ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,374 papers shown
Title
Variational Positive-incentive Noise: How Noise Benefits Models
Variational Positive-incentive Noise: How Noise Benefits Models
Hongyuan Zhang
Si-Ying Huang
Yubin Guo
Xuelong Li
88
12
0
13 Jun 2023
On the Robustness of Removal-Based Feature Attributions
On the Robustness of Removal-Based Feature Attributions
Christy Lin
Ian Covert
Su-In Lee
125
13
0
12 Jun 2023
Adversarial Attacks on the Interpretation of Neuron Activation
  Maximization
Adversarial Attacks on the Interpretation of Neuron Activation Maximization
Géraldin Nanfack
A. Fulleringer
Jonathan Marty
Michael Eickenberg
Eugene Belilovsky
AAMLFAtt
69
11
0
12 Jun 2023
Deep Gaussian Mixture Ensembles
Deep Gaussian Mixture Ensembles
Yousef El-Laham
Niccolò Dalmasso
Elizabeth Fons
Svitlana Vyetrenko
BDLUQCV
60
2
0
12 Jun 2023
When Vision Fails: Text Attacks Against ViT and OCR
When Vision Fails: Text Attacks Against ViT and OCR
Nicholas Boucher
Jenny Blessing
Ilia Shumailov
Ross J. Anderson
Nicolas Papernot
AAML
70
4
0
12 Jun 2023
How robust accuracy suffers from certified training with convex
  relaxations
How robust accuracy suffers from certified training with convex relaxations
Piersilvio De Bartolomeis
Jacob Clarysse
Amartya Sanyal
Fanny Yang
AAML
66
2
0
12 Jun 2023
Precise and Generalized Robustness Certification for Neural Networks
Precise and Generalized Robustness Certification for Neural Networks
Yuanyuan Yuan
Shuai Wang
Z. Su
AAML
73
2
0
11 Jun 2023
Neural Architecture Design and Robustness: A Dataset
Neural Architecture Design and Robustness: A Dataset
Steffen Jung
Jovita Lukasik
Margret Keuper
OODAAML
84
20
0
11 Jun 2023
Securing Visually-Aware Recommender Systems: An Adversarial Image Reconstruction and Detection Framework
Securing Visually-Aware Recommender Systems: An Adversarial Image Reconstruction and Detection Framework
Minglei Yin
Bin Liu
Neil Zhenqiang Gong
Xin Li
AAML
55
1
0
11 Jun 2023
Boosting Adversarial Robustness using Feature Level Stochastic Smoothing
Boosting Adversarial Robustness using Feature Level Stochastic Smoothing
Sravanti Addepalli
Samyak Jain
Gaurang Sriramanan
R. Venkatesh Babu
AAML
52
6
0
10 Jun 2023
NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations
NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations
Y. Fu
Ye Yuan
Souvik Kundu
Shang Wu
Shunyao Zhang
Yingyan Lin
AAML
130
6
0
10 Jun 2023
Adaptive Contextual Perception: How to Generalize to New Backgrounds and
  Ambiguous Objects
Adaptive Contextual Perception: How to Generalize to New Backgrounds and Ambiguous Objects
Zhuofan Ying
Peter Hase
Joey Tianyi Zhou
74
1
0
09 Jun 2023
Detecting Adversarial Directions in Deep Reinforcement Learning to Make
  Robust Decisions
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions
Ezgi Korkmaz
Jonah Brown-Cohen
AAML
70
9
0
09 Jun 2023
Spike timing reshapes robustness against attacks in spiking neural
  networks
Spike timing reshapes robustness against attacks in spiking neural networks
Jianhao Ding
Zhaofei Yu
Tiejun Huang
Jian K. Liu
AAML
86
2
0
09 Jun 2023
Robustness Testing for Multi-Agent Reinforcement Learning: State
  Perturbations on Critical Agents
Robustness Testing for Multi-Agent Reinforcement Learning: State Perturbations on Critical Agents
Ziyuan Zhou
Guanjun Liu
AAML
84
9
0
09 Jun 2023
Robust Explainer Recommendation for Time Series Classification
Robust Explainer Recommendation for Time Series Classification
Thu Trang Nguyen
Thach le Nguyen
Georgiana Ifrim
AI4TS
99
6
0
08 Jun 2023
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Mohamed el Shehaby
Ashraf Matrawy
AAML
101
7
0
08 Jun 2023
Background Prompting for Improved Object Depth
