Search

Your search keyword '"black-box attack"' showing total 220 results

Search Constraints

Start Over You searched for: Descriptor "black-box attack" Remove constraint Descriptor: "black-box attack"
220 results on '"black-box attack"'

Search Results

101. Detection Tolerant Black-Box Adversarial Attack Against Automatic Modulation Classification With Deep Learning.

102. Adversarial Attack and Defense: A Survey.

103. Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet.

105. Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey

106. Evolutionary Algorithm-Based Images, Humanly Indistinguishable and Adversarial Against Convolutional Neural Networks: Efficiency and Filter Robustness

108. ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.

109. Restricted Region Based Iterative Gradient Method for Non-Targeted Attack

110. SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

111. ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model

112. DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense.

113. Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing.

114. 基于深度神经网络的对抗样本技术综述.

115. An Adversarial Network-based Multi-model Black-box Attack.

116. Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing

117. When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon’s and Naver’s Celebrity Recognition APIs

118. Delving into Diversity in Substitute Ensembles and Transferability of Adversarial Examples

119. Transferable adversarial attack based on sensitive perturbation analysis in frequency domain.

120. Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices

121. An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.

122. 颜色模型扰动的语义对抗样本生成方法.

123. Toward Visual Distortion in Black-Box Attacks.

124. Adversarial attacks through architectures and spectra in face recognition.

125. Towards Transferable Adversarial Attack Against Deep Face Recognition.

126. TransMix: Crafting highly transferable adversarial examples to evade face recognition models.

127. Attentional Feature Erase: Towards task-wise transferable adversarial attack on cloud vision APIs.

128. Attacking Black-Box Image Classifiers With Particle Swarm Optimization

129. A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks

130. An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning

131. Enhancing the Transferability of Adversarial Examples with Feature Transformation

132. 融合高斯噪声和翻转策略的对抗攻击.

133. ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers

134. BBAS: Towards large scale effective ensemble adversarial attacks against deep neural network learning.

135. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

136. Partial Retraining Substitute Model for Query-Limited Black-Box Attacks.

137. Adversarial attacks on Faster R-CNN object detector.

138. Towards universal and sparse adversarial examples for visual object tracking.

139. 对抗黑盒攻击的混合对抗性训练防御策略研究.

140. Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation.

141. Partial Retraining Substitute Model for Query-Limited Black-Box Attacks

142. A strategy creating high-resolution adversarial images against convolutional neural networks and a feasibility study on 10 CNNs

143. Advancement of Mathematical Methods in Feature Representation Learning for Artificial Intelligence, Data Mining and Robotics.

145. Black-box attack against GAN-generated image detector with contrastive perturbation.

146. A strategy creating high-resolution adversarial images against convolutional neural networks and a feasibility study on 10 CNNs

147. Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation

148. Adversarial Attack and Defense: A Survey

149. Efficient text-based evolution algorithm to hard-label adversarial attacks on text.

150. Back in Black: A comparative evaluation of recent state-of-the-art black-box attacks

Catalog

Books, media, physical & digital resources