ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,382 papers shown
Title
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using
  Adversarial Machine Learning
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning
Chen Doytshman
Satoru Momiyama
Inderjeet Singh
Yuval Elovici
A. Shabtai
41
1
0
02 Dec 2023
Optimal Attack and Defense for Reinforcement Learning
Optimal Attack and Defense for Reinforcement Learning
Jeremy McMahan
Young Wu
Xiaojin Zhu
Qiaomin Xie
AAMLOffRL
70
10
0
30 Nov 2023
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection
  Systems
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems
Bilel Tarchoun
Quazi Mishkatul Alam
Nael B. Abu-Ghazaleh
Ihsen Alouani
AAML
43
0
0
30 Nov 2023
Universal Backdoor Attacks
Universal Backdoor Attacks
Benjamin Schneider
Nils Lukas
Florian Kerschbaum
SILM
91
4
0
30 Nov 2023
IMMA: Immunizing text-to-image Models against Malicious Adaptation
IMMA: Immunizing text-to-image Models against Malicious Adaptation
Yijia Zheng
Raymond A. Yeh
125
9
0
30 Nov 2023
Improving the Robustness of Quantized Deep Neural Networks to White-Box
  Attacks using Stochastic Quantization and Information-Theoretic Ensemble
  Training
Improving the Robustness of Quantized Deep Neural Networks to White-Box Attacks using Stochastic Quantization and Information-Theoretic Ensemble Training
Saurabh Farkya
Aswin Raghavan
Avi Ziskind
73
0
0
30 Nov 2023
Improving Adversarial Transferability via Model Alignment
Improving Adversarial Transferability via Model Alignment
A. Ma
Amir-massoud Farahmand
Yangchen Pan
Philip Torr
Jindong Gu
AAML
84
5
0
30 Nov 2023
TrustMark: Universal Watermarking for Arbitrary Resolution Images
TrustMark: Universal Watermarking for Arbitrary Resolution Images
Tu Bui
S. Agarwal
John Collomosse
105
19
0
30 Nov 2023
Visual Anagrams: Generating Multi-View Optical Illusions with Diffusion
  Models
Visual Anagrams: Generating Multi-View Optical Illusions with Diffusion Models
Daniel Geng
Inbum Park
Andrew Owens
DiffM
100
30
0
29 Nov 2023
On the Adversarial Robustness of Graph Contrastive Learning Methods
On the Adversarial Robustness of Graph Contrastive Learning Methods
Filippo Guerranti
Zinuo Yi
Anna Starovoit
Rafiq Kamel
Simon Geisler
Stephan Günnemann
AAML
136
2
0
29 Nov 2023
Receler: Reliable Concept Erasing of Text-to-Image Diffusion Models via
  Lightweight Erasers
Receler: Reliable Concept Erasing of Text-to-Image Diffusion Models via Lightweight Erasers
Chi-Pin Huang
Kai-Po Chang
Chung-Ting Tsai
Yung-Hsuan Lai
Fu-En Yang
Yu-Chiang Frank Wang
DiffM
107
56
0
29 Nov 2023
Improving Feature Stability during Upsampling -- Spectral Artifacts and
  the Importance of Spatial Context
Improving Feature Stability during Upsampling -- Spectral Artifacts and the Importance of Spatial Context
Shashank Agnihotri
Julia Grabinski
Margret Keuper
91
6
0
29 Nov 2023
MMA-Diffusion: MultiModal Attack on Diffusion Models
MMA-Diffusion: MultiModal Attack on Diffusion Models
Yijun Yang
Ruiyuan Gao
Xiaosen Wang
Tsung-Yi Ho
Nan Xu
Qiang Xu
101
77
0
29 Nov 2023
Quantum Neural Networks under Depolarization Noise: Exploring White-Box
  Attacks and Defenses
Quantum Neural Networks under Depolarization Noise: Exploring White-Box Attacks and Defenses
David Winderl
Nicola Franco
J. M. Lorenz
AAML
93
7
0
29 Nov 2023
Improving the Robustness of Transformer-based Large Language Models with
  Dynamic Attention
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
Lujia Shen
Yuwen Pu
Shouling Ji
Changjiang Li
Xuhong Zhang
Chunpeng Ge
Ting Wang
AAML
75
6
0
29 Nov 2023
RADAP: A Robust and Adaptive Defense Against Diverse Adversarial Patches
  on Face Recognition
RADAP: A Robust and Adaptive Defense Against Diverse Adversarial Patches on Face Recognition
