The following publications are possibly variants of this publication:
- Delving into Transferable Adversarial Examples and Black-box AttacksYanpei Liu, Xinyun Chen, Chang Liu, Dawn Song. iclr 2017: [doi]
- Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature InformationHeng Li 0008, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo. uss 2023: 1181-1198 [doi]
- Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial ExamplesYuekai Zhang, Ziyan Jiang, Jesús Villalba, Najim Dehak. interspeech 2020: 4238-4242 [doi]
- Evolutionary Multilabel Adversarial Examples: An Effective Black-Box AttackLinghao Kong, Wenjian Luo, Hongwei Zhang, Yang Liu 0039, Yuhui Shi. tai, 4(3):562-572, June 2023. [doi]
- A Data-free Black-box Attack for Generating Transferable Adversarial ExamplesChenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang, Han Zhang, Xuhong Zhang. hpcc 2022: 672-678 [doi]