ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,356 papers shown
Title
Stakeholders in Explainable AI
Stakeholders in Explainable AI
Alun D. Preece
Daniel Harborne
Dave Braines
Richard J. Tomsett
Supriyo Chakraborty
55
157
0
29 Sep 2018
Interpreting Adversarial Robustness: A View from Decision Surface in
  Input Space
Interpreting Adversarial Robustness: A View from Decision Surface in Input Space
Fuxun Yu
Chenchen Liu
Yanzhi Wang
Liang Zhao
Xiang Chen
AAMLOOD
99
27
0
29 Sep 2018
Knowledge-guided Semantic Computing Network
Knowledge-guided Semantic Computing Network
Guangming Shi
Zhongqiang Zhang
Dahua Gao
Xuemei Xie
Yihao Feng
Xinrui Ma
Danhua Liu
39
10
0
29 Sep 2018
Predicting the Generalization Gap in Deep Networks with Margin
  Distributions
Predicting the Generalization Gap in Deep Networks with Margin Distributions
Yiding Jiang
Dilip Krishnan
H. Mobahi
Samy Bengio
UQCV
95
199
0
28 Sep 2018
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
148
684
0
28 Sep 2018
Explainable Black-Box Attacks Against Model-based Authentication
Explainable Black-Box Attacks Against Model-based Authentication
Washington Garcia
Joseph I. Choi
S. K. Adari
S. Jha
Kevin R. B. Butler
92
10
0
28 Sep 2018
Characterizing Audio Adversarial Examples Using Temporal Dependency
Characterizing Audio Adversarial Examples Using Temporal Dependency
Zhuolin Yang
Yue Liu
Pin-Yu Chen
Basel Alomair
AAML
69
165
0
28 Sep 2018
Counterfactual Fairness in Text Classification through Robustness
Counterfactual Fairness in Text Classification through Robustness
Sahaj Garg
Vincent Perot
Nicole Limtiaco
Ankur Taly
Ed H. Chi
Alex Beutel
102
261
0
27 Sep 2018
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge
  and the Way Forward
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward
Muhammad Usama
Junaid Qadir
Ala I. Al-Fuqaha
AAML
53
20
0
26 Sep 2018
Scenic: A Language for Scenario Specification and Scene Generation
Scenic: A Language for Scenario Specification and Scene Generation
Daniel J. Fremont
T. Dreossi
Shromona Ghosh
Xiangyu Yue
Alberto L. Sangiovanni-Vincentelli
Sanjit A. Seshia
78
263
0
25 Sep 2018
Fast Geometrically-Perturbed Adversarial Faces
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBMAAML
64
65
0
24 Sep 2018
On The Utility of Conditional Generation Based Mutual Information for
  Characterizing Adversarial Subspaces
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces
Chia-Yi Hsu
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
70
1
0
24 Sep 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial Perturbation
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
84
168
0
24 Sep 2018
Adversarial Recommendation: Attack of the Learned Fake Users
Adversarial Recommendation: Attack of the Learned Fake Users
Konstantina Christakopoulou
A. Banerjee
AAML
47
12
0
21 Sep 2018
Adversarial Training in Affective Computing and Sentiment Analysis:
  Recent Advances and Perspectives
Adversarial Training in Affective Computing and Sentiment Analysis: Recent Advances and Perspectives
Jing Han
Zixing Zhang
N. Cummins
Björn Schuller
84
61
0
21 Sep 2018
Constrained Exploration and Recovery from Experience Shaping
Constrained Exploration and Recovery from Experience Shaping
Tu-Hoa Pham
Giovanni De Magistris
Don Joven Agravante
Subhajit Chaudhury
Asim Munawar
Ryuki Tachibana
50
3
0
21 Sep 2018