Xiaoliang Liu
Shen Furao
Jian Zhao
Changhai Nie
AAML
77
4
0
29 Nov 2023
NeRFTAP: Enhancing Transferability of Adversarial Patches on Face
  Recognition using Neural Radiance Fields
NeRFTAP: Enhancing Transferability of Adversarial Patches on Face Recognition using Neural Radiance Fields
Xiaoliang Liu
Shen Furao
Feng Han
Jian Zhao
Changhai Nie
AAML
62
0
0
29 Nov 2023
STR-Cert: Robustness Certification for Deep Text Recognition on Deep
  Learning Pipelines and Vision Transformers
STR-Cert: Robustness Certification for Deep Text Recognition on Deep Learning Pipelines and Vision Transformers
Daqian Shao
Lukas Fesser
Marta Z. Kwiatkowska
63
0
0
28 Nov 2023
Survey on AI Ethics: A Socio-technical Perspective
Survey on AI Ethics: A Socio-technical Perspective
Dave Mbiazi
Meghana Bhange
Maryam Babaei
Ivaxi Sheth
Patrik Kenfack
99
5
0
28 Nov 2023
Vulnerability Analysis of Transformer-based Optical Character
  Recognition to Adversarial Attacks
Vulnerability Analysis of Transformer-based Optical Character Recognition to Adversarial Attacks
Lucas Beerens
D. Higham
73
1
0
28 Nov 2023
1-Lipschitz Layers Compared: Memory, Speed, and Certifiable Robustness
1-Lipschitz Layers Compared: Memory, Speed, and Certifiable Robustness
Bernd Prach
Fabio Brau
Giorgio Buttazzo
Christoph H. Lampert
91
8
0
28 Nov 2023
A Unified Hardware-based Threat Detector for AI Accelerators
A Unified Hardware-based Threat Detector for AI Accelerators
Xiaobei Yan
Han Qiu
Tianwei Zhang
92
2
0
28 Nov 2023
Efficient Key-Based Adversarial Defense for ImageNet by Using
  Pre-trained Model
Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model
AprilPyone Maungmaung
Isao Echizen
Hitoshi Kiya
VLMAAML
64
0
0
28 Nov 2023
On robust overfitting: adversarial training induced distribution matters
On robust overfitting: adversarial training induced distribution matters
Runzhi Tian
Yongyi Mao
OOD
90
1
0
28 Nov 2023
Unsupervised Multimodal Deepfake Detection Using Intra- and Cross-Modal
  Inconsistencies
Unsupervised Multimodal Deepfake Detection Using Intra- and Cross-Modal Inconsistencies
Mulin Tian
Mahyar Khayatkhoei
Joe Mathai
Wael AbdAlmageed
101
7
0
28 Nov 2023
Rethinking Mixup for Improving the Adversarial Transferability
Rethinking Mixup for Improving the Adversarial Transferability
Xiaosen Wang
Zeyuan Yin
AAML
69
2
0
28 Nov 2023
On the Robustness of Decision-Focused Learning
On the Robustness of Decision-Focused Learning
Yehya Farhat
83
0
0
28 Nov 2023
CLAP: Isolating Content from Style through Contrastive Learning with Augmented Prompts
CLAP: Isolating Content from Style through Contrastive Learning with Augmented Prompts
Yichao Cai
Yuhang Liu
Zhen Zhang
Javen Qinfeng Shi
CLIPVLM
161
8
0
28 Nov 2023
Adversarial Doodles: Interpretable and Human-drawable Attacks Provide
  Describable Insights
Adversarial Doodles: Interpretable and Human-drawable Attacks Provide Describable Insights
Ryoya Nara
Yusuke Matsui
AAML
90
0
0
27 Nov 2023
Relationship between Model Compression and Adversarial Robustness: A
  Review of Current Evidence
Relationship between Model Compression and Adversarial Robustness: A Review of Current Evidence
Svetlana Pavlitska
Hannes Grolig
J. Marius Zöllner
AAML
140
3
0
27 Nov 2023
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching
Mengda Xie
Yiling He
Meie Fang
AAML
73
1
0
27 Nov 2023
Instruct2Attack: Language-Guided Semantic Adversarial Attacks
Instruct2Attack: Language-Guided Semantic Adversarial Attacks
Jiang-Long Liu
Chen Wei
Yuxiang Guo
Heng Yu
Alan Yuille
Soheil Feizi
Chun Pong Lau
Rama Chellappa
DiffMAAML
102
7
0
27 Nov 2023
Adversarial Purification of Information Masking
Adversarial Purification of Information Masking
Sitong Liu
Z. Lian
Shuangquan Zhang
Liang Xiao
AAML
76
0
0
26 Nov 2023
