ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,367 papers shown
Title
Improving Adversarial Transferability via Intermediate-level
  Perturbation Decay
Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
81
22
0
26 Apr 2023
Generating Adversarial Examples with Task Oriented Multi-Objective
  Optimization
Generating Adversarial Examples with Task Oriented Multi-Objective Optimization
Anh-Vu Bui
Trung Le
He Zhao
Quan Hung Tran
Paul Montague
Dinh Q. Phung
AAML
68
0
0
26 Apr 2023
Certifying Ensembles: A General Certification Theory with
  S-Lipschitzness
Certifying Ensembles: A General Certification Theory with S-Lipschitzness
Aleksandar Petrov
Francisco Eiras
Amartya Sanyal
Philip Torr
Adel Bibi
UQCV
70
1
0
25 Apr 2023
Lyapunov-Stable Deep Equilibrium Models
Lyapunov-Stable Deep Equilibrium Models
Haoyu Chu
Shikui Wei
Ting Liu
Yao-Min Zhao
Yuto Miyatake
AAML
71
5
0
25 Apr 2023
Combining Adversaries with Anti-adversaries in Training
Combining Adversaries with Anti-adversaries in Training
Xiaoling Zhou
Nan Yang
Ou Wu
AAML
67
9
0
25 Apr 2023
Hint-Aug: Drawing Hints from Foundation Vision Transformers Towards
  Boosted Few-Shot Parameter-Efficient Tuning
Hint-Aug: Drawing Hints from Foundation Vision Transformers Towards Boosted Few-Shot Parameter-Efficient Tuning
Zhongzhi Yu
Shang Wu
Y. Fu
Shunyao Zhang
Yingyan Lin
86
6
0
25 Apr 2023
Evaluating Adversarial Robustness on Document Image Classification
Evaluating Adversarial Robustness on Document Image Classification
Timothée Fronteau
Arnaud Paran
A. Shabou
AAML
85
3
0
24 Apr 2023
Robust Tickets Can Transfer Better: Drawing More Transferable Subnetworks in Transfer Learning
Robust Tickets Can Transfer Better: Drawing More Transferable Subnetworks in Transfer Learning
Y. Fu
Ye Yuan
Shang Wu
Jiayi Yuan
Yingyan Lin
OOD
128
3
0
24 Apr 2023
Can Decentralized Stochastic Minimax Optimization Algorithms Converge
  Linearly for Finite-Sum Nonconvex-Nonconcave Problems?
Can Decentralized Stochastic Minimax Optimization Algorithms Converge Linearly for Finite-Sum Nonconvex-Nonconcave Problems?
Yihan Zhang
Wenhao Jiang
Feng-Song Zheng
C. C. Tan
Xinghua Shi
Hongchang Gao
53
1
0
24 Apr 2023
SketchXAI: A First Look at Explainability for Human Sketches
SketchXAI: A First Look at Explainability for Human Sketches
Zhiyu Qu
Yulia Gryaditskaya
Ke Li
Kaiyue Pang
Tao Xiang
Yi-Zhe Song
89
8
0
23 Apr 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing Guo
Yihao Huang
Xiaofei Xie
Lei Ma
Jianjun Zhao
AAML
89
53
0
23 Apr 2023
StyLess: Boosting the Transferability of Adversarial Examples
StyLess: Boosting the Transferability of Adversarial Examples
Kaisheng Liang
Bin Xiao
AAML
71
18
0
23 Apr 2023
Universal Adversarial Backdoor Attacks to Fool Vertical Federated
  Learning in Cloud-Edge Collaboration
Universal Adversarial Backdoor Attacks to Fool Vertical Federated Learning in Cloud-Edge Collaboration
Peng Chen
Xin Du
Zhihui Lu
Hongfeng Chai
FedMLAAML
98
11
0
22 Apr 2023
Detecting Adversarial Faces Using Only Real Face Self-Perturbations
Detecting Adversarial Faces Using Only Real Face Self-Perturbations
Qian Wang
Yongqin Xian
H. Ling
Jinyuan Zhang
Xiaorui Lin
Ping Li
Jiazhong Chen
Ning Yu
AAML
65
9
0
22 Apr 2023
Individual Fairness in Bayesian Neural Networks
Individual Fairness in Bayesian Neural Networks
Alice Doherty
Matthew Wicker
Luca Laurenti
A. Patané
147
5
0
21 Apr 2023
RoCOCO: Robustness Benchmark of MS-COCO to Stress-test Image-Text
  Matching Models
RoCOCO: Robustness Benchmark of MS-COCO to Stress-test Image-Text Matching Models
Seulki Park
Daeho Um
