ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,361 papers shown
Title
Testing the Channels of Convolutional Neural Networks
Testing the Channels of Convolutional Neural Networks
Kang Choi
Donghyun Son
Younghoon Kim
Jiwon Seo
65
1
0
06 Mar 2023
Very fast, approximate counterfactual explanations for decision forests
Very fast, approximate counterfactual explanations for decision forests
Miguel Á. Carreira-Perpiñán
Suryabhan Singh Hada
49
4
0
06 Mar 2023
Adversarial Sampling for Fairness Testing in Deep Neural Network
Adversarial Sampling for Fairness Testing in Deep Neural Network
Tosin Ige
William Marfo
Justin Tonkinson
Sikiru Adewale
Bolanle Hafiz Matti
OOD
46
9
0
06 Mar 2023
Visual Analytics of Neuron Vulnerability to Adversarial Attacks on
  Convolutional Neural Networks
Visual Analytics of Neuron Vulnerability to Adversarial Attacks on Convolutional Neural Networks
Yiran Li
Junpeng Wang
Takanori Fujiwara
Kwan-Liu Ma
AAML
44
6
0
06 Mar 2023
Consistent Valid Physically-Realizable Adversarial Attack against
  Crowd-flow Prediction Models
Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Hassan Ali
M. A. Butt
F. Filali
Ala I. Al-Fuqaha
Junaid Qadir
AAML
61
2
0
05 Mar 2023
Demystifying What Code Summarization Models Learned
Demystifying What Code Summarization Models Learned
Yu Wang
Ke Wang
127
0
0
04 Mar 2023
Improved Robustness Against Adaptive Attacks With Ensembles and
  Error-Correcting Output Codes
Improved Robustness Against Adaptive Attacks With Ensembles and Error-Correcting Output Codes
Thomas Philippon
Christian Gagné
AAML
40
0
0
04 Mar 2023
Certified Robust Neural Networks: Generalization and Corruption
  Resistance
Certified Robust Neural Networks: Generalization and Corruption Resistance
Amine Bennouna
Ryan Lucas
Bart P. G. Van Parys
93
10
0
03 Mar 2023
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Christian Westbrook
S. Pasricha
AAML
69
3
0
03 Mar 2023
Multi-Agent Adversarial Training Using Diffusion Learning
Multi-Agent Adversarial Training Using Diffusion Learning
Ying Cao
Elsa Rizk
Stefan Vlaski
Ali H. Sayed
DiffM
109
4
0
03 Mar 2023
AdvART: Adversarial Art for Camouflaged Object Detection Attacks
AdvART: Adversarial Art for Camouflaged Object Detection Attacks
Amira Guesmi
Ioan Marius Bilasco
Mohamed Bennai
Ihsen Alouani
GANAAML
89
21
0
03 Mar 2023
DeepLens: Interactive Out-of-distribution Data Detection in NLP Models
DeepLens: Interactive Out-of-distribution Data Detection in NLP Models
D. Song
Zhijie Wang
Yuheng Huang
Lei Ma
Tianyi Zhang
56
4
0
02 Mar 2023
Feature Perturbation Augmentation for Reliable Evaluation of Importance
  Estimators in Neural Networks
Feature Perturbation Augmentation for Reliable Evaluation of Importance Estimators in Neural Networks
L. Brocki
N. C. Chung
FAttAAML
91
11
0
02 Mar 2023
The Double-Edged Sword of Implicit Bias: Generalization vs. Robustness
  in ReLU Networks
The Double-Edged Sword of Implicit Bias: Generalization vs. Robustness in ReLU Networks
Spencer Frei
Gal Vardi
Peter L. Bartlett
Nathan Srebro
85
17
0
02 Mar 2023
APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth
  Estimation for Autonomous Navigation
APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation
Amira Guesmi
Muhammad Abdullah Hanif
Ihsen Alouani
Mohamed Bennai
AAML
86
9
0
02 Mar 2023
AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision
  Systems
AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems
Amira Guesmi
Muhammad Abdullah Hanif
Mohamed Bennai
AAML
98
17
0
02 Mar 2023
Rethinking the Effect of Data Augmentation in Adversarial Contrastive
  Learning
Rethinking the Effect of Data Augmentation in Adversarial Contrastive Learning
