ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAML
    GAN
ArXivPDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 3,605 papers shown
Title
Enhancing Certified Robustness via Block Reflector Orthogonal Layers and Logit Annealing Loss
Enhancing Certified Robustness via Block Reflector Orthogonal Layers and Logit Annealing Loss
Bo-Han Lai
Pin-Han Huang
Bo-Han Kung
Shang-Tse Chen
12
0
0
21 May 2025
Beyond Classification: Evaluating Diffusion Denoised Smoothing for Security-Utility Trade off
Beyond Classification: Evaluating Diffusion Denoised Smoothing for Security-Utility Trade off
Yury Belousov
Brian Pulfer
Vitaliy Kinakh
Slava Voloshynovskiy
DiffM
7
0
0
21 May 2025
GAMA: Geometry-Aware Manifold Alignment via Structured Adversarial Perturbations for Robust Domain Adaptation
GAMA: Geometry-Aware Manifold Alignment via Structured Adversarial Perturbations for Robust Domain Adaptation
Hana Satou
F Monkey
12
0
0
21 May 2025
Spiking Neural Network: a low power solution for physical layer authentication
Spiking Neural Network: a low power solution for physical layer authentication
Jung Hoon Lee
Sujith Vijayan
14
0
0
19 May 2025
Causality-Inspired Robustness for Nonlinear Models via Representation Learning
Causality-Inspired Robustness for Nonlinear Models via Representation Learning
Marin Šola
Peter Bühlmann
Xinwei Shen
OOD
12
0
0
19 May 2025
Adversarial Robustness for Unified Multi-Modal Encoders via Efficient Calibration
Adversarial Robustness for Unified Multi-Modal Encoders via Efficient Calibration