Background Prompting for Improved Object Depth
Manel Baradad
Yuanzhen Li
Forrester Cole
Michael Rubinstein
Antonio Torralba
William T. Freeman
Varun Jampani
VLMMDE
64
1
0
08 Jun 2023
PEFT-SER: On the Use of Parameter Efficient Transfer Learning Approaches
  For Speech Emotion Recognition Using Pre-trained Speech Models
PEFT-SER: On the Use of Parameter Efficient Transfer Learning Approaches For Speech Emotion Recognition Using Pre-trained Speech Models
Tiantian Feng
Shrikanth Narayanan
105
31
0
08 Jun 2023
Boosting Adversarial Transferability by Achieving Flat Local Maxima
Boosting Adversarial Transferability by Achieving Flat Local Maxima
Zhijin Ge
Hongying Liu
Xiaosen Wang
Fanhua Shang
Yuanyuan Liu
AAML
94
50
0
08 Jun 2023
Generalizable Lightweight Proxy for Robust NAS against Diverse
  Perturbations
Generalizable Lightweight Proxy for Robust NAS against Diverse Perturbations
Hyeonjeong Ha
Minseon Kim
Sung Ju Hwang
OODAAML
68
6
0
08 Jun 2023
A Melting Pot of Evolution and Learning
A Melting Pot of Evolution and Learning
Moshe Sipper
Achiya Elyasaf
Tomer Halperin
Zvika Haramaty
Raz Lapid
Eyal Segal
Itai Tzruia
Snir Vitrack Tamam
BDL
55
0
0
08 Jun 2023
Degraded Polygons Raise Fundamental Questions of Neural Network
  Perception
Degraded Polygons Raise Fundamental Questions of Neural Network Perception
Leonard Tang
Dan Ley
AAML
36
0
0
08 Jun 2023
Expanding Scope: Adapting English Adversarial Attacks to Chinese
Expanding Scope: Adapting English Adversarial Attacks to Chinese
Hanyu Liu
Chengyuan Cai
Yanjun Qi
AAML
63
7
0
08 Jun 2023
Divide and Repair: Using Options to Improve Performance of Imitation
  Learning Against Adversarial Demonstrations
Divide and Repair: Using Options to Improve Performance of Imitation Learning Against Adversarial Demonstrations
P. Dasgupta
AAML
37
0
0
07 Jun 2023
PromptAttack: Probing Dialogue State Trackers with Adversarial Prompts
PromptAttack: Probing Dialogue State Trackers with Adversarial Prompts
Xiangjue Dong
Yun He
Ziwei Zhu
James Caverlee
AAML
64
7
0
07 Jun 2023
PromptRobust: Towards Evaluating the Robustness of Large Language Models
  on Adversarial Prompts
PromptRobust: Towards Evaluating the Robustness of Large Language Models on Adversarial Prompts
Kaijie Zhu
Jindong Wang
Jiaheng Zhou
Zichen Wang
Hao Chen
...
Linyi Yang
Weirong Ye
Yue Zhang
Neil Zhenqiang Gong
Xingxu Xie
SILM
138
144
0
07 Jun 2023
Faithful Knowledge Distillation
Faithful Knowledge Distillation
Tom A. Lamb
Rudy Bunel
Krishnamurthy Dvijotham
M. P. Kumar
Philip Torr
Francisco Eiras
AAML
33
0
0
07 Jun 2023
Adversarial Sample Detection Through Neural Network Transport Dynamics
Adversarial Sample Detection Through Neural Network Transport Dynamics
Skander Karkar
Patrick Gallinari
A. Rakotomamonjy
AAML
51
1
0
07 Jun 2023
Extracting Cloud-based Model with Prior Knowledge
Extracting Cloud-based Model with Prior Knowledge
Songtao Zhao
Kangjie Chen
Meng Hao
Jian Zhang
Guowen Xu
Hongwei Li
Tianwei Zhang
AAMLMIACVSILMMLAUSLR
117
5
0
07 Jun 2023
Optimal Transport Model Distributional Robustness
Optimal Transport Model Distributional Robustness
Van-Anh Nguyen
Trung Le
Anh Tuan Bui
Thanh-Toan Do
Dinh Q. Phung
OOD
77
4
0
07 Jun 2023
CFDP: Common Frequency Domain Pruning
CFDP: Common Frequency Domain Pruning
Samir Khaki
Weihan Luo
3DV
77
5
0
07 Jun 2023
Transferable Adversarial Robustness for Categorical Data via Universal
  Robust Embeddings
Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings
Klim Kireev
Maksym Andriushchenko
Carmela Troncoso
Nicolas Flammarion
OOD
71
1
0
06 Jun 2023
Value Functions are Control Barrier Functions: Verification of Safe
  Policies using Control Theory
Value Functions are Control Barrier Functions: Verification of Safe Policies using Control Theory
