ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,364 papers shown
Title
Translate your gibberish: black-box adversarial attack on machine
  translation systems
Translate your gibberish: black-box adversarial attack on machine translation systems
Andrei Chertkov
Olga Tsymboi
Mikhail Aleksandrovich Pautov
Ivan Oseledets
AAML
55
3
0
20 Mar 2023
AdaptGuard: Defending Against Universal Attacks for Model Adaptation
AdaptGuard: Defending Against Universal Attacks for Model Adaptation
Lijun Sheng
Jian Liang
Ran He
Zilei Wang
Tien-Ping Tan
AAML
117
5
0
19 Mar 2023
FedRight: An Effective Model Copyright Protection for Federated Learning
FedRight: An Effective Model Copyright Protection for Federated Learning
Jinyin Chen
Mingjun Li
Mingjun Li
Haibin Zheng
FedML
39
15
0
18 Mar 2023
Detection of Uncertainty in Exceedance of Threshold (DUET): An
  Adversarial Patch Localizer
Detection of Uncertainty in Exceedance of Threshold (DUET): An Adversarial Patch Localizer
Terence Jie Chua
Wen-li Yu
Junfeng Zhao
AAMLUQCV
69
1
0
18 Mar 2023
Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural
  Network Robustness Against Diversified $\ell_p$ Attacks
Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified ℓp\ell_pℓp​ Attacks
Ren Wang
Yuxuan Li
Sijia Liu
AAML
75
0
0
17 Mar 2023
Fuzziness-tuned: Improving the Transferability of Adversarial Examples
Fuzziness-tuned: Improving the Transferability of Adversarial Examples
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
61
0
0
17 Mar 2023
Iterative Partial Fulfillment of Counterfactual Explanations: Benefits
  and Risks
Iterative Partial Fulfillment of Counterfactual Explanations: Benefits and Risks
Yilun Zhou
67
0
0
17 Mar 2023
Finding Competence Regions in Domain Generalization
Finding Competence Regions in Domain Generalization
Jens Müller
Stefan T. Radev
R. Schmier
Felix Dräxler
Carsten Rother
Ullrich Kothe
79
4
0
17 Mar 2023
Adversarial Counterfactual Visual Explanations
Adversarial Counterfactual Visual Explanations
Guillaume Jeanneret
Loïc Simon
F. Jurie
DiffM
102
29
0
17 Mar 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial
  Robustness
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILMAAML
102
11
0
17 Mar 2023
Exorcising ''Wraith'': Protecting LiDAR-based Object Detector in
  Automated Driving System from Appearing Attacks
Exorcising ''Wraith'': Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks
Qifan Xiao
Xudong Pan
Yifan Lu
Mi Zhang
Jiarun Dai
Min Yang
AAML
63
6
0
17 Mar 2023
Diffusion-based Target Sampler for Unsupervised Domain Adaptation
Diffusion-based Target Sampler for Unsupervised Domain Adaptation
Yulong Zhang
Shuhao Chen
Yu Zhang
Jiangang Lu
DiffM
85
0
0
17 Mar 2023
Among Us: Adversarially Robust Collaborative Perception by Consensus
Among Us: Adversarially Robust Collaborative Perception by Consensus
Yiming Li
Qi Fang
Jiamu Bai
Siheng Chen
Felix Juefei Xu
Chen Feng
AAML
61
28
0
16 Mar 2023
Class Attribute Inference Attacks: Inferring Sensitive Class Information
  by Diffusion-Based Attribute Manipulations
Class Attribute Inference Attacks: Inferring Sensitive Class Information by Diffusion-Based Attribute Manipulations
Lukas Struppek
Dominik Hintersdorf
Felix Friedrich
Manuel Brack
P. Schramowski
Kristian Kersting
MIACV
68
2
0
16 Mar 2023
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Huanran Chen
Yichi Zhang
Yinpeng Dong
Xiao Yang
Hang Su
Junyi Zhu
AAML
111
70
0
16 Mar 2023
Agnostic Multi-Robust Learning Using ERM
Agnostic Multi-Robust Learning Using ERM
Saba Ahmadi
Avrim Blum
Omar Montasser
Kevin Stangl
AAMLOOD
53
0
0
15 Mar 2023
The Devil's Advocate: Shattering the Illusion of Unexploitable Data
  using Diffusion Models
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
H. M. Dolatabadi
S. Erfani
C. Leckie
DiffM
119
19
0
15 Mar 2023
Exploring Resiliency to Natural Image Corruptions in Deep Learning using
  Design Diversity
Exploring Resiliency to Natural Image Corruptions in Deep Learning using Design Diversity
Rafael Rosales
Pablo Munoz
Michael Paulitsch
73
2
0
15 Mar 2023
Improving Adversarial Robustness with Hypersphere Embedding and
  Angular-based Regularizations
Improving Adversarial Robustness with Hypersphere Embedding and Angular-based Regularizations
Olukorede Fakorede
Ashutosh Nirala
Modeste Atsague
Jin Tian
AAML
38
5
0
15 Mar 2023
NL4Opt Competition: Formulating Optimization Problems Based on Their
  Natural Language Descriptions
NL4Opt Competition: Formulating Optimization Problems Based on Their Natural Language Descriptions
Rindranirina Ramamonjison
Timothy T. Yu
Raymond Li
Haley Li
Giuseppe Carenini
...
