Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1412.6572
Cited By
v1
v2
v3 (latest)
Explaining and Harnessing Adversarial Examples
20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Explaining and Harnessing Adversarial Examples"
50 / 8,367 papers shown
Title
Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
AAML
81
22
0
26 Apr 2023
Generating Adversarial Examples with Task Oriented Multi-Objective Optimization
Anh-Vu Bui
Trung Le
He Zhao
Quan Hung Tran
Paul Montague
Dinh Q. Phung
AAML
68
0
0
26 Apr 2023
Certifying Ensembles: A General Certification Theory with S-Lipschitzness
Aleksandar Petrov
Francisco Eiras
Amartya Sanyal
Philip Torr
Adel Bibi
UQCV
70
1
0
25 Apr 2023
Lyapunov-Stable Deep Equilibrium Models
Haoyu Chu
Shikui Wei
Ting Liu
Yao-Min Zhao
Yuto Miyatake
AAML
71
5
0
25 Apr 2023
Combining Adversaries with Anti-adversaries in Training
Xiaoling Zhou
Nan Yang
Ou Wu
AAML
67
9
0
25 Apr 2023
Hint-Aug: Drawing Hints from Foundation Vision Transformers Towards Boosted Few-Shot Parameter-Efficient Tuning
Zhongzhi Yu
Shang Wu
Y. Fu
Shunyao Zhang
Yingyan Lin
86
6
0
25 Apr 2023
Evaluating Adversarial Robustness on Document Image Classification
Timothée Fronteau
Arnaud Paran
A. Shabou
AAML
85
3
0
24 Apr 2023
Robust Tickets Can Transfer Better: Drawing More Transferable Subnetworks in Transfer Learning
Y. Fu
Ye Yuan
Shang Wu
Jiayi Yuan
Yingyan Lin
OOD
128
3
0
24 Apr 2023
Can Decentralized Stochastic Minimax Optimization Algorithms Converge Linearly for Finite-Sum Nonconvex-Nonconcave Problems?
Yihan Zhang
Wenhao Jiang
Feng-Song Zheng
C. C. Tan
Xinghua Shi
Hongchang Gao
53
1
0
24 Apr 2023
SketchXAI: A First Look at Explainability for Human Sketches
Zhiyu Qu
Yulia Gryaditskaya
Ke Li
Kaiyue Pang
Tao Xiang
Yi-Zhe Song
89
8
0
23 Apr 2023
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou
Qing Guo
Yihao Huang
Xiaofei Xie
Lei Ma
Jianjun Zhao
AAML
89
53
0
23 Apr 2023
StyLess: Boosting the Transferability of Adversarial Examples
Kaisheng Liang
Bin Xiao
AAML
71
18
0
23 Apr 2023
Universal Adversarial Backdoor Attacks to Fool Vertical Federated Learning in Cloud-Edge Collaboration
Peng Chen
Xin Du
Zhihui Lu
Hongfeng Chai
FedML
AAML
98
11
0
22 Apr 2023
Detecting Adversarial Faces Using Only Real Face Self-Perturbations
Qian Wang
Yongqin Xian
H. Ling
Jinyuan Zhang
Xiaorui Lin
Ping Li
Jiazhong Chen
Ning Yu
AAML
65
9
0
22 Apr 2023
Individual Fairness in Bayesian Neural Networks
Alice Doherty
Matthew Wicker
Luca Laurenti
A. Patané
147
5
0
21 Apr 2023
RoCOCO: Robustness Benchmark of MS-COCO to Stress-test Image-Text Matching Models
Seulki Park
Daeho Um
Hajung Yoon
Sanghyuk Chun
Sangdoo Yun
Hawook Jeong
95
3
0
21 Apr 2023
Certified Adversarial Robustness Within Multiple Perturbation Bounds
Soumalya Nandi
Sravanti Addepalli
Harsh Rangwani
R. Venkatesh Babu
AAML
66
3
0
20 Apr 2023
Using Z3 for Formal Modeling and Verification of FNN Global Robustness
Yihao Zhang
Zeming Wei
Xiyue Zhang
Meng Sun
AAML
72
6
0
20 Apr 2023
Can Perturbations Help Reduce Investment Risks? Risk-Aware Stock Recommendation via Split Variational Adversarial Training
Jiezhu Cheng
Kaizhu Huang
Zibin Zheng
AAML
69
0
0
20 Apr 2023
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
129
22
0
20 Apr 2023
Federated Compositional Deep AUC Maximization
Xinwen Zhang
Yihang Zhang
Tianbao Yang
Richard Souvenir
Hongchang Gao
FedML
105
8
0
20 Apr 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
59
4
0
20 Apr 2023
Open-World Continual Learning: Unifying Novelty Detection and Continual Learning
Gyuhak Kim
Changnan Xiao
Tatsuya Konishi
Zixuan Ke
Bin Liu
CLL
OODD
77
15
0
20 Apr 2023
Jedi: Entropy-based Localization and Removal of Adversarial Patches
Bilel Tarchoun
Anouar Ben Khalifa
Mohamed Ali Mahjoub
Nael B. Abu-Ghazaleh