Understanding Behavior of Clinical Models under Domain Shifts
Understanding Behavior of Clinical Models under Domain Shifts
Jayaraman J. Thiagarajan
Deepta Rajan
P. Sattigeri
OODAI4CE
59
3
0
20 Sep 2018
Efficient Formal Safety Analysis of Neural Networks
Efficient Formal Safety Analysis of Neural Networks
Shiqi Wang
Kexin Pei
Justin Whitehouse
Junfeng Yang
Suman Jana
AAML
94
406
0
19 Sep 2018
Generating 3D Adversarial Point Clouds
Generating 3D Adversarial Point Clouds
Chong Xiang
C. Qi
Yue Liu
3DPC
117
294
0
19 Sep 2018
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural
  Networks against Adversarial Malware Samples
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples
Deqiang Li
Ramesh Baral
Tao Li
Han Wang
Qianmu Li
Shouhuai Xu
AAML
63
21
0
18 Sep 2018
Scattering Networks for Hybrid Representation Learning
Scattering Networks for Hybrid Representation Learning
Edouard Oyallon
Sergey Zagoruyko
Gabriel Huang
N. Komodakis
Simon Lacoste-Julien
Matthew Blaschko
Eugene Belilovsky
66
86
0
17 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors
  via Imperceptible Background Patches
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAMLObjD
78
31
0
16 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
72
107
0
16 Sep 2018
GANs for Medical Image Analysis
GANs for Medical Image Analysis
Salome Kazeminia
Christoph Baur
Arjan Kuijper
Bram van Ginneken
Nassir Navab
Shadi Albarqouni
Anirban Mukhopadhyay
MedImAI4CE
88
415
0
13 Sep 2018
Defensive Dropout for Hardening Deep Neural Networks under Adversarial
  Attacks
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks
Siyue Wang
Tianlin Li
Pu Zhao
Wujie Wen
David Kaeli
S. Chin
Xinyu Lin
AAML
76
70
0
13 Sep 2018
Query-Efficient Black-Box Attack by Active Learning
Query-Efficient Black-Box Attack by Active Learning
Pengcheng Li
Jinfeng Yi
Lijun Zhang
AAMLMLAU
73
55
0
13 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
68
235
0
13 Sep 2018
A Less Biased Evaluation of Out-of-distribution Sample Detectors
A Less Biased Evaluation of Out-of-distribution Sample Detectors
Alireza Shafaei
Mark Schmidt
James J. Little
OODD
129
58
0
13 Sep 2018
Layerwise Perturbation-Based Adversarial Training for Hard Drive Health
  Degree Prediction
Layerwise Perturbation-Based Adversarial Training for Hard Drive Health Degree Prediction
Jianguo Zhang
Ji Wang
Lifang He
Zhao Li
Philip S. Yu
74
31
0
11 Sep 2018
Humans can decipher adversarial images
Humans can decipher adversarial images
Zhenglong Zhou
C. Firestone
AAML
68
122
0
11 Sep 2018
Detecting egregious responses in neural sequence-to-sequence models
Detecting egregious responses in neural sequence-to-sequence models
Tianxing He
James R. Glass
AAML
63
22
0
11 Sep 2018
On the Structural Sensitivity of Deep Convolutional Networks to the
  Directions of Fourier Basis Functions
On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions
Yusuke Tsuzuku
Issei Sato
AAML
84
62
0
11 Sep 2018
Isolated and Ensemble Audio Preprocessing Methods for Detecting
  Adversarial Examples against Automatic Speech Recognition
Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition
K. Rajaratnam
Kunal Shah
Jugal Kalita
AAML
63
37
0
11 Sep 2018
Certified Adversarial Robustness with Additive Noise
Certified Adversarial Robustness with Additive Noise
Bai Li
Changyou Chen
Wenlin Wang
Lawrence Carin
AAML
119
350
0