Shiqi He
Mahdi Mostajabdaveh
Amin Banitalebi-Dehkordi
Zirui Zhou
Yong Zhang
89
42
0
14 Mar 2023
Allegro-Legato: Scalable, Fast, and Robust Neural-Network Quantum
  Molecular Dynamics via Sharpness-Aware Minimization
Allegro-Legato: Scalable, Fast, and Robust Neural-Network Quantum Molecular Dynamics via Sharpness-Aware Minimization
Hikaru Ibayashi
Taufeq Mohammed Razakh
Liqiu Yang
T. Linker
M. Olguin
...
Ye Luo
R. Kalia
A. Nakano
K. Nomura
P. Vashishta
79
9
0
14 Mar 2023
AdPE: Adversarial Positional Embeddings for Pretraining Vision
  Transformers via MAE+
AdPE: Adversarial Positional Embeddings for Pretraining Vision Transformers via MAE+
Tianlin Li
Ying Wang
Ziwei Xuan
Guo-Jun Qi
ViT
75
3
0
14 Mar 2023
SMUG: Towards robust MRI reconstruction by smoothed unrolling
SMUG: Towards robust MRI reconstruction by smoothed unrolling
Hui Li
Jinghan Jia
Shijun Liang
Yuguang Yao
S. Ravishankar
Sijia Liu
90
4
0
14 Mar 2023
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Yuguang Yao
Jiancheng Liu
Yifan Gong
Xiaoming Liu
Yanzhi Wang
Xinyu Lin
Sijia Liu
AAMLMLAU
101
1
0
13 Mar 2023
Model Extraction Attacks on Split Federated Learning
Model Extraction Attacks on Split Federated Learning
Jingtao Li
Adnan Siraj Rakin
Xing Chen
Li Yang
Zhezhi He
Deliang Fan
C. Chakrabarti
FedML
129
6
0
13 Mar 2023
PoseExaminer: Automated Testing of Out-of-Distribution Robustness in
  Human Pose and Shape Estimation
PoseExaminer: Automated Testing of Out-of-Distribution Robustness in Human Pose and Shape Estimation
Qihao Liu
Adam Kortylewski
Alan Yuille
OODD
100
13
0
13 Mar 2023
Model-tuning Via Prompts Makes NLP Models Adversarially Robust
Model-tuning Via Prompts Makes NLP Models Adversarially Robust
Mrigank Raman
Pratyush Maini
J. Zico Kolter
Zachary Chase Lipton
Danish Pruthi
AAML
71
17
0
13 Mar 2023
Review on the Feasibility of Adversarial Evasion Attacks and Defenses
  for Network Intrusion Detection Systems
Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems
Islam Debicha
Benjamin Cochez
Tayeb Kenaza
Thibault Debatty
Jean-Michel Dricot
Wim Mees
AAML
55
5
0
13 Mar 2023
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion
  Detection Systems
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems
Islam Debicha
Benjamin Cochez
Tayeb Kenaza
Thibault Debatty
Jean-Michel Dricot
Wim Mees
AAML
64
37
0
12 Mar 2023
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented
  Reality
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality
Weiquan Liu
Shijun Zheng
Cheng-i Wang
3DPCAAML
55
2
0
12 Mar 2023
Making Batch Normalization Great in Federated Deep Learning
Making Batch Normalization Great in Federated Deep Learning
Shitian Zhao
Hong-You Chen
Wei-Lun Chao
FedML
144
11
0
12 Mar 2023
Improving the Robustness of Deep Convolutional Neural Networks Through
  Feature Learning
Improving the Robustness of Deep Convolutional Neural Networks Through Feature Learning
Jin Ding
Jie-Chao Zhao
Yongyang Sun
Ping Tan
Ji-en Ma
You-tong Fang
AAML
83
1
0
11 Mar 2023
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
  Contemporary Survey
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Yulong Wang
Tong Sun
Shenghong Li
Xinnan Yuan
W. Ni
Ekram Hossain
H. Vincent Poor
AAML
107
19
0
11 Mar 2023
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against
  Black-box Attacks
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks
Ryan Feng
Ashish Hooda
Neal Mangaokar
Kassem Fawaz
S. Jha
Atul Prakash
AAML
122
14
0
11 Mar 2023
Do we need entire training data for adversarial training?
