Search

Your search keyword '"black-box attack"' showing total 220 results

Search Constraints

Start Over You searched for: Descriptor "black-box attack" Remove constraint Descriptor: "black-box attack"
220 results on '"black-box attack"'

Search Results

1. Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection

2. Improving the transferability of adversarial examples with path tuning.

3. Harnessing Unsupervised Insights: Enhancing Black-Box Graph Injection Attacks with Graph Contrastive Learning.

4. Dual stage black-box adversarial attack against vision transformer.

5. Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing Retrieval.

8. Towards Score-Based Black-Box Adversarial Examples Attack in Real World

9. Cipher-Prompt: Towards a Safe Diffusion Model via Learning Cryptographic Prompts

11. Object-Aware Transfer-Based Black-Box Adversarial Attack on Object Detector

12. Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum

13. Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition

14. MTMG: A Framework for Generating Adversarial Examples Targeting Multiple Learning-Based Malware Detection Systems

15. GANs-Based Model Extraction for Black-Box Backdoor Attack

16. Black-box Attack Algorithm for SAR-ATR Deep Neural Networks Based on MI-FGSM

17. Black-box attacks on face recognition via affine-invariant training.

18. The Noise Blowing-Up Strategy Creates High Quality High Resolution Adversarial Images against Convolutional Neural Networks.

19. DIMBA: discretely masked black-box attack in single object tracking.

20. Black-box Bayesian adversarial attack with transferable priors.

21. Harnessing Unsupervised Insights: Enhancing Black-Box Graph Injection Attacks with Graph Contrastive Learning

23. Improving the transferability of adversarial examples with separable positive and negative disturbances.

24. Semantic Adversarial Attacks on Face Recognition Through Significant Attributes

25. Boosting Adversarial Attacks with Improved Sign Method

26. Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape

27. Improving Transferability Reversible Adversarial Examples Based on Flipping Transformation

28. Creating High-Resolution Adversarial Images Against Convolutional Neural Networks with the Noise Blowing-Up Method

29. Towards a General Black-Box Attack on Tabular Datasets

30. Enhancing Transferability of Adversarial Audio in Speaker Recognition Systems

32. A Black-Box Attack on Optical Character Recognition Systems

34. Towards High Transferability on Neural Network for Black-Box Adversarial Attacks

35. Improving the transferability of adversarial samples with channel switching.

36. 时空梯度迭代的声纹对抗攻击算法STI-FGSM.

37. A²SC: Adversarial Attacks on Subspace Clustering.

38. F-MIM: Feature-based Masking Iterative Method to Generate the Adversarial Images against the Face Recognition Systems.

39. Adversarial Examples Generation Method Based on Image Color Random Transformation

40. The Noise Blowing-Up Strategy Creates High Quality High Resolution Adversarial Images against Convolutional Neural Networks

41. 优化梯度增强黑盒对抗攻击算法.

42. Black-Box Attack-Based Security Evaluation Framework for Credit Card Fraud Detection Models.

43. Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.

44. Efficient Query-based Black-box Attack against Cross-modal Hashing Retrieval.

45. Transfer-based attack based on image frequency and adversarial subspace.

46. 黑盒攻击智能识别对抗算法研究现状.

47. Query-Efficient Decision-Based Black-Box Patch Attack.

48. A strategy creating high-resolution adversarial images against convolutional neural networks and a feasibility study on 10 CNNs

50. Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic

Catalog

Books, media, physical & digital resources