Hajung Yoon
Sanghyuk Chun
Sangdoo Yun
Hawook Jeong
95
3
0
21 Apr 2023
Certified Adversarial Robustness Within Multiple Perturbation Bounds
Certified Adversarial Robustness Within Multiple Perturbation Bounds
Soumalya Nandi
Sravanti Addepalli
Harsh Rangwani
R. Venkatesh Babu
AAML
66
3
0
20 Apr 2023
Using Z3 for Formal Modeling and Verification of FNN Global Robustness
Using Z3 for Formal Modeling and Verification of FNN Global Robustness
Yihao Zhang
Zeming Wei
Xiyue Zhang
Meng Sun
AAML
72
6
0
20 Apr 2023
Can Perturbations Help Reduce Investment Risks? Risk-Aware Stock
  Recommendation via Split Variational Adversarial Training
Can Perturbations Help Reduce Investment Risks? Risk-Aware Stock Recommendation via Split Variational Adversarial Training
Jiezhu Cheng
Kaizhu Huang
Zibin Zheng
AAML
69
0
0
20 Apr 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
129
22
0
20 Apr 2023
Federated Compositional Deep AUC Maximization
Federated Compositional Deep AUC Maximization
Xinwen Zhang
Yihang Zhang
Tianbao Yang
Richard Souvenir
Hongchang Gao
FedML
105
8
0
20 Apr 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
59
4
0
20 Apr 2023
Open-World Continual Learning: Unifying Novelty Detection and Continual
  Learning
Open-World Continual Learning: Unifying Novelty Detection and Continual Learning
Gyuhak Kim
Changnan Xiao
Tatsuya Konishi
Zixuan Ke
Bin Liu
CLLOODD
77
15
0
20 Apr 2023
Jedi: Entropy-based Localization and Removal of Adversarial Patches
Jedi: Entropy-based Localization and Removal of Adversarial Patches
Bilel Tarchoun
Anouar Ben Khalifa
Mohamed Ali Mahjoub
Nael B. Abu-Ghazaleh
Ihsen Alouani
AAML
73
25
0
20 Apr 2023
GREAT Score: Global Robustness Evaluation of Adversarial Perturbation
  using Generative Models
GREAT Score: Global Robustness Evaluation of Adversarial Perturbation using Generative Models
Zaitang Li
Pin-Yu Chen
Tsung-Yi Ho
AAMLDiffM
50
4
0
19 Apr 2023
Wavelets Beat Monkeys at Adversarial Robustness
Wavelets Beat Monkeys at Adversarial Robustness
Jingtong Su
Julia Kempe
AAMLOOD
45
2
0
19 Apr 2023
Robustness of Visual Explanations to Common Data Augmentation
Robustness of Visual Explanations to Common Data Augmentation
Lenka Tětková
Lars Kai Hansen
AAML
62
6
0
18 Apr 2023
Masked Language Model Based Textual Adversarial Example Detection
Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang
Zhaoxi Zhang
Qi Zhong
Xufei Zheng
Yanjun Zhang
Shengshan Hu
L. Zhang
AAML
101
2
0
18 Apr 2023
AI Product Security: A Primer for Developers
AI Product Security: A Primer for Developers
Ebenezer R. H. P. Isaac
J. Reno
36
2
0
18 Apr 2023
RNN-Guard: Certified Robustness Against Multi-frame Attacks for
  Recurrent Neural Networks
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Yunruo Zhang
Tianyu Du
S. Ji
Peng Tang
Shanqing Guo
AAML
64
2
0
17 Apr 2023
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke
Julian Speith
Janka Möller
Konrad Rieck
C. Paar
AAML
211
3
0
17 Apr 2023
A Random-patch based Defense Strategy Against Physical Attacks for Face
  Recognition Systems
A Random-patch based Defense Strategy Against Physical Attacks for Face Recognition Systems
Jiahao Xie
Ye Luo
Jianwei Lu
AAMLCVBM
35
3
0
16 Apr 2023
Combining Generators of Adversarial Malware Examples to Increase Evasion
  Rate
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
M. Kozák
M. Jureček
AAML
29
1
0
14 Apr 2023
Cross-Entropy Loss Functions: Theoretical Analysis and Applications
Cross-Entropy Loss Functions: Theoretical Analysis and Applications
Anqi Mao
M. Mohri
Yutao Zhong
AAML
123
332
0
14 Apr 2023