Concept Distillation: Leveraging Human-Centered Explanations for Model
  Improvement
Concept Distillation: Leveraging Human-Centered Explanations for Model Improvement
Avani Gupta
Saurabh Saini
P. J. Narayanan
97
8
0
26 Nov 2023
Mixing Classifiers to Alleviate the Accuracy-Robustness Trade-Off
Mixing Classifiers to Alleviate the Accuracy-Robustness Trade-Off
Yatong Bai
Brendon G. Anderson
Somayeh Sojoudi
AAML
94
2
0
26 Nov 2023
Trainwreck: A damaging adversarial attack on image classifiers
Trainwreck: A damaging adversarial attack on image classifiers
Jan Zahálka
105
1
0
24 Nov 2023
Segment (Almost) Nothing: Prompt-Agnostic Adversarial Attacks on
  Segmentation Models
Segment (Almost) Nothing: Prompt-Agnostic Adversarial Attacks on Segmentation Models
Francesco Croce
Matthias Hein
VLM
69
3
0
24 Nov 2023
Robust and Interpretable COVID-19 Diagnosis on Chest X-ray Images using
  Adversarial Training
Robust and Interpretable COVID-19 Diagnosis on Chest X-ray Images using Adversarial Training
Karina Yang
Alexis Bennett
Dominique Duncan
OOD
74
1
0
23 Nov 2023
When Side-Channel Attacks Break the Black-Box Property of Embedded
  Artificial Intelligence
When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence
Benoît Coqueret
Mathieu Carbone
Olivier Sentieys
Gabriel Zaid
93
2
0
23 Nov 2023
Efficient Trigger Word Insertion
Efficient Trigger Word Insertion
Yueqi Zeng
Ziqiang Li
Pengfei Xia
Lei Liu
Bin Li
AAML
84
5
0
23 Nov 2023
Adversarial defense based on distribution transfer
Adversarial defense based on distribution transfer
Jiahao Chen
Diqun Yan
Li Dong
80
0
0
23 Nov 2023
Security and Privacy Challenges in Deep Learning Models
Security and Privacy Challenges in Deep Learning Models
Gopichandh Golla
AAMLSILMMIACV
47
1
0
23 Nov 2023
A Somewhat Robust Image Watermark against Diffusion-based Editing Models
A Somewhat Robust Image Watermark against Diffusion-based Editing Models
Mingtian Tan
Tianhao Wang
Somesh Jha
WIGM
86
3
0
22 Nov 2023
Panda or not Panda? Understanding Adversarial Attacks with Interactive
  Visualization
Panda or not Panda? Understanding Adversarial Attacks with Interactive Visualization
Yuzhe You
Jarvis Tse
Jian Zhao
AAML
62
3
0
22 Nov 2023
Transfer Attacks and Defenses for Large Language Models on Coding Tasks
Transfer Attacks and Defenses for Large Language Models on Coding Tasks
Chi Zhang
Zifan Wang
Ravi Mangal
Matt Fredrikson
Limin Jia
Corina S. Pasareanu
AAMLSILM
74
1
0
22 Nov 2023
A Survey of Adversarial CAPTCHAs on its History, Classification and
  Generation
A Survey of Adversarial CAPTCHAs on its History, Classification and Generation
Zisheng Xu
Qiao Yan
Fei Yu
Victor C.M. Leung
AAML
89
1
0
22 Nov 2023
MetaCloak: Preventing Unauthorized Subject-driven Text-to-image
  Diffusion-based Synthesis via Meta-learning
MetaCloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning
Yixin Liu
Chenrui Fan
Yutong Dai
Xun Chen
Pan Zhou
Lichao Sun
DiffM
107
23
0
22 Nov 2023
CovarNav: Machine Unlearning via Model Inversion and Covariance
  Navigation
CovarNav: Machine Unlearning via Model Inversion and Covariance Navigation
Ali Abbasi
Chayne Thrash
Elaheh Akbari
Daniel Zhang
Soheil Kolouri
MU
70
4
0
21 Nov 2023
Investigating Weight-Perturbed Deep Neural Networks With Application in
  Iris Presentation Attack Detection
Investigating Weight-Perturbed Deep Neural Networks With Application in Iris Presentation Attack Detection
Renu Sharma
Redwan Sony
Arun Ross
AAML
106
3
0
21 Nov 2023
Attention Deficit is Ordered! Fooling Deformable Vision Transformers
  with Collaborative Adversarial Patches
Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches
Quazi Mishkatul Alam
Bilel Tarchoun
Ihsen Alouani
Nael B. Abu-Ghazaleh
AAMLViT
78
1
0
21 Nov 2023
Previous
123...343536...166167168
Next