Rundong Luo
Yifei Wang
Yisen Wang
76
26
0
02 Mar 2023
Demystifying Causal Features on Adversarial Examples and Causal
  Inoculation for Robust Network by Adversarial Instrumental Variable
  Regression
Demystifying Causal Features on Adversarial Examples and Causal Inoculation for Robust Network by Adversarial Instrumental Variable Regression
Junho Kim
Byung-Kwan Lee
Yonghyun Ro
CMLAAML
93
18
0
02 Mar 2023
Defending against Adversarial Audio via Diffusion Model
Defending against Adversarial Audio via Diffusion Model
Shutong Wu
Jiong Wang
Ming-Yu Liu
Weili Nie
Chaowei Xiao
DiffM
86
26
0
02 Mar 2023
Adversarial Examples Exist in Two-Layer ReLU Networks for Low
  Dimensional Linear Subspaces
Adversarial Examples Exist in Two-Layer ReLU Networks for Low Dimensional Linear Subspaces
Odelia Melamed
Gilad Yehudai
Gal Vardi
GAN
60
2
0
01 Mar 2023
A Practical Upper Bound for the Worst-Case Attribution Deviations
A Practical Upper Bound for the Worst-Case Attribution Deviations
Fan Wang
A. Kong
AAML
101
5
0
01 Mar 2023
Competence-Based Analysis of Language Models
Competence-Based Analysis of Language Models
Adam Davies
Jize Jiang
Chengxiang Zhai
ELM
58
5
0
01 Mar 2023
To Make Yourself Invisible with Adversarial Semantic Contours
To Make Yourself Invisible with Adversarial Semantic Contours
Yichi Zhang
Zijian Zhu
Hang Su
Jun Zhu
Shibao Zheng
Yuan He
H. Xue
AAML
68
4
0
01 Mar 2023
Combating Exacerbated Heterogeneity for Robust Models in Federated
  Learning
Combating Exacerbated Heterogeneity for Robust Models in Federated Learning
Jianing Zhu
Jiangchao Yao
Tongliang Liu
Quanming Yao
Jianliang Xu
Bo Han
FedML
76
5
0
01 Mar 2023
Frauds Bargain Attack: Generating Adversarial Text Samples via Word
  Manipulation Process
Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
Mingze Ni
Zhen-Biao Sun
Wei Liu
AAMLSILM
79
7
0
01 Mar 2023
Transformed Low-Rank Parameterization Can Help Robust Generalization for
  Tensor Neural Networks
Transformed Low-Rank Parameterization Can Help Robust Generalization for Tensor Neural Networks
Andong Wang
Chong Li
Mingyuan Bai
Zhong Jin
Guoxu Zhou
Qianchuan Zhao
OODAAML
49
5
0
01 Mar 2023
Implicit Bilevel Optimization: Differentiating through Bilevel
  Optimization Programming
Implicit Bilevel Optimization: Differentiating through Bilevel Optimization Programming
Francesco Alesiani
46
4
0
28 Feb 2023
Improving Model Generalization by On-manifold Adversarial Augmentation
  in the Frequency Domain
Improving Model Generalization by On-manifold Adversarial Augmentation in the Frequency Domain
Chang-rui Liu
Wenzhao Xiang
Yuan He
H. Xue
Shibao Zheng
Hang Su
83
4
0
28 Feb 2023
A Comprehensive Study on Robustness of Image Classification Models:
  Benchmarking and Rethinking
A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking
Chang-Shu Liu
Yinpeng Dong
Wenzhao Xiang
Xiaohu Yang
Hang Su
Junyi Zhu
YueFeng Chen
Yuan He
H. Xue
Shibao Zheng
OODVLMAAML
115
85
0
28 Feb 2023
Adversarial Attack with Raindrops
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
65
19
0
28 Feb 2023
GLOW: Global Layout Aware Attacks on Object Detection
GLOW: Global Layout Aware Attacks on Object Detection
Buyu Liu
BaoJun
Jianping Fan
Xi Peng
Kui Ren
Jun Yu
AAML
48
0
0
27 Feb 2023
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign
  Recognition: A Feasibility Study
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign Recognition: A Feasibility Study
Fabian Woitschek
G. Schneider
AAML
75
9
0
27 Feb 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
93
22
0
27 Feb 2023
CBA: Contextual Background Attack against Optical Aerial Detection in
  the Physical World
