ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.6572
  4. Cited By
Explaining and Harnessing Adversarial Examples
v1v2v3 (latest)

Explaining and Harnessing Adversarial Examples

20 December 2014
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "Explaining and Harnessing Adversarial Examples"

50 / 8,337 papers shown
Title
Self-Healing Robust Neural Networks via Closed-Loop Control
Self-Healing Robust Neural Networks via Closed-Loop Control
Zhuotong Chen
Qianxiao Li
Zheng Zhang
AAMLOOD
26
11
0
26 Jun 2022
Defending Multimodal Fusion Models against Single-Source Adversaries
Defending Multimodal Fusion Models against Single-Source Adversaries
Karren D. Yang
Wan-Yi Lin
M. Barman
Filipe Condessa
Zico Kolter
AAML
63
32
0
25 Jun 2022
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
Baoyuan Wu
Hongrui Chen
Ruotong Wang
Zihao Zhu
Shaokui Wei
Danni Yuan
Chaoxiao Shen
ELMAAML
138
146
0
25 Jun 2022
Adversarial Self-Attention for Language Understanding
Adversarial Self-Attention for Language Understanding
Hongqiu Wu
Ruixue Ding
Hai Zhao
Pengjun Xie
Fei Huang
Min Zhang
81
12
0
25 Jun 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition
  using a Mobile and Compact Printer
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAMLCVBM
79
5
0
25 Jun 2022
QAGAN: Adversarial Approach To Learning Domain Invariant Language
  Features
QAGAN: Adversarial Approach To Learning Domain Invariant Language Features
Shubham Shrivastava
Kaiyue Wang
OOD
75
2
0
24 Jun 2022
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal
  Verification Perspective
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
Mark Huasong Meng
Guangdong Bai
Sin Gee Teo
Zhe Hou
Yan Xiao
Yun Lin
Jin Song Dong
AAML
81
44
0
24 Jun 2022
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail
  Problems
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
Wen-ming Hou
Qianqian Xu
Zhiyong Yang
Shilong Bao
Yuan He
Qingming Huang
AAML
80
6
0
24 Jun 2022
DialogID: A Dialogic Instruction Dataset for Improving Teaching
  Effectiveness in Online Environments
DialogID: A Dialogic Instruction Dataset for Improving Teaching Effectiveness in Online Environments
Jiahao Chen
Shuyan Huang
Zitao Liu
Weiqing Luo
23
2
0
24 Jun 2022
On making optimal transport robust to all outliers
On making optimal transport robust to all outliers
Kilian Fatras
OT
60
0
0
23 Jun 2022
Measuring Representational Robustness of Neural Networks Through Shared
  Invariances
Measuring Representational Robustness of Neural Networks Through Shared Invariances
Vedant Nanda
Till Speicher
Camila Kolling
John P. Dickerson
Krishna P. Gummadi
Adrian Weller
134
14
0
23 Jun 2022
NovelCraft: A Dataset for Novelty Detection and Discovery in Open Worlds
NovelCraft: A Dataset for Novelty Detection and Discovery in Open Worlds
Patrick Feeney
Sarah Schneider
Panagiotis Lymperopoulos
Liping Liu
matthias. scheutz
Michael C. Hughes Dept. of Computer Science
72
6
0
23 Jun 2022
Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Chen-Hao Hu
Weiwen Shi
AAML
108
5
0
23 Jun 2022
InfoAT: Improving Adversarial Training Using the Information Bottleneck
  Principle
InfoAT: Improving Adversarial Training Using the Information Bottleneck Principle
Mengting Xu
Tao Zhang
Zhongnian Li
Daoqiang Zhang
AAML
81
17
0
23 Jun 2022
Understanding the effect of sparsity on neural networks robustness
Understanding the effect of sparsity on neural networks robustness
Lukas Timpl
R. Entezari
Hanie Sedghi
Behnam Neyshabur
O. Saukh
91
12
0
22 Jun 2022
Guided Diffusion Model for Adversarial Purification from Random Noise
Guided Diffusion Model for Adversarial Purification from Random Noise
Quanlin Wu
Hang Ye
Yuntian Gu
DiffM
68
44
0
22 Jun 2022