Ihsen Alouani
AAML
73
25
0
20 Apr 2023
GREAT Score: Global Robustness Evaluation of Adversarial Perturbation using Generative Models
Zaitang Li
Pin-Yu Chen
Tsung-Yi Ho
AAML
DiffM
50
4
0
19 Apr 2023
Wavelets Beat Monkeys at Adversarial Robustness
Jingtong Su
Julia Kempe
AAML
OOD
45
2
0
19 Apr 2023
Robustness of Visual Explanations to Common Data Augmentation
Lenka Tětková
Lars Kai Hansen
AAML
62
6
0
18 Apr 2023
Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang
Zhaoxi Zhang
Qi Zhong
Xufei Zheng
Yanjun Zhang
Shengshan Hu
L. Zhang
AAML
101
2
0
18 Apr 2023
AI Product Security: A Primer for Developers
Ebenezer R. H. P. Isaac
J. Reno
36
2
0
18 Apr 2023
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Yunruo Zhang
Tianyu Du
S. Ji
Peng Tang
Shanqing Guo
AAML
64
2
0
17 Apr 2023
Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke
Julian Speith
Janka Möller
Konrad Rieck
C. Paar
AAML
211
3
0
17 Apr 2023
A Random-patch based Defense Strategy Against Physical Attacks for Face Recognition Systems
Jiahao Xie
Ye Luo
Jianwei Lu
AAML
CVBM
35
3
0
16 Apr 2023
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
M. Kozák
M. Jureček
AAML
29
1
0
14 Apr 2023
Cross-Entropy Loss Functions: Theoretical Analysis and Applications
Anqi Mao
M. Mohri
Yutao Zhong
AAML
123
332
0
14 Apr 2023
Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Jingyuan Wang
Yufan Wu
Mingxuan Li
Xin Lin
Junjie Wu
Chao Li
AAML
64
13
0
14 Apr 2023
Generating Adversarial Examples with Better Transferability via Masking Unimportant Parameters of Surrogate Model
Dingcheng Yang
Wenjian Yu
Zihao Xiao
Jiaqi Luo
AAML
DiffM
60
5
0
14 Apr 2023
RoboBEV: Towards Robust Bird's Eye View Perception under Corruptions
Shaoyuan Xie
Lingdong Kong
Wenwei Zhang
Jiawei Ren
Liang Pan
Kai-xiang Chen
Ziwei Liu
95
25
0
13 Apr 2023
False Claims against Model Ownership Resolution
Jian Liu
Rui Zhang
S. Szyller
Kui Ren
Nirmal Asokan
AAML
MLAU
123
12
0
13 Apr 2023
Adversarial Examples from Dimensional Invariance
Benjamin L. Badger
58
0
0
13 Apr 2023
Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser
Astha Verma
A. Subramanyam
Siddhesh Bangar
Naman Lal
R. Shah
Shiníchi Satoh
123
5
0
13 Apr 2023
Understanding Overfitting in Adversarial Training via Kernel Regression
Teng Zhang
Kang Li
63
2
0
13 Apr 2023
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
M. Ferrag
Djallel Hamouda
Merouane Debbah
Leandros A. Maglaras
Abderrahmane Lakas
64
9
0
12 Apr 2023
Towards More Robust and Accurate Sequential Recommendation with Cascade-guided Adversarial Training
Juntao Tan
Shelby Heinecke
Zhiwei Liu
Yong-Guang Chen
Yongfeng Zhang
Haiquan Wang
AAML
68
5
0
11 Apr 2023
Overload: Latency Attacks on Object Detection for Edge Devices
Erh-Chung Chen
Pin-Yu Chen
I-Hsin Chung
Che-Rung Lee
AAML
110
15
0
11 Apr 2023
Boosting Cross-task Transferability of Adversarial Patches with Visual Relations
Tony Ma
Songze Li
Yisong Xiao
Shunchang Liu
57
1
0
11 Apr 2023
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense
Yue-li Cui
Syed Imran Ali Meerza
Zhuohang Li
Luyang Liu
Jiaxin Zhang
Jian-Dong Liu
AAML
FedML
91
5
0
11 Apr 2023
Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Inderjeet Singh
Kazuya Kakizaki
Toshinori Araki
CVBM
AAML
PICV
54
0
0
11 Apr 2023
Evaluation of Test-Time Adaptation Under Computational Time Constraints
Motasem Alfarra
Hani Itani
Alejandro Pardo
Shyma Alhuwaider
Merey Ramazanova
Juan C. Pérez
Zhipeng Cai
Matthias Müller
Guohao Li
TTA
97
4
0
10 Apr 2023
Generating Adversarial Attacks in the Latent Space
Nitish Shukla
Sudipta Banerjee
90
8
0
10 Apr 2023
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
Hanbin Hong
Xinyu Zhang
Binghui Wang
Zhongjie Ba
Yuan Hong
AAML
81
3
0
10 Apr 2023
Previous
1
2
3
...
51
52
53
...
166
167
168
Next