ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,385 papers shown
Title
TPatch: A Triggered Physical Adversarial Patch
TPatch: A Triggered Physical Adversarial Patch
Wenjun Zhu
Xiaoyu Ji
Yushi Cheng
Shibo Zhang
Wei Dong
AAML
113
27
0
30 Dec 2023
AIJack: Let's Hijack AI! Security and Privacy Risk Simulator for Machine
  Learning
AIJack: Let's Hijack AI! Security and Privacy Risk Simulator for Machine Learning
Hideaki Takahashi
SILM
84
2
0
29 Dec 2023
Towards Faithful Explanations for Text Classification with Robustness
  Improvement and Explanation Guided Training
Towards Faithful Explanations for Text Classification with Robustness Improvement and Explanation Guided Training
Dongfang Li
Baotian Hu
Qingcai Chen
Shan He
78
6
0
29 Dec 2023
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object
  Detectors in the Physical World
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World
Zheng Zhou
Hong Zhao
Ju Liu
Qiaosheng Zhang
Liwei Geng
Shuchang Lyu
W. Feng
AAML
87
2
0
29 Dec 2023
Can you See me? On the Visibility of NOPs against Android Malware
  Detectors
Can you See me? On the Visibility of NOPs against Android Malware Detectors
Diego Soi
Davide Maiorca
Giorgio Giacinto
Harel Berger
AAML
41
0
0
28 Dec 2023
Explainability-Based Adversarial Attack on Graphs Through Edge
  Perturbation
Explainability-Based Adversarial Attack on Graphs Through Edge Perturbation
Dibaloke Chanda
Saba Heidari Gheshlaghi
Nasim Yahya Soltani
AAML
64
1
0
28 Dec 2023
Attack Tree Analysis for Adversarial Evasion Attacks
Attack Tree Analysis for Adversarial Evasion Attacks
Yuki Yamaguchi
Toshiaki Aoki
AAML
92
0
0
28 Dec 2023
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches
  Generation
DOEPatch: Dynamically Optimized Ensemble Model for Adversarial Patches Generation
Wenyi Tan
Yang Li
Chenxing Zhao
Zhunga Liu
Quanbiao Pan
AAML
103
3
0
28 Dec 2023
Adversarial Attacks on Image Classification Models: Analysis and Defense
Adversarial Attacks on Image Classification Models: Analysis and Defense
Jaydip Sen
Abhiraj Sen
Ananda Chatterjee
AAML
56
4
0
28 Dec 2023
Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer
  Level Attack and Knowledge Distillation
Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation
Hyunjune Kim
Sangyong Lee
Simon S. Woo
AAMLMU
56
8
0
28 Dec 2023
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
BlackboxBench: A Comprehensive Benchmark of Black-box Adversarial Attacks
Meixi Zheng
Xuanchen Yan
Zihao Zhu
Hongrui Chen
Baoyuan Wu
ELMMLAUAAML
101
8
0
28 Dec 2023
Adversarial Attacks on LoRa Device Identification and Rogue Signal
  Detection with Deep Learning
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning
Y. Sagduyu
T. Erpek
48
3
0
27 Dec 2023
Natural Adversarial Patch Generation Method Based on Latent Diffusion
  Model
Natural Adversarial Patch Generation Method Based on Latent Diffusion Model
Xianyi Chen
Fazhan Liu
Dong Jiang
Kai Yan
AAMLDiffM
57
1
0
27 Dec 2023
Robustness Verification for Knowledge-Based Logic of Risky Driving
  Scenes
Robustness Verification for Knowledge-Based Logic of Risky Driving Scenes
Xia Wang
Anda Liang
Jonathan Sprinkle
Taylor T. Johnson
63
4
0
27 Dec 2023
Robust Survival Analysis with Adversarial Regularization
Robust Survival Analysis with Adversarial Regularization
Owen Howell
Stefano Maxenti
Michael Everett
AAML
101
0
0
26 Dec 2023
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network
  Ownership Verification
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Huali Ren
Anli Yan
Xiaojun Ren
Peigen Ye
Chong-zhi Gao
Zhili Zhou
Jin Li
80
1
0
25 Dec 2023
Pre-trained Trojan Attacks for Visual Recognition
Pre-trained Trojan Attacks for Visual Recognition
Aishan Liu
Xinwei Zhang
Yisong Xiao
Yuguang Zhou
Siyuan Liang
Jiakai Wang
Xianglong Liu
Xiaochun Cao
Dacheng Tao
AAML
121
30
0
23 Dec 2023
HyperMix: Out-of-Distribution Detection and Classification in Few-Shot
  Settings
HyperMix: Out-of-Distribution Detection and Classification in Few-Shot Settings
Nikhil Mehta
Kevin J. Liang
Jing Huang
Fu-Jen Chu
Li Yin
Tal Hassner
OODD
90
2
0
22 Dec 2023
How Smooth Is Attention?