Plug and Play Counterfactual Text Generation for Model Robustness
Plug and Play Counterfactual Text Generation for Model Robustness
Nishtha Madaan
Srikanta J. Bedathur
Diptikalyan Saha
68
4
0
21 Jun 2022
Using EBGAN for Anomaly Intrusion Detection
Using EBGAN for Anomaly Intrusion Detection
Yinxue Cui
Wenfeng Shen
Jian Zhang
Weijia Lu
Chuang Liu
Lingge Sun
Sisi Chen
34
3
0
21 Jun 2022
Why Robust Natural Language Understanding is a Challenge
Why Robust Natural Language Understanding is a Challenge
Marco Casadio
Ekaterina Komendantskaya
Verena Rieser
M. Daggitt
Daniel Kienitz
Luca Arnaboldi
Wen Kokke
OODAAML
53
0
0
21 Jun 2022
Certifiably Robust Policy Learning against Adversarial Communication in
  Multi-agent Systems
Certifiably Robust Policy Learning against Adversarial Communication in Multi-agent Systems
Yanchao Sun
Ruijie Zheng
Parisa Hassanzadeh
Yongyuan Liang
Soheil Feizi
Sumitra Ganesh
Furong Huang
AAML
82
10
0
21 Jun 2022
Transferable Graph Backdoor Attack
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
96
39
0
21 Jun 2022
Robust Deep Reinforcement Learning through Bootstrapped Opportunistic
  Curriculum
Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum
Junlin Wu
Yevgeniy Vorobeychik
73
22
0
21 Jun 2022
GraphFramEx: Towards Systematic Evaluation of Explainability Methods for
  Graph Neural Networks
GraphFramEx: Towards Systematic Evaluation of Explainability Methods for Graph Neural Networks
Kenza Amara
Rex Ying
Zitao Zhang
Zhihao Han
Yinan Shan
U. Brandes
S. Schemm
Ce Zhang
75
56
0
20 Jun 2022
Diversified Adversarial Attacks based on Conjugate Gradient Method
Diversified Adversarial Attacks based on Conjugate Gradient Method
Keiichiro Yamamura
Haruki Sato
Nariaki Tateiwa
Nozomi Hata
Toru Mitsutake
Issa Oe
Hiroki Ishikura
Katsuki Fujisawa
AAML
98
14
0
20 Jun 2022
The Fallacy of AI Functionality
The Fallacy of AI Functionality
Inioluwa Deborah Raji
Indra Elizabeth Kumar
Aaron Horowitz
Andrew D. Selbst
89
198
0
20 Jun 2022
Low-Mid Adversarial Perturbation against Unauthorized Face Recognition
  System
Low-Mid Adversarial Perturbation against Unauthorized Face Recognition System
Jiaming Zhang
Qiaomin Yi
Dongyuan Lu
Jitao Sang
PICVAAMLCVBM
32
5
0
19 Jun 2022
Towards Adversarial Attack on Vision-Language Pre-training Models
Towards Adversarial Attack on Vision-Language Pre-training Models
Jiaming Zhang
Qiaomin Yi
Jitao Sang
VLMAAML
91
107
0
19 Jun 2022
Dual Representation Learning for Out-of-Distribution Detection
Dual Representation Learning for Out-of-Distribution Detection
Zhilin Zhao
LongBing Cao
73
3
0
19 Jun 2022
Out-of-distribution Detection by Cross-class Vicinity Distribution of
  In-distribution Data
Out-of-distribution Detection by Cross-class Vicinity Distribution of In-distribution Data
Zhilin Zhao
LongBing Cao
Kun-Yu Lin
OOD
48
2
0
19 Jun 2022
Supervision Adaptation Balancing In-distribution Generalization and
  Out-of-distribution Detection
Supervision Adaptation Balancing In-distribution Generalization and Out-of-distribution Detection
Zhilin Zhao
LongBing Cao
Kun-Yu Lin
77
6
0
19 Jun 2022
Adversarially trained neural representations may already be as robust as
  corresponding biological neural representations
Adversarially trained neural representations may already be as robust as corresponding biological neural representations
Chong Guo
Michael J. Lee
Guillaume Leclerc
Joel Dapello
Yug Rao
Aleksander Madry
J. DiCarlo
GANAAML
50
13
0
19 Jun 2022
High Resolution Point Clouds from mmWave Radar
High Resolution Point Clouds from mmWave Radar
Akarsh Prabhakara
Tao Jin
Arnav M. Das
Gantavya Bhatt
Lilly Kumari
E. Soltanaghaei
J. Bilmes
Swarun Kumar
Anthony G. Rowe
91
56
0
18 Jun 2022
