共 50 条
- [21] Practical Black-Box Attacks against Machine Learning PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
- [22] Impossibility of Black-Box Simulation Against Leakage Attacks ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 130 - 149
- [23] Reverse Attack: Black-box Attacks on Collaborative Recommendation CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 51 - 68
- [24] Curls & Whey: Boosting Black-Box Adversarial Attacks 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 6512 - 6520
- [25] Boundary Defense Against Black-box Adversarial Attacks 2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2022, : 2349 - 2356
- [26] Knowledge-enhanced Black-box Attacks for Recommendations PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 108 - 117
- [27] Black-box Adversarial Attacks with Limited Queries and Information INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80
- [29] White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, 2019, : 1373 - 1379
- [30] Monte Carlo Tree Descent for Black-Box Optimization ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,