10 Sep 2018
The Curse of Concentration in Robust Learning: Evasion and Poisoning
  Attacks from Concentration of Measure
The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure
Saeed Mahloujifar
Dimitrios I. Diochnos
Mohammad Mahmoody
85
152
0
09 Sep 2018
Training for Faster Adversarial Robustness Verification via Inducing
  ReLU Stability
Training for Faster Adversarial Robustness Verification via Inducing ReLU Stability
Kai Y. Xiao
Vincent Tjeng
Nur Muhammad (Mahi) Shafiullah
Aleksander Madry
AAMLOOD
74
202
0
09 Sep 2018
Why Do Adversarial Attacks Transfer? Explaining Transferability of
  Evasion and Poisoning Attacks
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
SILMAAML
71
11
0
08 Sep 2018
Interpreting Neural Networks With Nearest Neighbors
Interpreting Neural Networks With Nearest Neighbors
Eric Wallace
Shi Feng
Jordan L. Boyd-Graber
AAMLFAttMILM
140
54
0
08 Sep 2018
Structure-Preserving Transformation: Generating Diverse and Transferable
  Adversarial Examples
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples
Dan Peng
Zizhan Zheng
Xiaofeng Zhang
AAML
57
5
0
08 Sep 2018
Query Attack via Opposite-Direction Feature:Towards Robust Image
  Retrieval
Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval
Zhedong Zheng
Liang Zheng
Yi Yang
Zhilan Hu
AAML
75
24
0
07 Sep 2018
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
Daniel Genkin
Mihir Pattani
R. Schuster
Eran Tromer
40
60
0
07 Sep 2018
A Deeper Look at 3D Shape Classifiers
A Deeper Look at 3D Shape Classifiers
Jong-Chyi Su
Matheus Gadelha
Rui Wang
Subhransu Maji
3DPC3DV
77
103
0
07 Sep 2018
MixUp as Locally Linear Out-Of-Manifold Regularization
MixUp as Locally Linear Out-Of-Manifold Regularization
Hongyu Guo
Yongyi Mao
Richong Zhang
88
325
0
07 Sep 2018
Metamorphic Relation Based Adversarial Attacks on Differentiable Neural
  Computer
Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Alvin Chan
Lei Ma
Felix Juefei Xu
Xiaofei Xie
Yang Liu
Yew-Soon Ong
OODAAML
59
17
0
07 Sep 2018
Deep Learning for Generic Object Detection: A Survey
Deep Learning for Generic Object Detection: A Survey
Li Liu
Wanli Ouyang
Xiaogang Wang
Paul Fieguth
Jie Chen
Xinwang Liu
M. Pietikäinen
ObjDVLMOOD
240
2,469
0
06 Sep 2018
Are adversarial examples inevitable?
Are adversarial examples inevitable?
Ali Shafahi
Wenjie Huang
Christoph Studer
Soheil Feizi
Tom Goldstein
SILM
88
283
0
06 Sep 2018
Adversarial Over-Sensitivity and Over-Stability Strategies for Dialogue
  Models
Adversarial Over-Sensitivity and Over-Stability Strategies for Dialogue Models
Tong Niu
Joey Tianyi Zhou
AAML
93
85
0
06 Sep 2018
Adversarial Reprogramming of Text Classification Neural Networks
Adversarial Reprogramming of Text Classification Neural Networks
Paarth Neekhara
Shehzeen Samarah Hussain
Shlomo Dubnov
F. Koushanfar
AAMLSILM
98
9
0
06 Sep 2018
Bridging machine learning and cryptography in defence against
  adversarial attacks
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Svyatoslav Voloshynovskiy
AAML
57
22
0
05 Sep 2018
DeepHunter: Hunting Deep Neural Network Defects via Coverage-Guided
  Fuzzing
DeepHunter: Hunting Deep Neural Network Defects via Coverage-Guided Fuzzing
Xiaofei Xie
Lei Ma
Felix Juefei Xu
Hongxu Chen
Minhui Xue
Yue Liu
Yang Liu
Jianjun Zhao
Jianxiong Yin
Simon See
116
41
0
04 Sep 2018
Previous
123...153154155...166167168
Next