Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1412.6572
Cited By
Explaining and Harnessing Adversarial Examples
20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Explaining and Harnessing Adversarial Examples"
50 / 3,523 papers shown
Title
Spiking Neural Network: a low power solution for physical layer authentication
Jung Hoon Lee
Sujith Vijayan
12
0
0
19 May 2025
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Wei-Long Tian
Peng Gao
Xiao Liu
Long Xu
Hamido Fujita
Hanan Aljuai
Mao-Li Wang
AAML
29
0
0
13 May 2025
Where the Devil Hides: Deepfake Detectors Can No Longer Be Trusted
Shuaiwei Yuan
Junyu Dong
Yuezun Li
AAML
29
0
0
13 May 2025
Robustness Analysis against Adversarial Patch Attacks in Fully Unmanned Stores
Hyunsik Na
Wonho Lee
Seungdeok Roh
Sohee Park
Daeseon Choi
AAML
23
0
0
13 May 2025
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Matteo Brosolo
A. Aazami
R. Agarwal
M. Prabhakaran
S. Nicolazzo
Antonino Nocera
V. P.
AAML
37
0
0
12 May 2025
Towards Understanding Deep Learning Model in Image Recognition via Coverage Test
Wenkai Li
Xiaoqi Li
Yingjie Mao
Yishun Wang
29
0
0
12 May 2025
Wasserstein Distributionally Robust Nonparametric Regression
Changyu Liu
Yuling Jiao
Junhui Wang
Jian Huang
OOD
34
0
0
12 May 2025
A Formally Verified Robustness Certifier for Neural Networks (Extended Version)
James Tobler
Hira Taqdees Syeda
Toby Murray
AAML
29
0
0
11 May 2025
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
Xia Du
Jiajie Zhu
Jizhe Zhou
Chi-Man Pun
Zheng Lin
Cong Wu
Zhaoyu Chen
Jun Luo
AAML
26
0
0
11 May 2025
Dynamic Domain Information Modulation Algorithm for Multi-domain Sentiment Analysis
Chunyi Yue
Ang Li
34
0
0
10 May 2025
Engineering Risk-Aware, Security-by-Design Frameworks for Assurance of Large-Scale Autonomous AI Models
Krti Tallam
31
0
0
09 May 2025
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
55
0
0
08 May 2025
DispBench: Benchmarking Disparity Estimation to Synthetic Corruptions
Shashank Agnihotri
Amaan Ansari
Annika Dackermann
Fabian Rösch
M. Keuper
58
0
0
08 May 2025
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Yuqiu Liu
Huanqian Yan
Xiaopei Zhu
Xiaolin Hu
L. Tang
Hang Su
Chen Lv
34
0
0
07 May 2025
Reliable Disentanglement Multi-view Learning Against View Adversarial Attacks
Xuyang Wang
Siyuan Duan
Qizhi Li
Guiduo Duan
Yuan Sun
Dezhong Peng
AAML
EDL
65
0
0
07 May 2025
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain
Spyridon Raptis
Haralampos-G. Stratigopoulos
AAML
28
0
0
07 May 2025
Data-Driven Falsification of Cyber-Physical Systems
Atanu Kundu
Sauvik Gon
Rajarshi Ray
AAML
AI4CE
41
3
0
06 May 2025
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Shashank Kapoor
Sanjay Surendranath Girija
Lakshit Arora
Dipen Pradhan
Ankit Shetgaonkar
Aman Raj
AAML
77
0
0
06 May 2025
Framework GNN-AID: Graph Neural Network Analysis Interpretation and Defense
Kirill Lukyanov
Mikhail Drobyshevskiy
Georgii Sazonov
Mikhail Soloviov
Ilya Makarov
GNN
56
0
0
06 May 2025
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models
Zihan Wang
Hongwei Li
Rui Zhang
Wenbo Jiang
Kangjie Chen
Tianwei Zhang
Qingchuan Zhao
Jiawei Li
AAML
46
0
0
06 May 2025
Impact Analysis of Inference Time Attack of Perception Sensors on Autonomous Vehicles
Hanlin Chen
Simin Chen
Wenyu Li
Wei Yang
Yiheng Feng
AAML
137
0
0
05 May 2025
Robustness questions the interpretability of graph neural networks: what to do?
