Author of the publication

Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms.

, , , and . ECCV (12), volume 11216 of Lecture Notes in Computer Science, page 158-174. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black-box Attacks on Deep Neural Networks via Gradient Estimation., , , and . ICLR (Workshop), OpenReview.net, (2018)Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 863-873. PMLR, (2021)Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker., , , , , , and . CoRR, (2023)NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation., , , , , , and . CoRR, (2023)PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking., , , and . USENIX Security Symposium, page 2237-2254. USENIX Association, (2021)Lower Bounds on Adversarial Robustness from Optimal Transport., , and . NeurIPS, page 7496-7508. (2019)Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints., , , , , and . CCS, page 2285-2287. ACM, (2018)Towards Scalable and Robust Model Versioning., , , and . SaTML, page 592-611. IEEE, (2024)"Community Guidelines Make this the Best Party on the Internet": An In-Depth Study of Online Platforms' Content Moderation Policies., , , , , , , , , and . CHI, page 486:1-486:16. ACM, (2024)Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples., , , , , , and . CoRR, (2019)