Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesFnu Suya, Jianfeng Chi, David Evans, Yuan TianLast updated on Nov 27, 2023PDF Cite Code Slides Videoadversarial examples black-box attacks transfer attacks query based attacksFnu SuyaAssistant ProfessorMy research interests include machine learning for security and trustworthy machine learning.