Blacklight: Scalable defense for neural networks against {Query-Based}{Black-Box} attacks

H Li, S Shan, E Wenger, J Zhang, H Zheng… - 31st USENIX Security …, 2022 - usenix.org
Deep learning systems are known to be vulnerable to adversarial examples. In particular,
query-based black-box attacks do not require knowledge of the deep learning model, but …

Guessing smart: Biased sampling for efficient black-box adversarial attacks

T Brunner, F Diehl, MT Le… - Proceedings of the IEEE …, 2019 - openaccess.thecvf.com
We consider adversarial examples for image classification in the black-box decision-based
setting. Here, an attacker cannot access confidence scores, but only the final label. Most …

A frank-wolfe framework for efficient and effective adversarial attacks

J Chen, D Zhou, J Yi, Q Gu - Proceedings of the AAAI conference on …, 2020 - ojs.aaai.org
Depending on how much information an adversary can access to, adversarial attacks can be
classified as white-box attack and black-box attack. For white-box attack, optimization-based …

Robustness with query-efficient adversarial attack using reinforcement learning

S Sarkar, AR Babu, S Mousavi… - Proceedings of the …, 2023 - openaccess.thecvf.com
A measure of robustness against naturally occurring distortions is key to safety, success, and
trustworthiness of machine learning models on deployment. We propose an adversarial …

Parallel rectangle flip attack: A query-based black-box attack against object detection

S Liang, B Wu, Y Fan, X Wei, X Cao - arXiv preprint arXiv:2201.08970, 2022 - arxiv.org
Object detection has been widely used in many safety-critical tasks, such as autonomous
driving. However, its vulnerability to adversarial examples has not been sufficiently studied …

Sign-opt: A query-efficient hard-label adversarial attack

M Cheng, S Singh, P Chen, PY Chen, S Liu… - arXiv preprint arXiv …, 2019 - arxiv.org
We study the most practical problem setup for evaluating adversarial robustness of a
machine learning system with limited access: the hard-label black-box attack setting for …

T-sea: Transfer-based self-ensemble attack on object detection

H Huang, Z Chen, H Chen, Y Wang… - Proceedings of the …, 2023 - openaccess.thecvf.com
Compared to query-based black-box attacks, transfer-based black-box attacks do not
require any information of the attacked models, which ensures their secrecy. However, most …

Sparse-rs: a versatile framework for query-efficient sparse black-box adversarial attacks

F Croce, M Andriushchenko, ND Singh… - Proceedings of the …, 2022 - ojs.aaai.org
We propose a versatile framework based on random search, Sparse-RS, for score-based
sparse targeted and untargeted attacks in the black-box setting. Sparse-RS does not rely on …

Projection & probability-driven black-box attack

J Li, R Ji, H Liu, J Liu, B Zhong… - Proceedings of the …, 2020 - openaccess.thecvf.com
Generating adversarial examples in a black-box setting retains a significant challenge with
vast practical application prospects. In particular, existing black-box attacks suffer from the …

Practical black-box attacks on deep neural networks using efficient query mechanisms

AN Bhagoji, W He, B Li, D Song - Proceedings of the …, 2018 - openaccess.thecvf.com
Existing black-box attacks on deep neural networks (DNNs) have largely focused on
transferability, where an adversarial instance generated for a locally trained model can …