ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2106.02105
  4. Cited By
A Little Robustness Goes a Long Way: Leveraging Robust Features for
  Targeted Transfer Attacks

A Little Robustness Goes a Long Way: Leveraging Robust Features for Targeted Transfer Attacks

3 June 2021
Jacob Mitchell Springer
Melanie Mitchell
Garrett Kenyon
    AAML
ArXivPDFHTML

Papers citing "A Little Robustness Goes a Long Way: Leveraging Robust Features for Targeted Transfer Attacks"

33 / 33 papers shown
Title
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Hui Zeng
Sanshuai Cui
Biwei Chen
Anjie Peng
AAML
39
0
0
31 Dec 2024
Breaking Barriers in Physical-World Adversarial Examples: Improving
  Robustness and Transferability via Robust Feature
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
Yichen Wang
Yuxuan Chou
Ziqi Zhou
Hangtao Zhang
Wei Wan
Shengshan Hu
Minghui Li
AAML
115
3
0
22 Dec 2024
Robust and Transferable Backdoor Attacks Against Deep Image Compression
  With Selective Frequency Prior
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Yi Yu
Yufei Wang
Wenhan Yang
Lanqing Guo
Shijian Lu
Ling-yu Duan
Yap-Peng Tan
Alex C. Kot
AAML
86
4
0
02 Dec 2024
S$^4$ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
S4^44ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
113
0
0
13 Oct 2024
On the Adversarial Transferability of Generalized "Skip Connections"
On the Adversarial Transferability of Generalized "Skip Connections"
Yisen Wang
Yichuan Mo
Dongxian Wu
Mingjie Li
Xingjun Ma
Zhouchen Lin
AAML
31
2
0
11 Oct 2024
AnyAttack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models
AnyAttack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models
Jiaming Zhang
Junhong Ye
Xingjun Ma
Yige Li
Yunfan Yang
Jitao Sang
Dit-Yan Yeung
Dit-Yan Yeung
AAML
VLM
34
0
0
07 Oct 2024
Boosting Adversarial Transferability for Skeleton-based Action
  Recognition via Exploring the Model Posterior Space
Boosting Adversarial Transferability for Skeleton-based Action Recognition via Exploring the Model Posterior Space
Yunfeng Diao
Baiqi Wu
Ruixuan Zhang
Xun Yang
Meng Wang
He Wang
29
0
0
11 Jul 2024
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Bo Yang
Hengwei Zhang
Jin-dong Wang
Yulong Yang
Chenhao Lin
Chao Shen
Zhengyu Zhao
SILM
AAML
68
2
0
27 Feb 2024
Theoretical Understanding of Learning from Adversarial Perturbations
Theoretical Understanding of Learning from Adversarial Perturbations
Soichiro Kumano
Hiroshi Kera
Toshihiko Yamasaki
AAML
33
1
0
16 Feb 2024
Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of
  Conjugate Variables in System Attacks
Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of Conjugate Variables in System Attacks
Jun-Jie Zhang
Deyu Meng
AAML
12
3
0
16 Feb 2024
Towards Assessing the Synthetic-to-Measured Adversarial Vulnerability of
  SAR ATR
Towards Assessing the Synthetic-to-Measured Adversarial Vulnerability of SAR ATR
Bowen Peng
Bo Peng
Jingyuan Xia
Tianpeng Liu
Yongxiang Liu
Li Liu
AAML
32
4
0
30 Jan 2024
Hijacking Attacks against Neural Networks by Analyzing Training Data
Hijacking Attacks against Neural Networks by Analyzing Training Data
Yunjie Ge
Qian Wang
Huayang Huang
Qi Li
Cong Wang
Chao Shen
Lingchen Zhao
Peipei Jiang
Zheng Fang
Shenyi Zhang
19
0
0
18 Jan 2024
Towards Scalable and Robust Model Versioning
Towards Scalable and Robust Model Versioning
Wenxin Ding
A. Bhagoji
Ben Y. Zhao
Haitao Zheng
AAML
17
0
0
17 Jan 2024
Exploring Adversarial Attacks against Latent Diffusion Model from the
  Perspective of Adversarial Transferability
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability
Junxi Chen
Junhao Dong
Xiaohua Xie
AAML
DiffM
19
5
0
13 Jan 2024
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized
  Surrogate
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate
Tao Wu
Tie Luo
D. C. Wunsch
41
4
0
20 Dec 2023
Towards Evaluating Transfer-based Attacks Systematically, Practically,
  and Fairly
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly
Qizhang Li
Yiwen Guo
Wangmeng Zuo
Hao Chen
ELM
AAML
35
2
0
02 Nov 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David E. Evans
AAML
31
6
0
26 Oct 2023
Improving Transferability of Adversarial Examples via Bayesian Attacks
Improving Transferability of Adversarial Examples via Bayesian Attacks
Qizhang Li
Yiwen Guo
Xiaochen Yang
W. Zuo
Hao Chen
AAML
BDL
26
2
0
21 Jul 2023
Why Does Little Robustness Help? Understanding and Improving Adversarial
  Transferability from Surrogate Training
Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate Training
Yechao Zhang
Shengshan Hu
Leo Yu Zhang
Junyu Shi
Minghui Li
Xiaogeng Liu
Wei Wan
Hai Jin
AAML
22
21
0
15 Jul 2023
Introducing Competition to Boost the Transferability of Targeted
  Adversarial Examples through Clean Feature Mixup
Introducing Competition to Boost the Transferability of Targeted Adversarial Examples through Clean Feature Mixup
Junyoung Byun
Myung-Joon Kwon
Seungju Cho
Yoonji Kim
Changick Kim
AAML
30
17
0
24 May 2023
Going Further: Flatness at the Rescue of Early Stopping for Adversarial
  Example Transferability
Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability
Martin Gubri
Maxime Cordy
Yves Le Traon
AAML
20
3
1
05 Apr 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?
What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?
Nikolaos Tsilivis
Julia Kempe
AAML
44
17
0
11 Oct 2022
Transferability Ranking of Adversarial Examples
Transferability Ranking of Adversarial Examples
Mosh Levy
Guy Amit
Yuval Elovici
Yisroel Mirsky
AAML
31
0
0
23 Aug 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable
  Perturbations
Adversarial Pixel Restoration as a Pretext Task for Transferable Perturbations
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
F. Khan
AAML
23
8
0
18 Jul 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
33
5
0
16 Jun 2022
An Intermediate-level Attack Framework on The Basis of Linear Regression
An Intermediate-level Attack Framework on The Basis of Linear Regression
Yiwen Guo
Qizhang Li
W. Zuo
Hao Chen
41
13
0
21 Mar 2022
Can Adversarial Training Be Manipulated By Non-Robust Features?
Can Adversarial Training Be Manipulated By Non-Robust Features?
Lue Tao
Lei Feng
Hongxin Wei
Jinfeng Yi
Sheng-Jun Huang
Songcan Chen
AAML
81
16
0
31 Jan 2022
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAML
OOD
191
273
0
03 Dec 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GAN
AAML
185
302
0
21 May 2018
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision
  Applications
MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications
Andrew G. Howard
Menglong Zhu
Bo Chen
Dmitry Kalenichenko
Weijun Wang
Tobias Weyand
M. Andreetto
Hartwig Adam
3DH
950
20,567
0
17 Apr 2017
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
1