ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1906.06919
  4. Cited By
Improving Black-box Adversarial Attacks with a Transfer-based Prior

Improving Black-box Adversarial Attacks with a Transfer-based Prior

17 June 2019
Shuyu Cheng
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
    AAML
ArXivPDFHTML

Papers citing "Improving Black-box Adversarial Attacks with a Transfer-based Prior"

50 / 52 papers shown
Title
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
190
0
0
20 Apr 2025
Overlap-Aware Feature Learning for Robust Unsupervised Domain Adaptation for 3D Semantic Segmentation
Overlap-Aware Feature Learning for Robust Unsupervised Domain Adaptation for 3D Semantic Segmentation
Junjie Chen
Yuecong Xu
Yiming Li
Kemi Ding
3DPC
47
0
0
02 Apr 2025
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
47
0
0
17 Mar 2025
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Zhun Zhang
Yi Zeng
Qihe Liu
Shijie Zhou
AAML
39
0
0
16 Apr 2024
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing Guo
Yihao Huang
Xiaofei Xie
Lei Ma
Jianjun Zhao
AAML
34
48
0
23 Apr 2023
Ensemble-based Blackbox Attacks on Dense Prediction
Ensemble-based Blackbox Attacks on Dense Prediction
Zikui Cai
Yaoteng Tan
Ulugbek S. Kamilov
AAML
33
14
0
25 Mar 2023
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional
  Gradient Estimation
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional Gradient Estimation
Geunhyeok Yu
Minwoo Jeon
Hyoseok Hwang
AAML
24
1
0
09 Mar 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual
  Example
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
37
3
0
30 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
29
27
0
01 Jan 2023
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via
  Attention-based Network in Face Recognition
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
72
9
0
11 Sep 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition
  using a Mobile and Compact Printer
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAML
CVBM
36
5
0
25 Jun 2022
On the Role of Generalization in Transferability of Adversarial Examples
On the Role of Generalization in Transferability of Adversarial Examples
Yilin Wang
Farzan Farnia
AAML
24
10
0
18 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
35
50
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
X. Huang
AAML
110
28
0
24 May 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial Robustness
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
44
9
0
23 May 2022
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial
  Attacks
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks
Siddhartha Datta
AAML
34
4
0
15 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Binghui Wang
Youqin Li
Pan Zhou
AAML
34
13
0
07 May 2022
Self-recoverable Adversarial Examples: A New Effective Protection
  Mechanism in Social Networks
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
25
28
0
26 Apr 2022
Narcissus: A Practical Clean-Label Backdoor Attack with Limited
  Information
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information
Yi Zeng
Minzhou Pan
H. Just
Lingjuan Lyu
M. Qiu
R. Jia
AAML
22
169
0
11 Apr 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
27
2
0
07 Mar 2022
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Spyridon Mouselinos
Henryk Michalewski
Mateusz Malinowski
21
3
0
24 Feb 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
21
6
0
31 Jan 2022
RamBoAttack: A Robust Query Efficient Deep Neural Network Decision
  Exploit
RamBoAttack: A Robust Query Efficient Deep Neural Network Decision Exploit
Viet Vo
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
17
9
0
10 Dec 2021
Adaptive Image Transformations for Transfer-based Adversarial Attack
Adaptive Image Transformations for Transfer-based Adversarial Attack
Zheng Yuan
Jie Zhang
Shiguang Shan
OOD
24
25
0
27 Nov 2021
Adaptive Perturbation for Adversarial Attack
Adaptive Perturbation for Adversarial Attack
Zheng Yuan
Jie Zhang
Zhaoyan Jiang
Liangliang Li
Shiguang Shan
AAML
27
3
0
27 Nov 2021
Meta-Learning the Search Distribution of Black-Box Random Search Based
  Adversarial Attacks
Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks
Maksym Yatsura
J. H. Metzen
Matthias Hein
OOD
26
14
0
02 Nov 2021
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
Manjushree B. Aithal
Xiaohua Li
AAML
60
6
0
30 Sep 2021
Adversarial Transfer Attacks With Unknown Data and Class Overlap
Adversarial Transfer Attacks With Unknown Data and Class Overlap
Luke E. Richards
A. Nguyen
Ryan Capps
Steven D. Forsythe
Cynthia Matuszek
Edward Raff
AAML
41
7
0
23 Sep 2021
Improving the Robustness of Adversarial Attacks Using an
  Affine-Invariant Gradient Estimator
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator
Wenzhao Xiang
Hang Su
Chang-rui Liu
Yandong Guo
Shibao Zheng
AAML
29
5
0
13 Sep 2021
Training Meta-Surrogate Model for Transferable Adversarial Attack
Training Meta-Surrogate Model for Transferable Adversarial Attack
Yunxiao Qin
Yuanhao Xiong
Jinfeng Yi
Cho-Jui Hsieh
AAML
15
18
0
05 Sep 2021
Meta Gradient Adversarial Attack
Meta Gradient Adversarial Attack
Zheng Yuan
Jie Zhang
Yunpei Jia
Chuanqi Tan
Tao Xue
Shiguang Shan
AAML
49
78
0
09 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Siyue Wang
Xiao Wang
Pin-Yu Chen
Pu Zhao
Xue Lin
AAML
38
2
0
14 May 2021
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial
  Attack
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack
Ashkan Esmaeili
Marzieh Edraki
Nazanin Rahnavard
M. Shah
Ajmal Mian
AAML
35
2
0
19 Mar 2021
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
19
44
0
04 Mar 2021
Nonlinear Projection Based Gradient Estimation for Query Efficient
  Blackbox Attacks
Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Huichen Li
Linyi Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo-wen Li
AAML
25
17
0
25 Feb 2021
GreedyFool: Distortion-Aware Sparse Adversarial Attack
GreedyFool: Distortion-Aware Sparse Adversarial Attack
Xiaoyi Dong
Dongdong Chen
Jianmin Bao
Chuan Qin
Lu Yuan
Weiming Zhang
Nenghai Yu
Dong Chen
AAML
18
63
0
26 Oct 2020
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Learning Black-Box Attackers with Transferable Priors and Query Feedback
Jiancheng Yang
Yangzhou Jiang
Xiaoyang Huang
Bingbing Ni
Chenglong Zhao
AAML
18
81
0
21 Oct 2020
Block-wise Image Transformation with Secret Key for Adversarially Robust
  Defense
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Maungmaung Aprilpyone
Hitoshi Kiya
29
57
0
02 Oct 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
L. Chen
Junhai Yong
MLAU
OOD
41
17
0
02 Sep 2020
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
25
12
0
21 Jul 2020
Odyssey: Creation, Analysis and Detection of Trojan Models
Odyssey: Creation, Analysis and Detection of Trojan Models
Marzieh Edraki
Nazmul Karim
Nazanin Rahnavard
Ajmal Mian
M. Shah
AAML
28
13
0
16 Jul 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
35
12
0
11 May 2020
Transferable Perturbations of Deep Feature Distributions
Transferable Perturbations of Deep Feature Distributions
Nathan Inkawhich
Kevin J Liang
Lawrence Carin
Yiran Chen
AAML
30
84
0
27 Apr 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face
  Recognition
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
18
52
0
16 Mar 2020
GeoDA: a geometric framework for black-box adversarial attacks
GeoDA: a geometric framework for black-box adversarial attacks
A. Rahmati
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
H. Dai
MLAU
AAML
28
114
0
13 Mar 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie-jin Yang
Xiaolin Huang
AAML
31
103
0
16 Jan 2020
12
Next