ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,356 papers shown
Title
Adversarial Attacks on Node Embeddings via Graph Poisoning
Adversarial Attacks on Node Embeddings via Graph Poisoning
Aleksandar Bojchevski
Stephan Günnemann
AAML
89
307
0
04 Sep 2018
Geometric Operator Convolutional Neural Network
Geometric Operator Convolutional Neural Network
Yangling Ma
Yixin Luo
Zhouwang Yang
26
4
0
04 Sep 2018
Lipschitz Networks and Distributional Robustness
Lipschitz Networks and Distributional Robustness
Zac Cranko
Simon Kornblith
Zhan Shi
Richard Nock
OOD
63
11
0
04 Sep 2018
A3Net: Adversarial-and-Attention Network for Machine Reading
  Comprehension
A3Net: Adversarial-and-Attention Network for Machine Reading Comprehension
Jiuniu Wang
Xingyu Fu
Guangluan Xu
Yirong Wu
Ziyan Chen
Yang Wei
Li Jin
AIMat
42
2
0
03 Sep 2018
Data Augmentation for Neural Online Chat Response Selection
Data Augmentation for Neural Online Chat Response Selection
Wenchao Du
A. Black
58
15
0
03 Sep 2018
MULDEF: Multi-model-based Defense Against Adversarial Examples for
  Neural Networks
MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks
Siwakorn Srisakaokul
Yuhao Zhang
Zexuan Zhong
Wei Yang
Tao Xie
Bo Li
AAML
87
19
0
31 Aug 2018
Backdoor Embedding in Convolutional Neural Network Models via Invisible
  Perturbation
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
C. Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
SILM
100
319
0
30 Aug 2018
Lipschitz regularized Deep Neural Networks generalize and are
  adversarially robust
Lipschitz regularized Deep Neural Networks generalize and are adversarially robust
Chris Finlay
Jeff Calder
Bilal Abbasi
Adam M. Oberman
95
55
0
28 Aug 2018
Comparing Attention-based Convolutional and Recurrent Neural Networks:
  Success and Limitations in Machine Reading Comprehension
Comparing Attention-based Convolutional and Recurrent Neural Networks: Success and Limitations in Machine Reading Comprehension
Matthias Blohm
Glorianna Jagfeld
Ekta Sood
Xiang Yu
Ngoc Thang Vu
75
54
0
27 Aug 2018
Generalized Capsule Networks with Trainable Routing Procedure
Generalized Capsule Networks with Trainable Routing Procedure
Zhenhua Chen
David J. Crandall
3DPCMedIm
65
31
0
27 Aug 2018
Adversarially Regularising Neural NLI Models to Integrate Logical
  Background Knowledge
Adversarially Regularising Neural NLI Models to Integrate Logical Background Knowledge
Pasquale Minervini
Sebastian Riedel
AAMLNAIGAN
74
119
0
26 Aug 2018
Guiding Deep Learning System Testing using Surprise Adequacy
Guiding Deep Learning System Testing using Surprise Adequacy
Jinhan Kim
R. Feldt
S. Yoo
AAMLELM
76
433
0
25 Aug 2018
Analysis of adversarial attacks against CNN-based image forgery
  detectors
Analysis of adversarial attacks against CNN-based image forgery detectors
Diego Gragnaniello
Francesco Marra
Giovanni Poggi
L. Verdoliva
AAML
44
31
0
25 Aug 2018
Maximal Jacobian-based Saliency Map Attack
Maximal Jacobian-based Saliency Map Attack
R. Wiyatno
Anqi Xu
AAML
42
88
0
23 Aug 2018
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Meysam Sadeghi
Erik G. Larsson
AAML
58
261
0
23 Aug 2018
Adversarial training for multi-context joint entity and relation
  extraction
Adversarial training for multi-context joint entity and relation extraction
Giannis Bekoulis
Johannes Deleu
T. Demeester
Chris Develder
GAN
93
177
0
21 Aug 2018
Are You Tampering With My Data?
Are You Tampering With My Data?