Do we need entire training data for adversarial training?
Vipul Gupta
Apurva Narayan
AAML
70
1
0
10 Mar 2023
Estimating friction coefficient using generative modelling
Estimating friction coefficient using generative modelling
Mohammad Otoofi
William J. B. Midgley
L. Laine
Henderson Leon
L. Justham
James Fleming
36
2
0
10 Mar 2023
Adapting Contrastive Language-Image Pretrained (CLIP) Models for
  Out-of-Distribution Detection
Adapting Contrastive Language-Image Pretrained (CLIP) Models for Out-of-Distribution Detection
Nikolas Adaloglou
Félix D. P. Michels
Tim Kaiser
M. Kollmann
VLM
67
0
0
10 Mar 2023
Boosting Adversarial Attacks by Leveraging Decision Boundary Information
Boosting Adversarial Attacks by Leveraging Decision Boundary Information
Boheng Zeng
LianLi Gao
Qilong Zhang
Chaoqun Li
JingKuan Song
Shuaiqi Jing
AAML
112
2
0
10 Mar 2023
NoiseCAM: Explainable AI for the Boundary Between Noise and Adversarial
  Attacks
NoiseCAM: Explainable AI for the Boundary Between Noise and Adversarial Attacks
Wen-Xi Tan
Justus Renkhoff
Alvaro Velasquez
Ziyu Wang
Lu Li
Jian Wang
Shuteng Niu
Fan Yang
Yongxin Liu
Haoze Song
AAML
66
6
0
09 Mar 2023
Evaluating the Robustness of Conversational Recommender Systems by
  Adversarial Examples
Evaluating the Robustness of Conversational Recommender Systems by Adversarial Examples
Ali Montazeralghaem
James Allan
AAMLSILM
86
0
0
09 Mar 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the
  Generation of Adversarial Examples
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
Jinwei Wang
Hao Wu
Haihua Wang
Jiawei Zhang
X. Luo
Bin Ma
AAML
59
0
0
08 Mar 2023
Exploring Adversarial Attacks on Neural Networks: An Explainable
  Approach
Exploring Adversarial Attacks on Neural Networks: An Explainable Approach
Justus Renkhoff
Wenkai Tan
Alvaro Velasquez
William Yichen Wang
Yongxin Liu
Jian Wang
Shuteng Niu
Lejla Begic Fazlic
Guido Dartmann
Haoze Song
AAML
85
7
0
08 Mar 2023
Automatically Auditing Large Language Models via Discrete Optimization
Automatically Auditing Large Language Models via Discrete Optimization
Erik Jones
Anca Dragan
Aditi Raghunathan
Jacob Steinhardt
119
172
0
08 Mar 2023
CUDA: Convolution-based Unlearnable Datasets
CUDA: Convolution-based Unlearnable Datasets
Vinu Sankar Sadasivan
Mahdi Soltanolkotabi
Soheil Feizi
MU
67
25
0
07 Mar 2023
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial
  Attacks on Object Detectors
Patch of Invisibility: Naturalistic Physical Black-Box Adversarial Attacks on Object Detectors
Raz Lapid
Eylon Mizrahi
Moshe Sipper
AAML
64
1
0
07 Mar 2023
Robustness-preserving Lifelong Learning via Dataset Condensation
Robustness-preserving Lifelong Learning via Dataset Condensation
Jinghan Jia
Yihua Zhang
Dogyoon Song
Sijia Liu
Alfred Hero
DD
67
5
0
07 Mar 2023
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack
  by Logit Calibration
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration
Juanjuan Weng
Zhiming Luo
Zhun Zhong
Shaozi Li
N. Sebe
AAML
81
19
0
07 Mar 2023
Nash Equilibria, Regularization and Computation in Optimal Transport-Based Distributionally Robust Optimization
Nash Equilibria, Regularization and Computation in Optimal Transport-Based Distributionally Robust Optimization
Soroosh Shafieezadeh-Abadeh
Liviu Aolaritei
Florian Dorfler
Daniel Kuhn
152
20
0
07 Mar 2023
A Comparison of Methods for Neural Network Aggregation
A Comparison of Methods for Neural Network Aggregation
John Pomerat
Aviv Segev
OODFedML
41
0
0
06 Mar 2023
Convolutional Neural Networks as 2-D systems
Convolutional Neural Networks as 2-D systems
Dennis Gramlich
Patricia Pauli
C. Scherer
Frank Allgöwer
C. Ebenbauer
3DV
56
8
0
06 Mar 2023
Previous
123...545556...166167168
Next