共 50 条
[32]
Timing black-box attacks: Crafting adversarial examples through timing leaks against dnns on embedded devices
[J].
IACR Transactions on Cryptographic Hardware and Embedded Systems,
2021, 2021 (03)
:149-175
[33]
Black-box Evolutionary Search for Adversarial Examples against Deep Image Classifiers in Non-Targeted Attacks
[J].
2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN),
2020,
[36]
Generating Black-Box Adversarial Examples in Sparse Domain
[J].
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE,
2022, 6 (04)
:795-804
[37]
IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems
[J].
WEB AND BIG DATA, PT III, APWEB-WAIM 2022,
2023, 13423
:349-363
[38]
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
[J].
PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024,
2024,
:600-614
[39]
Automatic Selection Attacks Framework for Hard Label Black-Box Models
[J].
IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS),
2022,