Query-based Local Black-box Adversarial Attacks

被引:0
|
作者
Shi, Jing [1 ]
Zhang, Xiaolin [1 ]
Xu, Enhui [2 ]
Wang, Yongping [1 ]
Zhang, Wenwen [1 ]
机构
[1] School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou,014010, China
[2] China Nanhu Academy of Electronics and Information Technology, China
关键词
This work was supported by the Natural Science Foundation of China under Grant 61562065 and the Inner Mongolia Natural Science Foundation Project under Grant 2019MS06001 and Grant 2023MS06012;
D O I
10.6633/IJNS.202311 25(6).17
中图分类号
学科分类号
摘要
引用
收藏
页码:1048 / 1058
相关论文
共 50 条
  • [41] Local Black-box Adversarial Attack based on Random Segmentation Channel
    Xu, Li
    Yang, Zejin
    Guo, Huiting
    Wan, Xu
    Fan, Chunlong
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1437 - 1442
  • [42] Query efficient black-box adversarial attack on deep neural networks
    Bai, Yang
    Wang, Yisen
    Zeng, Yuyuan
    Jiang, Yong
    Xia, Shu-Tao
    PATTERN RECOGNITION, 2023, 133
  • [43] Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization
    Lee, Deokjae
    Moon, Seungyong
    Lee, Junhyeok
    Song, Hyun Oh
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
  • [44] Adversarial Black-Box Attacks on Vision-based Deep Reinforcement Learning Agents
    Tanev, Atanas
    Pavlitskaya, Svetlana
    Sigloch, Joan
    Roennau, Arne
    Dillmann, Ruediger
    Zoellner, J. Marius
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2021, : 177 - 181
  • [45] Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks
    Zhu, Yanfei
    Zhao, Yaochi
    Hu, Zhuhua
    Liu, Xiaozhang
    Yan, Anli
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I, 2023, 14086 : 442 - 453
  • [46] Improving query efficiency of black-box attacks via the preference of models
    Yang, Xiangyuan
    Lin, Jie
    Zhang, Hanlin
    Zhao, Peng
    INFORMATION SCIENCES, 2024, 678
  • [47] Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
    Yang, Chenxi
    Liu, Yujia
    Li, Dingquan
    Jiang, Tingting
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (12) : 12715 - 12729
  • [48] Semantics aware adversarial malware examples generation for black-box attacks
    Peng, Xiaowei
    Xian, Hequn
    Lu, Qian
    Lu, Xiuqing
    APPLIED SOFT COMPUTING, 2021, 109
  • [49] Black-box attacks on dynamic graphs via adversarial topology perturbations
    Tao, Haicheng
    Cao, Jie
    Chen, Lei
    Sun, Hongliang
    Shi, Yong
    Zhu, Xingquan
    NEURAL NETWORKS, 2024, 171 : 308 - 319
  • [50] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151