Chih-Ting Liao
Bin Ren
Guofeng Mei
Xu Zheng
AAML
12
0
0
17 May 2025
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Md Farhan Tasnim Oshim
Nigel Doering
Bashima Islam
Tsui-Wei Weng
Tauhidur Rahman
14
0
0
16 May 2025
Robustness Analysis against Adversarial Patch Attacks in Fully Unmanned Stores
Robustness Analysis against Adversarial Patch Attacks in Fully Unmanned Stores
Hyunsik Na
Wonho Lee
Seungdeok Roh
Sohee Park
Daeseon Choi
AAML
23
0
0
13 May 2025
Where the Devil Hides: Deepfake Detectors Can No Longer Be Trusted
Where the Devil Hides: Deepfake Detectors Can No Longer Be Trusted
Shuaiwei Yuan
Junyu Dong
Yuezun Li
AAML
29
0
0
13 May 2025
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Wei-Long Tian
Peng Gao
Xiao Liu
Long Xu
Hamido Fujita
Hanan Aljuai
Mao-Li Wang
AAML
29
0
0
13 May 2025
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Matteo Brosolo
A. Aazami
R. Agarwal
M. Prabhakaran
S. Nicolazzo
Antonino Nocera
V. P.
AAML
37
0
0
12 May 2025
Wasserstein Distributionally Robust Nonparametric Regression
Wasserstein Distributionally Robust Nonparametric Regression
Changyu Liu
Yuling Jiao
Junhui Wang
Jian Huang
OOD
34
0
0
12 May 2025
Towards Understanding Deep Learning Model in Image Recognition via Coverage Test
Towards Understanding Deep Learning Model in Image Recognition via Coverage Test
Wenkai Li
Xiaoqi Li
Yingjie Mao
Yishun Wang
29
0
0
12 May 2025
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
Xia Du
Jiajie Zhu
Jizhe Zhou
Chi-Man Pun
Zheng Lin
Cong Wu
Zhaoyu Chen
Jun Luo
AAML
26
0
0
11 May 2025
A Formally Verified Robustness Certifier for Neural Networks (Extended Version)
A Formally Verified Robustness Certifier for Neural Networks (Extended Version)
James Tobler
Hira Taqdees Syeda
Toby Murray
AAML
29
0
0
11 May 2025
Dynamic Domain Information Modulation Algorithm for Multi-domain Sentiment Analysis
Dynamic Domain Information Modulation Algorithm for Multi-domain Sentiment Analysis
Chunyi Yue
Ang Li
34
0
0
10 May 2025
Engineering Risk-Aware, Security-by-Design Frameworks for Assurance of Large-Scale Autonomous AI Models
Engineering Risk-Aware, Security-by-Design Frameworks for Assurance of Large-Scale Autonomous AI Models
Krti Tallam
31
0
0
09 May 2025
DispBench: Benchmarking Disparity Estimation to Synthetic Corruptions
DispBench: Benchmarking Disparity Estimation to Synthetic Corruptions
Shashank Agnihotri
Amaan Ansari
Annika Dackermann
Fabian Rösch
M. Keuper
58
0
0
08 May 2025
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
57
0
0
08 May 2025
Reliable Disentanglement Multi-view Learning Against View Adversarial Attacks
Reliable Disentanglement Multi-view Learning Against View Adversarial Attacks
Xuyang Wang
Siyuan Duan
Qizhi Li
Guiduo Duan
Yuan Sun
Dezhong Peng
AAML
EDL
65
0
0
07 May 2025
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Yuqiu Liu
Huanqian Yan
Xiaopei Zhu
Xiaolin Hu
L. Tang
Hang Su
Chen Lv
34
0
0
07 May 2025
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain
Spyridon Raptis
Haralampos-G. Stratigopoulos
AAML
28
0
0
07 May 2025
Data-Driven Falsification of Cyber-Physical Systems
Data-Driven Falsification of Cyber-Physical Systems
Atanu Kundu
Sauvik Gon
Rajarshi Ray
AAML
AI4CE
43
3
0
06 May 2025
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models
Zhilin Wang
Hongwei Li
Rui Zhang
Wenbo Jiang
Kangjie Chen
Tianwei Zhang
Qingchuan Zhao
Jiawei Li
AAML
46
0
0
06 May 2025
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Shashank Kapoor
Sanjay Surendranath Girija
Lakshit Arora
Dipen Pradhan
Ankit Shetgaonkar
Aman Raj
AAML
77
0
0
06 May 2025
Framework GNN-AID: Graph Neural Network Analysis Interpretation and Defense
Framework GNN-AID: Graph Neural Network Analysis Interpretation and Defense
Kirill Lukyanov
Mikhail Drobyshevskiy
Georgii Sazonov
Mikhail Soloviov
Ilya Makarov
GNN
56
0
0
06 May 2025
Robustness questions the interpretability of graph neural networks: what to do?
Robustness questions the interpretability of graph neural networks: what to do?
Kirill Lukyanov
Georgii Sazonov
Serafim Boyarsky
Ilya Makarov
AAML
226
0
0
05 May 2025
Adversarial Robustness Analysis of Vision-Language Models in Medical Image Segmentation
Adversarial Robustness Analysis of Vision-Language Models in Medical Image Segmentation
Anjila Budathoki
Manish Dhakal
AAML
41
0
0