Daniel C.H. Tan
Fernando Acero
Robert McCarthy
Dimitrios Kanoulas
Zhibin Li
OffRL
73
3
0
06 Jun 2023
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not
  Preserving)
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)
Yohan Beugin
Patrick McDaniel
138
7
0
06 Jun 2023
Exploring Model Dynamics for Accumulative Poisoning Discovery
Exploring Model Dynamics for Accumulative Poisoning Discovery
Jianing Zhu
Xiawei Guo
Jiangchao Yao
Chao Du
Li He
Shuo Yuan
Tongliang Liu
Liang Wang
Bo Han
AAML
60
0
0
06 Jun 2023
Revisiting the Trade-off between Accuracy and Robustness via Weight
  Distribution of Filters
Revisiting the Trade-off between Accuracy and Robustness via Weight Distribution of Filters
Xingxing Wei
Shiji Zhao
Bo li
AAML
121
7
0
06 Jun 2023
A Robust Likelihood Model for Novelty Detection
A Robust Likelihood Model for Novelty Detection
Ranya Almohsen
Shivang Patel
Don Adjeroh
Gianfranco Doretto
AAMLOOD
61
0
0
06 Jun 2023
Adversarial alignment: Breaking the trade-off between the strength of an
  attack and its relevance to human perception
Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception
Drew Linsley
Pinyuan Feng
Thibaut Boissin
A. Ashok
Thomas Fel
Stephanie Olaiya
Thomas Serre
AAML
78
6
0
05 Jun 2023
Adversarial Ink: Componentwise Backward Error Attacks on Deep Learning
Adversarial Ink: Componentwise Backward Error Attacks on Deep Learning
Lucas Beerens
D. Higham
AAML
73
8
0
05 Jun 2023
The $L^\infty$ Learnability of Reproducing Kernel Hilbert Spaces
The L∞L^\inftyL∞ Learnability of Reproducing Kernel Hilbert Spaces
Hongrui Chen
Jihao Long
Lei Wu
70
0
0
05 Jun 2023
Enhance Diffusion to Improve Robust Generalization
Enhance Diffusion to Improve Robust Generalization
Jianhui Sun
Sanchit Sinha
Aidong Zhang
79
4
0
05 Jun 2023
Adversary for Social Good: Leveraging Adversarial Attacks to Protect
  Personal Attribute Privacy
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy
Xiaoting Li
Ling-Hao Chen
Dinghao Wu
AAMLSILM
66
6
0
04 Jun 2023
Towards Black-box Adversarial Example Detection: A Data
  Reconstruction-based Method
Towards Black-box Adversarial Example Detection: A Data Reconstruction-based Method
Yifei Gao
Zhi Lin
Yunfan Yang
Jitao Sang
AAML
96
4
0
03 Jun 2023
Invisible Image Watermarks Are Provably Removable Using Generative AI
Invisible Image Watermarks Are Provably Removable Using Generative AI
Xuandong Zhao
Kexun Zhang
Zihao Su
Saastha Vasan
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
Yu Wang
Lei Li
WIGM
136
63
0
02 Jun 2023
Unlearnable Examples for Diffusion Models: Protect Data from
  Unauthorized Exploitation
Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Zhengyue Zhao
Jinhao Duan
Xingui Hu
Kaidi Xu
Chenan Wang
Rui Zhang
Zidong Du
Qi Guo
Yunji Chen
DiffMWIGM
102
28
0
02 Jun 2023
Supervised Adversarial Contrastive Learning for Emotion Recognition in
  Conversations
Supervised Adversarial Contrastive Learning for Emotion Recognition in Conversations
Dou Hu
Yinan Bao
Lingwei Wei
Wei Zhou
Song Hu
105
56
0
02 Jun 2023
Robust low-rank training via approximate orthonormal constraints
Robust low-rank training via approximate orthonormal constraints
Dayana Savostianova
Emanuele Zangrando
Gianluca Ceruti
Francesco Tudisco
71
10
0
02 Jun 2023
A Closer Look at the Adversarial Robustness of Deep Equilibrium Models
A Closer Look at the Adversarial Robustness of Deep Equilibrium Models
Zonghan Yang
Tianyu Pang
Yang Liu
AAML
73
14
0
02 Jun 2023
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion
  Attacks
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Jiyi Zhang
Hansheng Fang
E. Chang
AAML
43
0
0
02 Jun 2023
Previous
123...474849...166167168
Next