Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1412.6572
Cited By
v1
v2
v3 (latest)
Explaining and Harnessing Adversarial Examples
20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Explaining and Harnessing Adversarial Examples"
50 / 8,334 papers shown
Title
Ignition Phase : Standard Training for Fast Adversarial Robustness
Wang Yu-Hang
Liu ying
Fang liang
Wang Xuelin
Junkang Guo
Shiwei Li
Lei Gao
Jian Liu
Wenfei Yin
AAML
12
0
0
25 May 2025
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation
Peiran Sun
AAML
24
0
0
25 May 2025
RADEP: A Resilient Adaptive Defense Framework Against Model Extraction Attacks
Amit Chakraborty
Sayyed Farid Ahamed
Sandip Roy
S. Banerjee
Kevin Choi
A. Rahman
Alison Hu
Edward Bowen
Sachin Shetty
AAML
55
0
0
25 May 2025
LORE: Lagrangian-Optimized Robust Embeddings for Visual Encoders
Borna Khodabandeh
Amirabbas Afzali
Amirhossein Afsharrad
Seyed Shahabeddin Mousavi
Sanjay Lall
Sajjad Amini
Seyed-Mohsen Moosavi-Dezfooli
AAML
36
0
0
24 May 2025
Adversarial Robustness of Nonparametric Regression
Parsa Moradi
Hanzaleh Akabrinodehi
M. Maddah-ali
AAML
76
0
0
23 May 2025
Ownership Verification of DNN Models Using White-Box Adversarial Attacks with Specified Probability Manipulation
Teruki Sano
Minoru Kuribayashi
Masao Sakai
Shuji Ishobe
Eisuke Koizumi
AAML
24
0
0
23 May 2025
Towards more transferable adversarial attack in black-box manner
Chun Tong Lei
Zhongliang Guo
Hon Chung Lee
Minh Quoc Duong
Chun Pong Lau
DiffM
AAML
513
0
0
23 May 2025
Understanding Pre-training and Fine-tuning from Loss Landscape Perspectives
Huanran Chen
Yinpeng Dong
Zeming Wei
Yao Huang
Yichi Zhang
Hang Su
Jun Zhu
MoMe
92
1
0
23 May 2025
CAMME: Adaptive Deepfake Image Detection with Multi-Modal Cross-Attention
Naseem Khan
Tuan Nguyen
Amine Bermak
Issa Khalil
280
0
0
23 May 2025
Temporal Consistency Constrained Transferable Adversarial Attacks with Background Mixup for Action Recognition
Ping Li
Jianan Ni
Bo Pang
AAML
250
0
0
23 May 2025
Out of the Shadows: Exploring a Latent Space for Neural Network Verification
Lukas Koller
Tobias Ladner
Matthias Althoff
64
0
0
23 May 2025
Accelerating Targeted Hard-Label Adversarial Attacks in Low-Query Black-Box Settings
Arjhun Swaminathan
Mete Akgün
AAML
40
0
0
22 May 2025
TRAIL: Transferable Robust Adversarial Images via Latent diffusion
Yuhao Xue
Zhifei Zhang
Xinyang Jiang
Yifei Shen
Junyao Gao
Wentao Gu
Jiale Zhao
Miaojing Shi
Cairong Zhao
AAML
67
0
0
22 May 2025
MixAT: Combining Continuous and Discrete Adversarial Training for LLMs
Csaba Dékány
Stefan Balauca
Robin Staab
Dimitar I. Dimitrov
Martin Vechev
AAML
55
0
0
22 May 2025
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models
Hossein Khalili
Seongbin Park
Venkat Bollapragada
Nader Sehatbakhsh
AAML
220
0
0
22 May 2025
Enhancing Federated Survival Analysis through Peer-Driven Client Reputation in Healthcare
Navid Seidi
Satyaki Roy
Sajal Das
FedML
81
0
0
22 May 2025
Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization
Chengcan Wu
Zhixin Zhang
Zeming Wei
Yihao Zhang
Meng Sun
AAML
59
1
0
22 May 2025
Enhancing Certified Robustness via Block Reflector Orthogonal Layers and Logit Annealing Loss
Bo-Han Lai
Pin-Han Huang
Bo-Han Kung
Shang-Tse Chen
70
0
0
21 May 2025
GAMA++: Disentangled Geometric Alignment with Adaptive Contrastive Perturbation for Reliable Domain Transfer
Kim Yun
Hana Satou
F Monkey
68
0
0
21 May 2025
Geometrically Regularized Transfer Learning with On-Manifold and Off-Manifold Perturbation
Hana Satou
Alan Mitkiy
F Monkey
AAML
59
0
0
21 May 2025
GAMA: Geometry-Aware Manifold Alignment via Structured Adversarial Perturbations for Robust Domain Adaptation
Hana Satou
F Monkey
70
0
0
21 May 2025
My Face Is Mine, Not Yours: Facial Protection Against Diffusion Model Face Swapping
Hon Ming Yam
Zhongliang Guo
Chun Pong Lau
DiffM
AAML
60
0
0
21 May 2025
Beyond Classification: Evaluating Diffusion Denoised Smoothing for Security-Utility Trade off
Yury Belousov
Brian Pulfer
Vitaliy Kinakh
Slava Voloshynovskiy
DiffM
48
0
0
21 May 2025
Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval
Taiye Chen
