![Institute for Applied AI - Selected Topics in Deep Learning - #1 Adversarial Attacks: C3 Black-Box Attacks Institute for Applied AI - Selected Topics in Deep Learning - #1 Adversarial Attacks: C3 Black-Box Attacks](https://ai.hdm-stuttgart.de/img/news/2020/selected-topics-1-adversarial-attacks/3/output_59_1.png)
Institute for Applied AI - Selected Topics in Deep Learning - #1 Adversarial Attacks: C3 Black-Box Attacks
![Applied Sciences | Free Full-Text | A Hybrid Adversarial Attack for Different Application Scenarios | HTML Applied Sciences | Free Full-Text | A Hybrid Adversarial Attack for Different Application Scenarios | HTML](https://www.mdpi.com/applsci/applsci-10-03559/article_deploy/html/images/applsci-10-03559-g001.png)
Applied Sciences | Free Full-Text | A Hybrid Adversarial Attack for Different Application Scenarios | HTML
Adversarial Attacks and Defences for Convolutional Neural Networks | by Joao Gomes | Onfido Product and Tech | Medium
![PDF] ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models | Semantic Scholar PDF] ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/9ab7319dbe80549ba80e3320d0546d741a7a5791/3-Figure2-1.png)
PDF] ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models | Semantic Scholar
![Adversarial attack and defense in reinforcement learning-from AI security view | Cybersecurity | Full Text Adversarial attack and defense in reinforcement learning-from AI security view | Cybersecurity | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1186%2Fs42400-019-0027-x/MediaObjects/42400_2019_27_Fig6_HTML.png)
Adversarial attack and defense in reinforcement learning-from AI security view | Cybersecurity | Full Text
![Tricking a Machine into Thinking You're Milla Jovovich | by Rey Reza Wiyatno | Element AI Lab | Medium Tricking a Machine into Thinking You're Milla Jovovich | by Rey Reza Wiyatno | Element AI Lab | Medium](https://miro.medium.com/max/1400/1*glO0mcX3Y6iLRQmpkaMB4g.jpeg)
Tricking a Machine into Thinking You're Milla Jovovich | by Rey Reza Wiyatno | Element AI Lab | Medium
![Applied Sciences | Free Full-Text | Review of Artificial Intelligence Adversarial Attack and Defense Technologies | HTML Applied Sciences | Free Full-Text | Review of Artificial Intelligence Adversarial Attack and Defense Technologies | HTML](https://www.mdpi.com/applsci/applsci-09-00909/article_deploy/html/images/applsci-09-00909-g003.png)
Applied Sciences | Free Full-Text | Review of Artificial Intelligence Adversarial Attack and Defense Technologies | HTML
![Two Types of Adversarial Attacks that Any Data Scientist Should Know About | by Jesus Rodriguez | The Startup | Medium Two Types of Adversarial Attacks that Any Data Scientist Should Know About | by Jesus Rodriguez | The Startup | Medium](https://miro.medium.com/max/1400/1*gAK7-8AspEsozvbQrUp5eg.png)
Two Types of Adversarial Attacks that Any Data Scientist Should Know About | by Jesus Rodriguez | The Startup | Medium
![Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation | Semantic Scholar Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/a0e70c64abedaa3925a9277c99b5833c1bbf5464/2-Figure3-1.png)
Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation | Semantic Scholar
![Figure 1 from Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN | Semantic Scholar Figure 1 from Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/86e5827087e11dc929d592ee7b3d7581fc48265e/3-Figure1-1.png)