Michele Alberti
Vinaychandran Pondenkandath
Marcel Würsch
Manuel Bouillon
Mathias Seuret
Rolf Ingold
Marcus Liwicki
AAML
112
19
0
21 Aug 2018
zoNNscan : a boundary-entropy index for zone inspection of neural models
zoNNscan : a boundary-entropy index for zone inspection of neural models
Adel Jaouen
Erwan Le Merrer
UQCV
62
3
0
21 Aug 2018
Controlling Over-generalization and its Effect on Adversarial Examples
  Generation and Detection
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
74
9
0
21 Aug 2018
Out-of-Distribution Detection using Multiple Semantic Label
  Representations
Out-of-Distribution Detection using Multiple Semantic Label Representations
Gabi Shalev
Yossi Adi
Joseph Keshet
OODD
94
85
0
20 Aug 2018
Tangent-Normal Adversarial Regularization for Semi-supervised Learning
Tangent-Normal Adversarial Regularization for Semi-supervised Learning
Ting Yu
Jingfeng Wu
Jinwen Ma
Zhanxing Zhu
58
35
0
18 Aug 2018
Reinforcement Learning for Autonomous Defence in Software-Defined
  Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Yi Han
Benjamin I. P. Rubinstein
Tamas Abraham
T. Alpcan
O. Vel
S. Erfani
David Hubczenko
C. Leckie
Paul Montague
AAML
55
69
0
17 Aug 2018
Data Poisoning Attacks in Contextual Bandits
Data Poisoning Attacks in Contextual Bandits
Yuzhe Ma
Kwang-Sung Jun
Lihong Li
Xiaojin Zhu
AAML
85
68
0
17 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
44
1
0
16 Aug 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
89
291
0
16 Aug 2018
Distributionally Adversarial Attack
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
101
123
0
16 Aug 2018
Adversarial Personalized Ranking for Recommendation
Adversarial Personalized Ranking for Recommendation
Xiangnan He
Zhankui He
Xiaoyu Du
Tat-Seng Chua
116
398
0
12 Aug 2018
Ensemble Kalman Inversion: A Derivative-Free Technique For Machine
  Learning Tasks
Ensemble Kalman Inversion: A Derivative-Free Technique For Machine Learning Tasks
Nikola B. Kovachki
Andrew M. Stuart
BDL
109
139
0
10 Aug 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
80
248
0
10 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
84
13
0
08 Aug 2018
Grassmannian Learning: Embedding Geometry Awareness in Shallow and Deep
  Learning
Grassmannian Learning: Embedding Geometry Awareness in Shallow and Deep Learning
Jiayao Zhang
Guangxu Zhu
R. Heath
Kaibin Huang
76
43
0
07 Aug 2018
Adversarial Vision Challenge
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
79
58
0
06 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
69
24
0
06 Aug 2018
Gray-box Adversarial Training
Gray-box Adversarial Training
S. VivekB.
Konda Reddy Mopuri
R. Venkatesh Babu
AAML
57
35
0
06 Aug 2018
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the
  Robustness of 18 Deep Image Classification Models
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D. Su
Huan Zhang
Hongge Chen
Jinfeng Yi
Pin-Yu Chen
Yupeng Gao
VLM
140
393
0
05 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better
  Interpretability
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
126
162
0
05 Aug 2018
A Review of Learning with Deep Generative Models from Perspective of
  Graphical Modeling
A Review of Learning with Deep Generative Models from Perspective of Graphical Modeling
Zhijian Ou
110
16
0
05 Aug 2018
Using Machine Learning Safely in Automotive Software: An Assessment and
  Adaption of Software Process Requirements in ISO 26262
Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262
Rick Salay
Krzysztof Czarnecki
104
70
0
05 Aug 2018
LISA: Explaining Recurrent Neural Network Judgments via Layer-wIse
  Semantic Accumulation and Example to Pattern Transformation
LISA: Explaining Recurrent Neural Network Judgments via Layer-wIse Semantic Accumulation and Example to Pattern Transformation
Pankaj Gupta
Hinrich Schütze
71
16
0
05 Aug 2018
ATMPA: Attacking Machine Learning-based Malware Visualization Detection
  Methods via Adversarial Examples
ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples
Xinbo Liu
Jiliang Zhang
Yaping Lin
He Li
AAML
57
56
0
05 Aug 2018
Teacher Guided Architecture Search
Teacher Guided Architecture Search
P. Bashivan
Mark Tensen
J. DiCarlo
3DV
85
27
0
04 Aug 2018
Generalization Error in Deep Learning
Generalization Error in Deep Learning
Daniel Jakubovitz
Raja Giryes
M. Rodrigues
AI4CE
241
111
0
03 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class
  Impressions
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
86
85
0
03 Aug 2018
Generative Adversarial Frontal View to Bird View Synthesis
Generative Adversarial Frontal View to Bird View Synthesis
Xinge Zhu
Zhichao Yin
Jianping Shi
Hongsheng Li
Dahua Lin
GAN
73
54
0
01 Aug 2018
Techniques for Interpretable Machine Learning
Techniques for Interpretable Machine Learning
Mengnan Du
Ninghao Liu
Helen Zhou
FaML
101
1,097
0
31 Jul 2018
Analyzing Human-Human Interactions: A Survey
Analyzing Human-Human Interactions: A Survey
Alexandros Stergiou
R. Poppe
69
14
0
31 Jul 2018
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILMMIACV
147
79
0
31 Jul 2018
HybridNet: Classification and Reconstruction Cooperation for
  Semi-Supervised Learning
HybridNet: Classification and Reconstruction Cooperation for Semi-Supervised Learning
Thomas Robert
Nicolas Thome
Matthieu Cord
124
39
0
30 Jul 2018
Symbolic Execution for Deep Neural Networks
Symbolic Execution for Deep Neural Networks
D. Gopinath
Kaiyuan Wang
Mengshi Zhang
C. Păsăreanu
S. Khurshid
AAML
81
54
0
27 Jul 2018
HiDDeN: Hiding Data With Deep Networks
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
79
759
0
26 Jul 2018
Previous
123...154155156...166167168
Next