Feng Liu
Bo Han
Tongliang Liu
Chen Gong
Gang Niu
Mingyuan Zhou
Masashi Sugiyama
AAML
86
65
0
15 Jun 2021
Analysis and Applications of Class-wise Robustness in Adversarial
  Training
Analysis and Applications of Class-wise Robustness in Adversarial Training
Qi Tian
Kun Kuang
Ke Jiang
Leilei Gan
Yisen Wang
AAML
86
47
0
29 May 2021
Dynamic Defense Approach for Adversarial Robustness in Deep Neural
  Networks via Stochastic Ensemble Smoothed Model
Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model
Ruoxi Qin
Linyuan Wang
Xing-yuan Chen
Xuehui Du
Bin Yan
AAML
69
5
0
06 May 2021
A Simple and Strong Baseline for Universal Targeted Attacks on Siamese
  Visual Tracking
A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking
Zhenbang Li
Yaya Shi
Jin Gao
Shaoru Wang
Bing Li
Pengpeng Liang
Weiming Hu
AAML
93
27
0
06 May 2021
Performance Evaluation of Adversarial Attacks: Discrepancies and
  Solutions
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Jing Wu
Mingyi Zhou
Ce Zhu
Yipeng Liu
Mehrtash Harandi
Li Li
AAML
107
11
0
22 Apr 2021
Universal Spectral Adversarial Attacks for Deformable Shapes
Universal Spectral Adversarial Attacks for Deformable Shapes
Arianna Rampini
Franco Pestarini
Luca Cosmo
Simone Melzi
Emanuele Rodolà
AAML
120
18
0
07 Apr 2021
Enhancing the Transferability of Adversarial Attacks through Variance
  Tuning
Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Xiaosen Wang
Kun He
AAML
114
401
0
29 Mar 2021
Black-box Detection of Backdoor Attacks with Limited Information and
  Data
Black-box Detection of Backdoor Attacks with Limited Information and Data
Yinpeng Dong
Xiao Yang
Zhijie Deng
Tianyu Pang
Zihao Xiao
Hang Su
Jun Zhu
AAML
91
114
0
24 Mar 2021
Boosting Adversarial Transferability through Enhanced Momentum
Boosting Adversarial Transferability through Enhanced Momentum
Xiaosen Wang
Jiadong Lin
Han Hu
Jingdong Wang
Kun He
AAML
119
77
0
19 Mar 2021
Improving Adversarial Robustness via Channel-wise Activation Suppressing
Improving Adversarial Robustness via Channel-wise Activation Suppressing
Yang Bai
Yuyuan Zeng
Yong Jiang
Shutao Xia
Xingjun Ma
Yisen Wang
AAML
100
131
0
11 Mar 2021
Practical Relative Order Attack in Deep Ranking
Practical Relative Order Attack in Deep Ranking
Mo Zhou
Le Wang
Zhenxing Niu
Qilin Zhang
Yinghui Xu
N. Zheng
G. Hua
146
18
0
09 Mar 2021
Statistical Inference for Polyak-Ruppert Averaged Zeroth-order
  Stochastic Gradient Algorithm
Statistical Inference for Polyak-Ruppert Averaged Zeroth-order Stochastic Gradient Algorithm
Yanhao Jin
Tesi Xiao
Krishnakumar Balasubramanian
72
6
0
10 Feb 2021
Adversarial Imaging Pipelines
Adversarial Imaging Pipelines
Buu Phan
Fahim Mannan
Felix Heide
AAML
56
26
0
07 Feb 2021
12
Next