Results 11 to 20 of about 504,342 (225)
Black-box adversarial attacks using evolution strategies [PDF]
To be published in the proceedings of ACM Genetic and Evolutionary Computation Conference (GECCO) Companion ...
Qiu H., Custode L. L., Iacca G.
openaire +2 more sources
Breaking Cuckoo Hash: Black Box Attacks
Introduced less than twenty years ago, cuckoo hashing has a number of attractive features like a constant worst case number of memory accesses for queries and close to full memory utilization. Cuckoo hashing has been widely adopted to perform exact matching of an incoming key with a set of stored (key, value) pairs in both software and hardware ...
Pedro Reviriego, Daniel Ting
openaire +2 more sources
SurFree: a fast surrogate-free black-box attack [PDF]
8 ...
Maho, Thibault +2 more
openaire +3 more sources
Simple Black-box Adversarial Attacks
Published at ICML ...
Chuan Guo 0001 +4 more
openaire +3 more sources
Knowledge-enhanced Black-box Attacks for Recommendations
Accepted in the KDD ...
Jingfan Chen +6 more
openaire +2 more sources
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks [PDF]
Adversarial examples are known as carefully perturbed images fooling image classifiers. We propose a geometric framework to generate adversarial examples in one of the most challenging black-box settings where the adversary can only generate a small number of queries, each of them returning the top-$1$ label of the classifier. Our framework is based on
Ali Rahmati +3 more
openaire +2 more sources
Sparse Black-Box Video Attack with Reinforcement Learning
Adversarial attacks on video recognition models have been explored recently. However, most existing works treat each video frame equally and ignore their temporal interactions. To overcome this drawback, a few methods try to select some key frames and then perform attacks based on them.
Xingxing Wei 0001 +2 more
openaire +2 more sources
Adversarial Eigen Attack on Black-Box Models
Black-box adversarial attack has attracted a lot of research interests for its practical use in AI safety. Compared with the white-box attack, a black-box setting is more difficult for less available information related to the attacked model and the additional constraint on the query budget.
Linjun Zhou +3 more
openaire +2 more sources
Improving Query Efficiency of Black-Box Adversarial Attack [PDF]
Accepted to ...
Yang Bai +5 more
openaire +2 more sources
Generating Adversarial Examples with Adversarial Networks
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples resulting from adding small-magnitude perturbations to inputs. Such adversarial examples can mislead DNNs to produce adversary-selected results.
He, Warren +5 more
core +1 more source