Interpretability is a Kind of Safety: An Interpreter-based Ensemble for
  Adversary Defense
Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Jingyuan Wang
Yufan Wu
Mingxuan Li
Xin Lin
Junjie Wu
Chao Li
AAML
64
13
0
14 Apr 2023
Generating Adversarial Examples with Better Transferability via Masking
  Unimportant Parameters of Surrogate Model
Generating Adversarial Examples with Better Transferability via Masking Unimportant Parameters of Surrogate Model
Dingcheng Yang
Wenjian Yu
Zihao Xiao
Jiaqi Luo
AAMLDiffM
60
5
0
14 Apr 2023
RoboBEV: Towards Robust Bird's Eye View Perception under Corruptions
RoboBEV: Towards Robust Bird's Eye View Perception under Corruptions
Shaoyuan Xie
Lingdong Kong
Wenwei Zhang
Jiawei Ren
Liang Pan
Kai-xiang Chen
Ziwei Liu
95
25
0
13 Apr 2023
False Claims against Model Ownership Resolution
False Claims against Model Ownership Resolution
Jian Liu
Rui Zhang
S. Szyller
Kui Ren
Nirmal Asokan
AAMLMLAU
123
12
0
13 Apr 2023
Adversarial Examples from Dimensional Invariance
Adversarial Examples from Dimensional Invariance
Benjamin L. Badger
58
0
0
13 Apr 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
123
5
0
13 Apr 2023
Understanding Overfitting in Adversarial Training via Kernel Regression
Understanding Overfitting in Adversarial Training via Kernel Regression
Teng Zhang
Kang Li
63
2
0
13 Apr 2023
Generative Adversarial Networks-Driven Cyber Threat Intelligence
  Detection Framework for Securing Internet of Things
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
M. Ferrag
Djallel Hamouda
Merouane Debbah
Leandros A. Maglaras
Abderrahmane Lakas
64
9
0
12 Apr 2023
Towards More Robust and Accurate Sequential Recommendation with
  Cascade-guided Adversarial Training
Towards More Robust and Accurate Sequential Recommendation with Cascade-guided Adversarial Training
Juntao Tan
Shelby Heinecke
Zhiwei Liu
Yong-Guang Chen
Yongfeng Zhang
Haiquan Wang
AAML
68
5
0
11 Apr 2023
Overload: Latency Attacks on Object Detection for Edge Devices
Overload: Latency Attacks on Object Detection for Edge Devices
Erh-Chung Chen
Pin-Yu Chen
I-Hsin Chung
Che-Rung Lee
AAML
110
15
0
11 Apr 2023
Boosting Cross-task Transferability of Adversarial Patches with Visual
  Relations
Boosting Cross-task Transferability of Adversarial Patches with Visual Relations
Tony Ma
Songze Li
Yisong Xiao
Shunchang Liu
57
1
0
11 Apr 2023
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via
  User-configurable Privacy Defense
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense
Yue-li Cui
Syed Imran Ali Meerza
Zhuohang Li
Luyang Liu
Jiaxin Zhang
Jian-Dong Liu
AAMLFedML
91
5
0
11 Apr 2023
Simultaneous Adversarial Attacks On Multiple Face Recognition System
  Components
Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Inderjeet Singh
Kazuya Kakizaki
Toshinori Araki
CVBMAAMLPICV
54
0
0
11 Apr 2023
Evaluation of Test-Time Adaptation Under Computational Time Constraints
Evaluation of Test-Time Adaptation Under Computational Time Constraints
Motasem Alfarra
Hani Itani
Alejandro Pardo
Shyma Alhuwaider
Merey Ramazanova
Juan C. Pérez
Zhipeng Cai
Matthias Müller
Guohao Li
TTA
97
4
0
10 Apr 2023
Generating Adversarial Attacks in the Latent Space
Generating Adversarial Attacks in the Latent Space
Nitish Shukla
Sudipta Banerjee
90
8
0
10 Apr 2023
Certifiable Black-Box Attacks with Randomized Adversarial Examples:
  Breaking Defenses with Provable Confidence
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
Hanbin Hong
Xinyu Zhang
Binghui Wang
Zhongjie Ba
Yuan Hong
AAML
81
3
0
10 Apr 2023
Previous
123...515253...166167168
Next