05 May 2025
Impact Analysis of Inference Time Attack of Perception Sensors on Autonomous Vehicles
Impact Analysis of Inference Time Attack of Perception Sensors on Autonomous Vehicles
Hanlin Chen
Simin Chen
Wenyu Li
Wei Yang
Yiheng Feng
AAML
152
0
0
05 May 2025
Minimisation of Quasar-Convex Functions Using Random Zeroth-Order Oracles
Minimisation of Quasar-Convex Functions Using Random Zeroth-Order Oracles
Amir Ali Farzin
Yuen-Man Pun
Iman Shames
31
0
0
04 May 2025
Lightweight Defense Against Adversarial Attacks in Time Series Classification
Lightweight Defense Against Adversarial Attacks in Time Series Classification
Yi Han
AAML
45
0
0
04 May 2025
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp
Eran Aizikovich
D. Mimran
Edita Grolman
Yuval Elovici
A. Shabtai
38
0
0
03 May 2025
LLM Security: Vulnerabilities, Attacks, Defenses, and Countermeasures
LLM Security: Vulnerabilities, Attacks, Defenses, and Countermeasures
Francisco Aguilera-Martínez
Fernando Berzal
PILM
55
0
0
02 May 2025
Quantum Support Vector Regression for Robust Anomaly Detection
Quantum Support Vector Regression for Robust Anomaly Detection
Kilian Tscharke
Maximilian Wendlinger
Sebastian Issel
Pascal Debus
AAML
44
0
0
02 May 2025
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
49
0
0
02 May 2025
Adaptive Branch-and-Bound Tree Exploration for Neural Network Verification
Adaptive Branch-and-Bound Tree Exploration for Neural Network Verification
Kota Fukuda
Guanqin Zhang
Zhenya Zhang
Yulei Sui
Jianjun Zhao
50
0
0
02 May 2025
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Transferable Adversarial Attacks on Black-Box Vision-Language Models
Kai Hu
Weichen Yu
Lefei Zhang
Alexander Robey
Andy Zou
Chengming Xu
Haoqi Hu
Matt Fredrikson
AAML
VLM
72
1
0
02 May 2025
Explainable AI Based Diagnosis of Poisoning Attacks in Evolutionary Swarms
Explainable AI Based Diagnosis of Poisoning Attacks in Evolutionary Swarms
Mehrdad Asadi
Roxana Rădulescu
Ann Nowé
AAML
34
0
0
02 May 2025
Risk Analysis and Design Against Adversarial Actions
Risk Analysis and Design Against Adversarial Actions
M. Campi
A. Carè
Luis G. Crespo
S. Garatti
Federico A. Ramponi
AAML
198
0
0
02 May 2025
A Mathematical Philosophy of Explanations in Mechanistic Interpretability -- The Strange Science Part I.i
A Mathematical Philosophy of Explanations in Mechanistic Interpretability -- The Strange Science Part I.i
Kola Ayonrinde
Louis Jaburi
MILM
90
1
0
01 May 2025
Stochastic Subspace Descent Accelerated via Bi-fidelity Line Search
Stochastic Subspace Descent Accelerated via Bi-fidelity Line Search
Nuojin Cheng
Alireza Doostan
Stephen Becker
41
0
0
30 Apr 2025
A Domain-Agnostic Scalable AI Safety Ensuring Framework
A Domain-Agnostic Scalable AI Safety Ensuring Framework
Beomjun Kim
Kangyeon Kim
Sunwoo Kim
Heejin Ahn
57
0
0
29 Apr 2025
A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning
A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning
Greg Gluch
Shafi Goldwasser
AAML
42
0
0
28 Apr 2025
Deep Physics Prior for First Order Inverse Optimization
Deep Physics Prior for First Order Inverse Optimization
Haoyu Yang
Kamyar Azizzadenesheli
Haoxing Ren
PINN
AI4CE
90
0
0
28 Apr 2025
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift
Jiamin Chang
Yiming Li
Hammond Pearce
Ruoxi Sun
Bo-wen Li
Minhui Xue
43
0
0
28 Apr 2025
CapsFake: A Multimodal Capsule Network for Detecting Instruction-Guided Deepfakes
CapsFake: A Multimodal Capsule Network for Detecting Instruction-Guided Deepfakes
Tuan Nguyen
Naseem Khan
Issa Khalil
AAML
67
0
0
27 Apr 2025
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Elad Sofer
Tomer Shaked
Caroline Chaux
Nir Shlezinger
AAML
49
0
0
26 Apr 2025
Augmenting Perceptual Super-Resolution via Image Quality Predictors
Augmenting Perceptual Super-Resolution via Image Quality Predictors
Fengjia Zhang
Samrudhdhi B. Rangrej
Tristan Aumentado-Armstrong
Afsaneh Fazly
Alex Levinshtein
SupR
72
0
0
25 Apr 2025
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
Aniruddha Bala
Rohit Chowdhury
Rohan Jaiswal
Siddharth Roheda
DiffM
AAML
79
0
0
24 Apr 2025
A Simple DropConnect Approach to Transfer-based Targeted Attack
A Simple DropConnect Approach to Transfer-based Targeted Attack
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAML
69
0
0
24 Apr 2025
1234...717273
Next