ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2112.06569
  4. Cited By
Triangle Attack: A Query-efficient Decision-based Adversarial Attack

Triangle Attack: A Query-efficient Decision-based Adversarial Attack

13 December 2021
Xiaosen Wang
Zeliang Zhang
Kangheng Tong
Dihong Gong
Kun He
Zhifeng Li
Wei Liu
    AAML
ArXivPDFHTML

Papers citing "Triangle Attack: A Query-efficient Decision-based Adversarial Attack"

41 / 41 papers shown
Title
The Sword of Damocles in ViTs: Computational Redundancy Amplifies Adversarial Transferability
The Sword of Damocles in ViTs: Computational Redundancy Amplifies Adversarial Transferability
Jiani Liu
Zhiyuan Wang
Zeliang Zhang
Chao Huang
Susan Liang
Yunlong Tang
Chenliang Xu
AAML
36
0
0
15 Apr 2025
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
42
0
0
17 Mar 2025
Boosting the Local Invariance for Better Adversarial Transferability
Bohan Liu
Xiaosen Wang
AAML
65
0
0
08 Mar 2025
Exploring Adversarial Transferability between Kolmogorov-arnold Networks
Exploring Adversarial Transferability between Kolmogorov-arnold Networks
Songping Wang
Xinquan Yue
Yueming Lyu
Caifeng Shan
AAML
68
1
0
08 Mar 2025
Understanding Model Ensemble in Transferable Adversarial Attack
Understanding Model Ensemble in Transferable Adversarial Attack
Wei Yao
Zeliang Zhang
Huayi Tang
Yong Liu
33
2
0
09 Oct 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against
  Face Recognition Systems
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Yuxin Cao
Yumeng Zhu
Derui Wang
Sheng Wen
Minhui Xue
Jin Lu
Hao Ge
AAML
40
0
0
11 Jul 2024
Video Watermarking: Safeguarding Your Video from (Unauthorized)
  Annotations by Video-based LLMs
Video Watermarking: Safeguarding Your Video from (Unauthorized) Annotations by Video-based LLMs
Jinmin Li
Kuofeng Gao
Yang Bai
Jingyun Zhang
Shu-Tao Xia
40
4
0
02 Jul 2024
ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial
  Attacks
ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks
Feiyang Wang
Xingquan Zuo
Hai Huang
Gang Chen
AAML
33
1
0
07 Jun 2024
Learning to Transform Dynamically for Better Adversarial Transferability
Learning to Transform Dynamically for Better Adversarial Transferability
Rongyi Zhu
Zeliang Zhang
Susan Liang
Zhuo Liu
Chenliang Xu
AAML
36
14
0
23 May 2024
Forward Learning for Gradient-based Black-box Saliency Map Generation
Forward Learning for Gradient-based Black-box Saliency Map Generation
Zeliang Zhang
Mingqian Feng
Jinyang Jiang
Rongyi Zhu
Yijie Peng
Chenliang Xu
FAtt
32
2
0
22 Mar 2024
Boosting the Transferability of Adversarial Examples via Local Mixup and
  Adaptive Step Size
Boosting the Transferability of Adversarial Examples via Local Mixup and Adaptive Step Size
Junlin Liu
Xinchen Lyu
AAML
20
3
0
24 Jan 2024
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
  and the Open Libraries Behind Them
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them
Chao-Jung Liu
Boxi Chen
Wei Shao
Chris Zhang
Kelvin Wong
Yi Zhang
19
3
0
22 Jan 2024
Inducing High Energy-Latency of Large Vision-Language Models with
  Verbose Images
Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images
Kuofeng Gao
Yang Bai
Jindong Gu
Shu-Tao Xia
Philip H. S. Torr
Zhifeng Li
Wei Liu
VLM
14
39
0
20 Jan 2024
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial
  Attacks
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
Meixi Zheng
Xuanchen Yan
Zihao Zhu
Hongrui Chen
Baoyuan Wu
ELM
MLAU
AAML
34
7
0
28 Dec 2023
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
16
0
0
12 Dec 2023
Generating Visually Realistic Adversarial Patch
Generating Visually Realistic Adversarial Patch
Xiaosen Wang
Kunyu Wang
AAML
21
0
0
05 Dec 2023
Rethinking Mixup for Improving the Adversarial Transferability
Rethinking Mixup for Improving the Adversarial Transferability
Xiaosen Wang
Zeyuan Yin
AAML
23
2
0
28 Nov 2023
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP
Jiawang Bai
Kuofeng Gao
Shaobo Min
Shu-Tao Xia
Zhifeng Li
Wei Liu
VLM
23
36
0
26 Nov 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David E. Evans
AAML
24
6
0
26 Oct 2023
Practical Deep Dispersed Watermarking with Synchronization and Fusion
Practical Deep Dispersed Watermarking with Synchronization and Fusion
