Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1412.6572
Cited By
v1
v2
v3 (latest)
Explaining and Harnessing Adversarial Examples
20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Explaining and Harnessing Adversarial Examples"
50 / 8,363 papers shown
Title
Testing the Channels of Convolutional Neural Networks
Kang Choi
Donghyun Son
Younghoon Kim
Jiwon Seo
65
1
0
06 Mar 2023
Very fast, approximate counterfactual explanations for decision forests
Miguel Á. Carreira-Perpiñán
Suryabhan Singh Hada
49
4
0
06 Mar 2023
Adversarial Sampling for Fairness Testing in Deep Neural Network
Tosin Ige
William Marfo
Justin Tonkinson
Sikiru Adewale
Bolanle Hafiz Matti
OOD
46
9
0
06 Mar 2023
Visual Analytics of Neuron Vulnerability to Adversarial Attacks on Convolutional Neural Networks
Yiran Li
Junpeng Wang
Takanori Fujiwara
Kwan-Liu Ma
AAML
44
6
0
06 Mar 2023
Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Hassan Ali
M. A. Butt
F. Filali
Ala I. Al-Fuqaha
Junaid Qadir
AAML
61
2
0
05 Mar 2023
Demystifying What Code Summarization Models Learned
Yu Wang
Ke Wang
127
0
0
04 Mar 2023
Improved Robustness Against Adaptive Attacks With Ensembles and Error-Correcting Output Codes
Thomas Philippon
Christian Gagné
AAML
40
0
0
04 Mar 2023
Certified Robust Neural Networks: Generalization and Corruption Resistance
Amine Bennouna
Ryan Lucas
Bart P. G. Van Parys
93
10
0
03 Mar 2023
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Christian Westbrook
S. Pasricha
AAML
69
3
0
03 Mar 2023
Multi-Agent Adversarial Training Using Diffusion Learning
Ying Cao
Elsa Rizk
Stefan Vlaski
Ali H. Sayed
DiffM
109
4
0
03 Mar 2023
AdvART: Adversarial Art for Camouflaged Object Detection Attacks
Amira Guesmi
Ioan Marius Bilasco
Mohamed Bennai
Ihsen Alouani
GAN
AAML
89
21
0
03 Mar 2023
DeepLens: Interactive Out-of-distribution Data Detection in NLP Models
D. Song
Zhijie Wang
Yuheng Huang
Lei Ma
Tianyi Zhang
56
4
0
02 Mar 2023
Feature Perturbation Augmentation for Reliable Evaluation of Importance Estimators in Neural Networks
L. Brocki
N. C. Chung
FAtt
AAML
91
11
0
02 Mar 2023
The Double-Edged Sword of Implicit Bias: Generalization vs. Robustness in ReLU Networks
Spencer Frei
Gal Vardi
Peter L. Bartlett
Nathan Srebro
85
17
0
02 Mar 2023
APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation
Amira Guesmi
Muhammad Abdullah Hanif
Ihsen Alouani
Mohamed Bennai
AAML
86
9
0
02 Mar 2023
AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems
Amira Guesmi
Muhammad Abdullah Hanif
Mohamed Bennai
AAML
98
17
0
02 Mar 2023
Rethinking the Effect of Data Augmentation in Adversarial Contrastive Learning
Rundong Luo
Yifei Wang
Yisen Wang
76
26
0
02 Mar 2023
Demystifying Causal Features on Adversarial Examples and Causal Inoculation for Robust Network by Adversarial Instrumental Variable Regression
Junho Kim
Byung-Kwan Lee
Yonghyun Ro
CML
AAML
93
18
0
02 Mar 2023
Defending against Adversarial Audio via Diffusion Model
Shutong Wu
Jiong Wang
Ming-Yu Liu
Weili Nie
Chaowei Xiao
DiffM
86
26
0
02 Mar 2023
Adversarial Examples Exist in Two-Layer ReLU Networks for Low Dimensional Linear Subspaces
Odelia Melamed
Gilad Yehudai
Gal Vardi
GAN
60
2
0
01 Mar 2023
A Practical Upper Bound for the Worst-Case Attribution Deviations
Fan Wang
A. Kong
AAML
101
5
0
01 Mar 2023
Competence-Based Analysis of Language Models
Adam Davies
Jize Jiang
Chengxiang Zhai
ELM
58
5
0
01 Mar 2023
To Make Yourself Invisible with Adversarial Semantic Contours
Yichi Zhang
Zijian Zhu
Hang Su
Jun Zhu
Shibao Zheng
Yuan He
H. Xue
AAML
68
4
0
01 Mar 2023
Combating Exacerbated Heterogeneity for Robust Models in Federated Learning
Jianing Zhu
Jiangchao Yao
Tongliang Liu
Quanming Yao
Jianliang Xu
Bo Han
FedML
76
5
0
01 Mar 2023
Frauds Bargain Attack: Generating Adversarial Text Samples via Word Manipulation Process
