Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesFnu Suya, Jianfeng Chi, David Evans, Yuan TianLast updated on Nov 27, 2023PDF Cite Code Slides Videoadversarial examples black-box attacks transfer attacks query based attacksFnu SuyaMC2 Postdoctoral FellowMy research interests include machine learning for security and trustworthy machine learning.