On the Role of Generalization in Transferability of Adversarial Examples
On the Role of Generalization in Transferability of Adversarial Examples
Yilin Wang
Farzan Farnia
AAML
83
11
0
18 Jun 2022
Piecewise Linear Neural Networks and Deep Learning
Piecewise Linear Neural Networks and Deep Learning
Qinghua Tao
Li Li
Xiaolin Huang
Xiangming Xi
Shuning Wang
Johan A. K. Suykens
43
30
0
18 Jun 2022
Measuring Lower Bounds of Local Differential Privacy via Adversary
  Instantiations in Federated Learning
Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Marin Matsumoto
Tsubasa Takahashi
Seng Pei Liew
M. Oguchi
FedMLBDL
55
0
0
18 Jun 2022
Demystifying the Adversarial Robustness of Random Transformation
  Defenses
Demystifying the Adversarial Robustness of Random Transformation Defenses
Chawin Sitawarin
Zachary Golan-Strieb
David Wagner
AAML
94
21
0
18 Jun 2022
Existence and Minimax Theorems for Adversarial Surrogate Risks in Binary
  Classification
Existence and Minimax Theorems for Adversarial Surrogate Risks in Binary Classification
Natalie Frank
Jonathan Niles-Weed
AAML
103
15
0
18 Jun 2022
Comment on Transferability and Input Transformation with Additive Noise
Comment on Transferability and Input Transformation with Additive Noise
Hoki Kim
Jinseong Park
Jaewook Lee
AAML
27
1
0
18 Jun 2022
Adversarial Robustness is at Odds with Lazy Training
Adversarial Robustness is at Odds with Lazy Training
Yunjuan Wang
Enayat Ullah
Poorya Mianjy
R. Arora
SILMAAML
114
11
0
18 Jun 2022
AutoML Two-Sample Test
AutoML Two-Sample Test
Jonas M. Kubler
Vincent Stimper
Simon Buchholz
Krikamol Muandet
Bernhard Schölkopf
75
17
0
17 Jun 2022
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal
  Fake News Detection
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection
Jinyin Chen
Chengyu Jia
Haibin Zheng
Ruoxi Chen
Chenbo Fu
AAML
73
12
0
17 Jun 2022
Detecting Adversarial Examples in Batches -- a geometrical approach
Detecting Adversarial Examples in Batches -- a geometrical approach
Danush Kumar Venkatesh
Peter Steinbach
AAML
58
2
0
17 Jun 2022
Understanding Robust Overfitting of Adversarial Training and Beyond
Understanding Robust Overfitting of Adversarial Training and Beyond
Chaojian Yu
Bo Han
Li Shen
Jun Yu
Chen Gong
Biwei Huang
Tongliang Liu
OOD
77
60
0
17 Jun 2022
Minimum Noticeable Difference based Adversarial Privacy Preserving Image
  Generation
Minimum Noticeable Difference based Adversarial Privacy Preserving Image Generation
Wen Sun
Jian Jin
Weisi Lin
AAML
81
19
0
17 Jun 2022
Backdoor Attacks on Vision Transformers
Backdoor Attacks on Vision Transformers
Akshayvarun Subramanya
Aniruddha Saha
Soroush Abbasi Koohpayegani
Ajinkya Tejankar
Hamed Pirsiavash
ViTAAML
56
18
0
16 Jun 2022
I Know What You Trained Last Summer: A Survey on Stealing Machine
  Learning Models and Defences
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
114
114
0
16 Jun 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
83
5
0
16 Jun 2022
Adversarial Patch Attacks and Defences in Vision-Based Tasks: A Survey
Adversarial Patch Attacks and Defences in Vision-Based Tasks: A Survey
Abhijith Sharma
Yijun Bian
Phil Munz
Apurva Narayan
VLMAAML
82
20
0
16 Jun 2022
Gradient-Based Adversarial and Out-of-Distribution Detection
Gradient-Based Adversarial and Out-of-Distribution Detection
Jinsol Lee
Mohit Prabhushankar
Ghassan AlRegib
UQCV
169
14
0
16 Jun 2022
Catastrophic overfitting can be induced with discriminative non-robust
  features
Catastrophic overfitting can be induced with discriminative non-robust features
Guillermo Ortiz-Jiménez
Pau de Jorge
Amartya Sanyal
Adel Bibi
P. Dokania
P. Frossard
Grégory Rogez
Philip Torr
AAML
61
3
0
16 Jun 2022
Previous
123...737475...165166167
Next