Mingze Ni
Zhen-Biao Sun
Wei Liu
AAML
SILM
79
7
0
01 Mar 2023
Transformed Low-Rank Parameterization Can Help Robust Generalization for Tensor Neural Networks
Andong Wang
Chong Li
Mingyuan Bai
Zhong Jin
Guoxu Zhou
Qianchuan Zhao
OOD
AAML
49
5
0
01 Mar 2023
Implicit Bilevel Optimization: Differentiating through Bilevel Optimization Programming
Francesco Alesiani
46
4
0
28 Feb 2023
Improving Model Generalization by On-manifold Adversarial Augmentation in the Frequency Domain
Chang-rui Liu
Wenzhao Xiang
Yuan He
H. Xue
Shibao Zheng
Hang Su
83
4
0
28 Feb 2023
A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking
Chang-Shu Liu
Yinpeng Dong
Wenzhao Xiang
Xiaohu Yang
Hang Su
Junyi Zhu
YueFeng Chen
Yuan He
H. Xue
Shibao Zheng
OOD
VLM
AAML
115
85
0
28 Feb 2023
Adversarial Attack with Raindrops
Jiyuan Liu
Bingyi Lu
Mingkang Xiong
Tao Zhang
Huilin Xiong
65
19
0
28 Feb 2023
GLOW: Global Layout Aware Attacks on Object Detection
Buyu Liu
BaoJun
Jianping Fan
Xi Peng
Kui Ren
Jun Yu
AAML
48
0
0
27 Feb 2023
Physical Adversarial Attacks on Deep Neural Networks for Traffic Sign Recognition: A Feasibility Study
Fabian Woitschek
G. Schneider
AAML
75
9
0
27 Feb 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
93
22
0
27 Feb 2023
CBA: Contextual Background Attack against Optical Aerial Detection in the Physical World
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Shaohui Mei
AAML
136
36
0
27 Feb 2023
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators
Keane Lucas
Matthew Jagielski
Florian Tramèr
Lujo Bauer
Nicholas Carlini
AAML
73
10
0
27 Feb 2023
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data Augmentation
Shaoyan Pan
Shao-Yuan Lo
M. Huang
Chaoqiong Ma
Jacob F. Wynne
Tonghe Wang
Tian Liu
Xiaofeng Yang
OOD
MedIm
66
3
0
25 Feb 2023
Scalable Attribution of Adversarial Attacks via Multi-Task Learning
Zhongyi Guo
Keji Han
Yao Ge
Wei Ji
Yun Li
AAML
77
2
0
25 Feb 2023
SATBA: An Invisible Backdoor Attack Based On Spatial Attention
Huasong Zhou
Xiaowei Xu
Zhenyu Wang
Leon Bevan Bullock
AAML
75
2
0
25 Feb 2023
Denoising diffusion algorithm for inverse design of microstructures with fine-tuned nonlinear material properties
Nikolaos N. Vlassis
WaiChing Sun
AI4CE
DiffM
116
51
0
24 Feb 2023
UnbiasedNets: A Dataset Diversification Framework for Robustness Bias Alleviation in Neural Networks
Mahum Naseer
B. Prabakaran
Osman Hasan
Mohamed Bennai
88
9
0
24 Feb 2023
Frequency and Scale Perspectives of Feature Extraction
Liangqi Zhang
Yihao Luo
Xiang Cao
Haibo Shen
Tianjiang Wang
25
0
0
24 Feb 2023
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks
Chao Hu
Ruishi Yu
Binqi Zeng
Yu Zhan
Ying Fu
Quan Zhang
Rongkai Liu
Heyuan Shi
AAML
69
7
0
24 Feb 2023
Less is More: Data Pruning for Faster Adversarial Training
Yize Li
Pu Zhao
Xinyu Lin
B. Kailkhura
Ryan Goldh
AAML
117
11
0
23 Feb 2023
Boosting Adversarial Transferability using Dynamic Cues
Muzammal Naseer
Ahmad A Mahmood
Salman Khan
Fahad Shahbaz Khan
AAML
66
6
0
23 Feb 2023
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
Boyang Zhang
Xinlei He
Yun Shen
Tianhao Wang
Yang Zhang
AAML
117
3
0
23 Feb 2023
Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Zhengbao He
Tao Li
Sizhe Chen
Xiaolin Huang
AAML
85
4
0
23 Feb 2023
A framework for benchmarking class-out-of-distribution detection and its application to ImageNet
Ido Galil
Mohammed Dabbah
Ran El-Yaniv
UQCV
82
30
0
23 Feb 2023
Mitigating Adversarial Attacks in Deepfake Detection: An Exploration of Perturbation and AI Techniques
S. Dhesi
Laura Fontes
P. Machado
I. Ihianle
Farhad Fassihi Tash
D. Adama
AAML
51
5
0
22 Feb 2023
Singular value decomposition based matrix surgery
Jehan Ghafuri
S. Jassim
23
0
0
22 Feb 2023
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
92
19
0
22 Feb 2023
Previous
1
2
3
...
55
56
57
...
166
167
168
Next