Hengchang Guo
Qilong Zhang
Junwei Luo
Feng Guo
Wenbin Zhang
Xiaodong Su
Minglei Li
WIGM
19
10
0
23 Oct 2023
Exploring Decision-based Black-box Attacks on Face Forgery Detection
Exploring Decision-based Black-box Attacks on Face Forgery Detection
Zhaoyu Chen
Bo-wen Li
Kaixun Jiang
Shuang Wu
Shouhong Ding
Wenqiang Zhang
AAML
CVBM
24
1
0
18 Oct 2023
Boosting Black-box Attack to Deep Neural Networks with Conditional
  Diffusion Models
Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Renyang Liu
Wei Zhou
Tianwei Zhang
Kangjie Chen
Jun Zhao
Kwok-Yan Lam
22
9
0
11 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
30
15
0
01 Oct 2023
Structure Invariant Transformation for better Adversarial
  Transferability
Structure Invariant Transformation for better Adversarial Transferability
Xiaosen Wang
Zeliang Zhang
Jianping Zhang
AAML
22
59
0
26 Sep 2023
Improving the Transferability of Adversarial Examples with Arbitrary
  Style Transfer
Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer
Zhijin Ge
Fanhua Shang
Hongying Liu
Yuanyuan Liu
Liang Wan
Wei Feng
Xiaosen Wang
AAML
25
19
0
21 Aug 2023
Boosting Adversarial Transferability by Block Shuffle and Rotation
Boosting Adversarial Transferability by Block Shuffle and Rotation
Kunyu Wang
Xu He
Wenxuan Wang
Xiaosen Wang
AAML
20
36
0
20 Aug 2023
CGBA: Curvature-aware Geometric Black-box Attack
CGBA: Curvature-aware Geometric Black-box Attack
Md. Farhamdur Reza
A. Rahmati
Tianfu Wu
H. Dai
AAML
6
16
0
06 Aug 2023
Rethinking the Backward Propagation for Adversarial Transferability
Rethinking the Backward Propagation for Adversarial Transferability
Xiaosen Wang
Kangheng Tong
Kun He
AAML
SILM
17
25
0
22 Jun 2023
Reversible Adversarial Examples with Beam Search Attack and Grayscale
  Invariance
Reversible Adversarial Examples with Beam Search Attack and Grayscale Invariance
Hao Zhang
Chi Man Pun
Xia Du
AAML
13
0
0
20 Jun 2023
Boosting Adversarial Transferability by Achieving Flat Local Maxima
Boosting Adversarial Transferability by Achieving Flat Local Maxima
Zhijin Ge
Hongying Liu
Xiaosen Wang
Fanhua Shang
Yuanyuan Liu
AAML
9
39
0
08 Jun 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
37
18
0
20 Apr 2023
Transferable Adversarial Attacks on Vision Transformers with Token
  Gradient Regularization
Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization
Jianping Zhang
Yizhan Huang
Weibin Wu
Michael R. Lyu
AAML
ViT
18
49
0
28 Mar 2023
Improving the Transferability of Adversarial Samples by Path-Augmented
  Method
Improving the Transferability of Adversarial Samples by Path-Augmented Method
Jianping Zhang
Jen-tse Huang
Wenxuan Wang
Yichen Li
Weibin Wu
Xiaosen Wang
Yuxin Su
Michael R. Lyu
AAML
43
50
0
28 Mar 2023
A Novel Noise Injection-based Training Scheme for Better Model
  Robustness
A Novel Noise Injection-based Training Scheme for Better Model Robustness
Zeliang Zhang
Jinyang Jiang
Minjie Chen
Zhiyuan Wang
Yijie Peng
Zhaofei Yu
22
3
0
17 Feb 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual
  Example
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
21
3
0
30 Jan 2023
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint
  Ensembles
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles
Ashish Hooda
Neal Mangaokar
Ryan Feng
Kassem Fawaz
S. Jha
Atul Prakash
24
11
0
11 Feb 2022
Improving White-box Robustness of Pre-processing Defenses via Joint
  Adversarial Training
Improving White-box Robustness of Pre-processing Defenses via Joint Adversarial Training
Dawei Zhou
N. Wang
Xinbo Gao
Bo Han
Jun Yu
Xiaoyu Wang
Tongliang Liu
AAML
21
4
0
10 Jun 2021
Admix: Enhancing the Transferability of Adversarial Attacks
Admix: Enhancing the Transferability of Adversarial Attacks
Xiaosen Wang
Xu He
Jingdong Wang
Kun He
AAML
78
192
0
31 Jan 2021
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack
Minhao Cheng
Simranjit Singh
Patrick H. Chen
Pin-Yu Chen
Sijia Liu
Cho-Jui Hsieh
AAML
122
219
0
24 Sep 2019
Transferable Adversarial Attacks for Image and Video Object Detection
Transferable Adversarial Attacks for Image and Video Object Detection
Xingxing Wei
Siyuan Liang
Ning Chen
Xiaochun Cao
AAML
72
221
0
30 Nov 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
281
5,835
0
08 Jul 2016
1