Zeming Wei
Ang Li
Yisen Wang
AAML
63
2
0
21 May 2025
Byte Pair Encoding for Efficient Time Series Forecasting
Leon Götz
Marcel Kollovieh
Stephan Günnemann
Leo Schwinn
AI4TS
90
1
0
20 May 2025
Safety2Drive: Safety-Critical Scenario Benchmark for the Evaluation of Autonomous Driving
Jingzheng Li
Tiancheng Wang
Xingyu Peng
Jiasi Chen
Zhijun Chen
Bing Li
Xianglong Liu
ELM
78
0
0
20 May 2025
Anomaly Detection Based on Critical Paths for Deep Neural Networks
Fangzhen Zhao
Chenyi Zhang
Naipeng Dong
Ming Li
Jinxiao Shan
AAML
34
0
0
20 May 2025
Self Distillation via Iterative Constructive Perturbations
Maheak Dave
Aniket K. Singh
Aryan Pareek
Harshita Jha
Debasis Chaudhuri
Manish P. Singh
ODL
52
0
0
20 May 2025
Adversarially Pretrained Transformers may be Universally Robust In-Context Learners
Soichiro Kumano
Hiroshi Kera
Toshihiko Yamasaki
AAML
127
0
0
20 May 2025
Explaining Neural Networks with Reasons
Levin Hornischer
Hannes Leitgeb
FAtt
AAML
MILM
103
0
0
20 May 2025
AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models
Guangke Chen
Fu Song
Zhe Zhao
Xiaojun Jia
Yang Liu
Yanchen Qiao
Weizhe Zhang
AuLLM
AAML
113
1
0
20 May 2025
Symmetry-Breaking Descent for Invariant Cost Functionals
Mikhail Osipov
64
0
0
19 May 2025
Two out of Three (ToT): using self-consistency to make robust predictions
Jung Hoon Lee
Sujith Vijayan
OOD
64
0
0
19 May 2025
FlowPure: Continuous Normalizing Flows for Adversarial Purification
Elias Collaert
Abel Rodríguez
Sander Joos
Lieven Desmet
Vera Rimmer
AAML
67
0
0
19 May 2025
Safety Alignment Can Be Not Superficial With Explicit Safety Signals
Jianwei Li
Jung-Eng Kim
AAML
187
1
0
19 May 2025
Causality-Inspired Robustness for Nonlinear Models via Representation Learning
Marin Šola
Peter Bühlmann
Xinwei Shen
OOD
91
0
0
19 May 2025
Use as Many Surrogates as You Want: Selective Ensemble Attack to Unleash Transferability without Sacrificing Resource Efficiency
Bo Yang
Hengwei Zhang
Jindong Wang
Yuchen Ren
Chenhao Lin
Chao Shen
Zhengyu Zhao
AAML
95
0
0
19 May 2025
On the Mechanisms of Adversarial Data Augmentation for Robust and Adaptive Transfer Learning
Hana Satou
Alan Mitkiy
AAML
83
0
0
19 May 2025
Spiking Neural Network: a low power solution for physical layer authentication
Jung Hoon Lee
Sujith Vijayan
68
0
0
19 May 2025
Beyond Single-Point Judgment: Distribution Alignment for LLM-as-a-Judge
Luyu Chen
Zeyu Zhang
Haoran Tan
Quanyu Dai
Hao-ran Yang
Zhenhua Dong
Xu Chen
52
0
0
18 May 2025
Adversarial Robustness for Unified Multi-Modal Encoders via Efficient Calibration
Chih-Ting Liao
Bin Ren
Guofeng Mei
Xu Zheng
AAML
68
0
0
17 May 2025
Black-box Adversaries from Latent Space: Unnoticeable Attacks on Human Pose and Shape Estimation
Zhiying Li
Guanggang Geng
Yeying Jin
Zhizhi Guo
Bruce Gu
Jidong Huo
Zhaoxin Fan
Wenjun Wu
AAML
68
0
0
17 May 2025
Adversarially Robust Spiking Neural Networks with Sparse Connectivity
Mathias Schmolli
Maximilian Baronig
Robert Legenstein
Ozan Özdenizci
AAML
45
0
0
16 May 2025
On the Security Risks of ML-based Malware Detection Systems: A Survey
Ping He
Yuhao Mao
Changjiang Li
Lorenzo Cavallaro
Ting Wang
Shouling Ji
94
0
0
16 May 2025
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Md Farhan Tasnim Oshim
Nigel Doering
Bashima Islam
Tsui-Wei Weng
Tauhidur Rahman
43
0
0
16 May 2025
Revisiting Adversarial Perception Attacks and Defense Methods on Autonomous Driving Systems
Cheng Chen
Yuhong Wang
Nafis S Munir
Xiangwei Zhou
Xugui Zhou
AAML
80
0
0
14 May 2025
Where the Devil Hides: Deepfake Detectors Can No Longer Be Trusted
Shuaiwei Yuan
Junyu Dong
Yuezun Li
AAML
113
0
0
13 May 2025
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Wei-Long Tian
Peng Gao
Xiao Liu
Long Xu
Hamido Fujita
Hanan Aljuai
Mao-Li Wang
AAML
57
0
0
13 May 2025
Robustness Analysis against Adversarial Patch Attacks in Fully Unmanned Stores
Hyunsik Na
Wonho Lee
Seungdeok Roh
Sohee Park
Daeseon Choi
AAML
42
0
0
13 May 2025
DArFace: Deformation Aware Robustness for Low Quality Face Recognition
Sadaf Gulshad
Abdullah Aldahlawi Thakaa
CVBM
105
0
0
13 May 2025
Previous
1
2
3
4
5
6
...
165
166
167
Next