CBA: Contextual Background Attack against Optical Aerial Detection in the Physical World
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Shaohui Mei
AAML
136
36
0
27 Feb 2023
Randomness in ML Defenses Helps Persistent Attackers and Hinders
  Evaluators
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators
Keane Lucas
Matthew Jagielski
Florian Tramèr
Lujo Bauer
Nicholas Carlini
AAML
73
10
0
27 Feb 2023
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data
  Augmentation
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data Augmentation
Shaoyan Pan
Shao-Yuan Lo
M. Huang
Chaoqiong Ma
Jacob F. Wynne
Tonghe Wang
Tian Liu
Xiaofeng Yang
OODMedIm
66
3
0
25 Feb 2023
Scalable Attribution of Adversarial Attacks via Multi-Task Learning
Scalable Attribution of Adversarial Attacks via Multi-Task Learning
Zhongyi Guo
Keji Han
Yao Ge
Wei Ji
Yun Li
AAML
77
2
0
25 Feb 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
75
2
0
25 Feb 2023
Denoising diffusion algorithm for inverse design of microstructures with
  fine-tuned nonlinear material properties
Denoising diffusion algorithm for inverse design of microstructures with fine-tuned nonlinear material properties
Nikolaos N. Vlassis
WaiChing Sun
AI4CEDiffM
116
51
0
24 Feb 2023
UnbiasedNets: A Dataset Diversification Framework for Robustness Bias
  Alleviation in Neural Networks
UnbiasedNets: A Dataset Diversification Framework for Robustness Bias Alleviation in Neural Networks
Mahum Naseer
B. Prabakaran
Osman Hasan
Mohamed Bennai
88
9
0
24 Feb 2023
Frequency and Scale Perspectives of Feature Extraction
Frequency and Scale Perspectives of Feature Extraction
Liangqi Zhang
Yihao Luo
Xiang Cao
Haibo Shen
Tianjiang Wang
25
0
0
24 Feb 2023
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure
  Attack of Hypergraph Neural Networks
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks
Chao Hu
Ruishi Yu
Binqi Zeng
Yu Zhan
Ying Fu
Quan Zhang
Rongkai Liu
Heyuan Shi
AAML
69
7
0
24 Feb 2023
Less is More: Data Pruning for Faster Adversarial Training
Less is More: Data Pruning for Faster Adversarial Training
Yize Li
Pu Zhao
Xinyu Lin
B. Kailkhura
Ryan Goldh
AAML
117
11
0
23 Feb 2023
Boosting Adversarial Transferability using Dynamic Cues
Boosting Adversarial Transferability using Dynamic Cues
Muzammal Naseer
Ahmad A Mahmood
Salman Khan
Fahad Shahbaz Khan
AAML
66
6
0
23 Feb 2023
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via
  Scientific Plots
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
Boyang Zhang
Xinlei He
Yun Shen
Tianhao Wang
Yang Zhang
AAML
117
3
0
23 Feb 2023
Investigating Catastrophic Overfitting in Fast Adversarial Training: A
  Self-fitting Perspective
Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Zhengbao He
Tao Li
Sizhe Chen
Xiaolin Huang
AAML
85
4
0
23 Feb 2023
A framework for benchmarking class-out-of-distribution detection and its
  application to ImageNet
A framework for benchmarking class-out-of-distribution detection and its application to ImageNet
Ido Galil
Mohammed Dabbah
Ran El-Yaniv
UQCV
82
30
0
23 Feb 2023
Mitigating Adversarial Attacks in Deepfake Detection: An Exploration of
  Perturbation and AI Techniques
Mitigating Adversarial Attacks in Deepfake Detection: An Exploration of Perturbation and AI Techniques
S. Dhesi
Laura Fontes
P. Machado
I. Ihianle
Farhad Fassihi Tash
D. Adama
AAML
51
5
0
22 Feb 2023
Singular value decomposition based matrix surgery
Singular value decomposition based matrix surgery
Jehan Ghafuri
S. Jassim
23
0
0
22 Feb 2023
PAD: Towards Principled Adversarial Malware Detection Against Evasion
  Attacks
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
92
19
0
22 Feb 2023
Previous
123...555657...166167168
Next