Towards efficient data free black-box adversarial attack

J Zhang, B Li, J Xu, S Wu, S Ding… - Proceedings of the …, 2022 - openaccess.thecvf.com
Classic black-box adversarial attacks can take advantage of transferable adversarial
examples generated by a similar substitute model to successfully fool the target model …

Query-efficient black-box adversarial attacks guided by a transfer-based prior

Y Dong, S Cheng, T Pang, H Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Adversarial attacks have been extensively studied in recent years since they can identify the
vulnerability of deep learning models before deployed. In this paper, we consider the black …

Generalizable black-box adversarial attack with meta learning

F Yin, Y Zhang, B Wu, Y Feng, J Zhang… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
In the scenario of black-box adversarial attack, the target model's parameters are unknown,
and the attacker aims to find a successful adversarial perturbation based on query feedback …

Boosting black-box attack with partially transferred conditional adversarial distribution

Y Feng, B Wu, Y Fan, L Liu, Z Li… - Proceedings of the …, 2022 - openaccess.thecvf.com
This work studies black-box adversarial attacks against deep neural networks (DNNs),
where the attacker can only access the query feedback returned by the attacked DNN …

Black-box adversarial attack with transferable model-based embedding

Z Huang, T Zhang - arXiv preprint arXiv:1911.07140, 2019 - arxiv.org
We present a new method for black-box adversarial attack. Unlike previous methods that
combined transfer-based and scored-based methods by using the gradient or initialization of …

Dast: Data-free substitute training for adversarial attacks

M Zhou, J Wu, Y Liu, S Liu… - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Abstract Machine learning models are vulnerable to adversarial examples. For the black-box
setting, current substitute attacks need pre-trained models to generate adversarial …

Stochastic variance reduced ensemble adversarial attack for boosting the adversarial transferability

Y Xiong, J Lin, M Zhang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The black-box adversarial attack has attracted impressive attention for its practical use in the
field of deep learning security. Meanwhile, it is very challenging as there is no access to the …

Towards transferable targeted adversarial examples

Z Wang, H Yang, Y Feng, P Sun… - Proceedings of the …, 2023 - openaccess.thecvf.com
Transferability of adversarial examples is critical for black-box deep learning model attacks.
While most existing studies focus on enhancing the transferability of untargeted adversarial …

Improving query efficiency of black-box adversarial attack

Y Bai, Y Zeng, Y Jiang, Y Wang, ST Xia… - Computer Vision–ECCV …, 2020 - Springer
Deep neural networks (DNNs) have demonstrated excellent performance on various tasks,
however they are under the risk of adversarial examples that can be easily generated when …

Meta gradient adversarial attack

Z Yuan, J Zhang, Y Jia, C Tan… - Proceedings of the …, 2021 - openaccess.thecvf.com
In recent years, research on adversarial attacks has become a hot spot. Although current
literature on the transfer-based adversarial attack has achieved promising results for …