How Smooth Is Attention?
Valérie Castin
Pierre Ablin
Gabriel Peyré
AAML
117
11
0
22 Dec 2023
AdvCloak: Customized Adversarial Cloak for Privacy Protection
AdvCloak: Customized Adversarial Cloak for Privacy Protection
Xuannan Liu
Yaoyao Zhong
Xingchen Cui
Yuhang Zhang
Peipei Li
Weihong Deng
PICV
60
2
0
22 Dec 2023
Elevating Defenses: Bridging Adversarial Training and Watermarking for
  Model Resilience
Elevating Defenses: Bridging Adversarial Training and Watermarking for Model Resilience
Janvi Thakkar
Giulio Zizzo
S. Maffeis
AAML
44
1
0
21 Dec 2023
AutoAugment Input Transformation for Highly Transferable Targeted
  Attacks
AutoAugment Input Transformation for Highly Transferable Targeted Attacks
Haobo Lu
Xin Liu
Kun He
AAML
69
0
0
21 Dec 2023
MFABA: A More Faithful and Accelerated Boundary-based Attribution Method
  for Deep Neural Networks
MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks
Zhiyu Zhu
Huaming Chen
Jiayu Zhang
Xinyi Wang
Zhibo Jin
Minhui Xue
Dongxiao Zhu
Kim-Kwang Raymond Choo
FAtt
70
11
0
21 Dec 2023
Where and How to Attack? A Causality-Inspired Recipe for Generating
  Counterfactual Adversarial Examples
Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual Adversarial Examples
Ruichu Cai
Yuxuan Zhu
Jie Qiao
Zefeng Liang
Furui Liu
Zhifeng Hao
CML
108
5
0
21 Dec 2023
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural
  Networks
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural Networks
Peng Zhao
Jiehua Zhang
Bowen Peng
Longguang Wang
Yingmei Wei
Yu Liu
Li Liu
AAML
86
0
0
21 Dec 2023
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized
  Surrogate
LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate
Tao Wu
Tie Luo
D. C. Wunsch
99
6
0
20 Dec 2023
PGN: A perturbation generation network against deep reinforcement
  learning
PGN: A perturbation generation network against deep reinforcement learning
Xiangjuan Li
Feifan Li
Yang Li
Quanbiao Pan
AAML
60
2
0
20 Dec 2023
RadEdit: stress-testing biomedical vision models via diffusion image
  editing
RadEdit: stress-testing biomedical vision models via diffusion image editing
Fernando Pérez-García
Sam Bond-Taylor
Pedro P. Sanchez
B. V. Breugel
Daniel Coelho De Castro
...
M. Lungren
A. Nori
Javier Alvarez-Valle
Ozan Oktay
Maximilian Ilse
MedIm
135
11
0
20 Dec 2023
Mutual-modality Adversarial Attack with Semantic Perturbation
Mutual-modality Adversarial Attack with Semantic Perturbation
Jingwen Ye
Ruonan Yu
Songhua Liu
Xinchao Wang
AAML
103
10
0
20 Dec 2023
Towards Efficient Verification of Quantized Neural Networks
Towards Efficient Verification of Quantized Neural Networks
Pei Huang
Haoze Wu
Yuting Yang
Ieva Daukantas
Min Wu
Yedi Zhang
Clark W. Barrett
MQ
86
12
0
20 Dec 2023
Generator Assisted Mixture of Experts For Feature Acquisition in Batch
Generator Assisted Mixture of Experts For Feature Acquisition in Batch
Vedang Asgaonkar
Aditya Jain
Abir De
46
1
0
19 Dec 2023
Adversarial AutoMixup
Adversarial AutoMixup
Huafeng Qin
Xin Jin
Yun Jiang
M. El-Yacoubi
Xinbo Gao
AAML
124
12
0
19 Dec 2023
Layerwise complexity-matched learning yields an improved model of
  cortical area V2
Layerwise complexity-matched learning yields an improved model of cortical area V2
Nikhil Parthasarathy
Olivier J. Hénaff
Eero P. Simoncelli
90
1
0
18 Dec 2023
The Ultimate Combo: Boosting Adversarial Example Transferability by
  Composing Data Augmentations
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations
Zebin Yun
Achi-Or Weingarten
Eyal Ronen
Mahmood Sharif
71
2
0
18 Dec 2023
Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent
  Diffusion Model
Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model
Decheng Liu
Xijun Wang
Chunlei Peng
Nannan Wang
Ruimin Hu
Xinbo Gao
DiffMAAML
51
17
0
18 Dec 2023
Compositional Generalization for Multi-label Text Classification: A
  Data-Augmentation Approach
Compositional Generalization for Multi-label Text Classification: A Data-Augmentation Approach
Xiangyu Chu
Zhuang Li
Jiahui Liu
Lei Chen
Yuanpei Cai
Donghong Ji
K. W. S. Au
117
12
0
18 Dec 2023
The Pros and Cons of Adversarial Robustness
The Pros and Cons of Adversarial Robustness
Yacine Izza
Sasha Rubin
AAML
52
1
0
18 Dec 2023
Robust Node Representation Learning via Graph Variational Diffusion
  Networks
Robust Node Representation Learning via Graph Variational Diffusion Networks
Jun Zhuang
M. A. Hasan
71
7
0
18 Dec 2023
UltraClean: A Simple Framework to Train Robust Neural Networks against
  Backdoor Attacks
UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks
Bingyin Zhao
Yingjie Lao
AAML
74
1
0
17 Dec 2023
Anomaly Score: Evaluating Generative Models and Individual Generated
  Images based on Complexity and Vulnerability
Anomaly Score: Evaluating Generative Models and Individual Generated Images based on Complexity and Vulnerability
Ian Ryu
Junghyuk Lee
Jong-Seok Lee
EGVM
106
2
0
17 Dec 2023
Rethinking Robustness of Model Attributions
Rethinking Robustness of Model Attributions
Sandesh Kamath
Sankalp Mittal
Amit Deshpande
Vineeth N. Balasubramanian
87
2
0
16 Dec 2023
Robust Communicative Multi-Agent Reinforcement Learning with Active
  Defense
Robust Communicative Multi-Agent Reinforcement Learning with Active Defense
Lebin Yu
Yunbo Qiu
Quanming Yao
Yuan Shen
Xudong Zhang
Jian Wang
AAML
47
3
0
16 Dec 2023
Perturbation-Invariant Adversarial Training for Neural Ranking Models:
  Improving the Effectiveness-Robustness Trade-Off
Perturbation-Invariant Adversarial Training for Neural Ranking Models: Improving the Effectiveness-Robustness Trade-Off
Yuansan Liu
Ruqing Zhang
Mingkun Zhang
Wei Chen
Maarten de Rijke
Jiafeng Guo
Xueqi Cheng
AAML
63
10
0
16 Dec 2023
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style
  Transfer
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Yuxin Cao
Ziyu Zhao
Xi Xiao
Derui Wang
Minhui Xue
Jin Lu
AAML
95
4
0
15 Dec 2023
Fragility, Robustness and Antifragility in Deep Learning
Fragility, Robustness and Antifragility in Deep Learning
Chandresh Pravin
Ivan Martino
Giuseppe Nicosia
Varun Ojha
83
0
0
15 Dec 2023
Towards Transferable Targeted 3D Adversarial Attack in the Physical
  World
Towards Transferable Targeted 3D Adversarial Attack in the Physical World
Yao Huang
Yinpeng Dong
Shouwei Ruan
Xiao Yang
Hang Su
Xingxing Wei
DiffM
87
18
0
15 Dec 2023
Adversarial Robustness on Image Classification with $k$-means
Adversarial Robustness on Image Classification with kkk-means
Rollin Omari
Junae Kim
Paul Montague
OODVLM
47
0
0
15 Dec 2023
SeiT++: Masked Token Modeling Improves Storage-efficient Training
SeiT++: Masked Token Modeling Improves Storage-efficient Training
Min-Seob Lee
Song Park
Byeongho Heo
Dongyoon Han
Hyunjung Shim
MQVLM
76
1
0
15 Dec 2023
Continual Adversarial Defense
Continual Adversarial Defense
Qian Wang
Yaoyao Liu
Hefei Ling
Yingwei Li
Qihao Liu
Ping Li
AAML
170
4
0
15 Dec 2023
Exploring Transferability for Randomized Smoothing
Exploring Transferability for Randomized Smoothing
Kai Qiu
Huishuai Zhang
Zhirong Wu
Stephen Lin
AAML
50
1
0
14 Dec 2023
Previous
123...323334...166167168
Next