Kirill Lukyanov
Georgii Sazonov
Serafim Boyarsky
Ilya Makarov
AAML
212
0
0
05 May 2025
Adversarial Robustness Analysis of Vision-Language Models in Medical Image Segmentation
Anjila Budathoki
Manish Dhakal
AAML
41
0
0
05 May 2025
Lightweight Defense Against Adversarial Attacks in Time Series Classification
Yi Han
AAML
42
0
0
04 May 2025
Minimisation of Quasar-Convex Functions Using Random Zeroth-Order Oracles
Amir Ali Farzin
Yuen-Man Pun
Iman Shames
31
0
0
04 May 2025
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp
Eran Aizikovich
D. Mimran
Edita Grolman
Yuval Elovici
A. Shabtai
38
0
0
03 May 2025
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Kai Hu
Weichen Yu
Lefei Zhang
Alexander Robey
Andy Zou
Chengming Xu
Haoqi Hu
Matt Fredrikson
AAML
VLM
72
1
0
02 May 2025
Explainable AI Based Diagnosis of Poisoning Attacks in Evolutionary Swarms
Mehrdad Asadi
Roxana Rădulescu
Ann Nowé
AAML
32
0
0
02 May 2025
Adaptive Branch-and-Bound Tree Exploration for Neural Network Verification
Kota Fukuda
Guanqin Zhang
Zhenya Zhang
Yulei Sui
Jianjun Zhao
50
0
0
02 May 2025
LLM Security: Vulnerabilities, Attacks, Defenses, and Countermeasures
Francisco Aguilera-Martínez
Fernando Berzal
PILM
55
0
0
02 May 2025
Quantum Support Vector Regression for Robust Anomaly Detection
Kilian Tscharke
Maximilian Wendlinger
Sebastian Issel
Pascal Debus
AAML
37
0
0
02 May 2025
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
49
0
0
02 May 2025
Risk Analysis and Design Against Adversarial Actions
M. Campi
A. Carè
Luis G. Crespo
S. Garatti
Federico A. Ramponi
AAML
189
0
0
02 May 2025
A Mathematical Philosophy of Explanations in Mechanistic Interpretability -- The Strange Science Part I.i
Kola Ayonrinde
Louis Jaburi
MILM
90
1
0
01 May 2025
Stochastic Subspace Descent Accelerated via Bi-fidelity Line Search
Nuojin Cheng
Alireza Doostan
Stephen Becker
39
0
0
30 Apr 2025
A Domain-Agnostic Scalable AI Safety Ensuring Framework
Beomjun Kim
Kangyeon Kim
Sunwoo Kim
Heejin Ahn
57
0
0
29 Apr 2025
Deep Physics Prior for First Order Inverse Optimization
Haoyu Yang
Kamyar Azizzadenesheli
Haoxing Ren
PINN
AI4CE
90
0
0
28 Apr 2025
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift
Jiamin Chang
Yiming Li
Hammond Pearce
Ruoxi Sun
Bo-wen Li
Minhui Xue
40
0
0
28 Apr 2025
A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning
Greg Gluch
Shafi Goldwasser
AAML
39
0
0
28 Apr 2025
CapsFake: A Multimodal Capsule Network for Detecting Instruction-Guided Deepfakes
Tuan Nguyen
Naseem Khan
Issa Khalil
AAML
64
0
0
27 Apr 2025
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Elad Sofer
Tomer Shaked
Caroline Chaux
Nir Shlezinger
AAML
45
0
0
26 Apr 2025
Augmenting Perceptual Super-Resolution via Image Quality Predictors
Fengjia Zhang
Samrudhdhi B. Rangrej
Tristan Aumentado-Armstrong
Afsaneh Fazly
Alex Levinshtein
SupR
72
0
0
25 Apr 2025
A Simple DropConnect Approach to Transfer-based Targeted Attack
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAML
69
0
0
24 Apr 2025
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
Aniruddha Bala
Rohit Chowdhury
Rohan Jaiswal
Siddharth Roheda
DiffM
AAML
79
0
0
24 Apr 2025
Fast Adversarial Training with Weak-to-Strong Spatial-Temporal Consistency in the Frequency Domain on Videos
Songping Wang
Hanqing Liu
Yueming Lyu
Xiantao Hu
Ziwen He
Wei Wang
Caifeng Shan
Lei Wang
AAML
151
0
0
21 Apr 2025
Unifying Image Counterfactuals and Feature Attributions with Latent-Space Adversarial Attacks
Jeremy Goldwasser
Giles Hooker
AAML
36
0
0
21 Apr 2025
aiXamine: Simplified LLM Safety and Security
Fatih Deniz
Dorde Popovic
Yazan Boshmaf
Euisuh Jeong
M. Ahmad
Sanjay Chawla
Issa M. Khalil
ELM
80
0
0
21 Apr 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
211
0
0
20 Apr 2025
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
AAML
28
0
0
19 Apr 2025
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
Jing Chen
Onat Gungor
Zhengli Shang
Elvin Li
T. Rosing
AAML
42
0
0
17 Apr 2025
1
2
3
4
...
69
70
71
Next