ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Salijona Dyrmishi
Mohamed Djilani
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLLMTD
44
0
0
18 Jun 2025
Position: Certified Robustness Does Not (Yet) Imply Model Security
Position: Certified Robustness Does Not (Yet) Imply Model Security
Andrew C. Cullen
Paul Montague
S. Erfani
Benjamin I. P. Rubinstein
21
0
0
16 Jun 2025
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
Stefano Longari
Paolo Cerracchio
Michele Carminati
S. Zanero
AAML
117
0
0
12 Jun 2025
AWP: Activation-Aware Weight Pruning and Quantization with Projected Gradient Descent
AWP: Activation-Aware Weight Pruning and Quantization with Projected Gradient Descent
Jing Liu
T. Koike-Akino
Ye Wang
Hassan Mansour
Matthew Brand
MQ
71
0
0
11 Jun 2025
KNN-Defense: Defense against 3D Adversarial Point Clouds using Nearest-Neighbor Search
KNN-Defense: Defense against 3D Adversarial Point Clouds using Nearest-Neighbor Search
Nima Jamali
Matina Mahdizadeh Sani
Hanieh Naderi
S. Kasaei
AAML3DPC
22
0
0
07 Jun 2025
SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks
SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks
Long Dang
T. Hapuarachchi
Kaiqi Xiong
Yi Li
AAML
13
0
0
06 Jun 2025
Coordinated Robustness Evaluation Framework for Vision-Language Models
Coordinated Robustness Evaluation Framework for Vision-Language Models
Ashwin Ramesh Babu
Sajad Mousavi
Vineet Gundecha
Sahand Ghorbanpour
Avisek Naug
Antonio Guillen
Ricardo Luna Gutierrez
Soumyendu Sarkar
AAML
30
0
0
05 Jun 2025
Attacking Attention of Foundation Models Disrupts Downstream Tasks
Attacking Attention of Foundation Models Disrupts Downstream Tasks
Hondamunige Prasanna Silva
Federico Becattini
Lorenzo Seidenari
AAML
22
0
0
03 Jun 2025
TRAP: Targeted Redirecting of Agentic Preferences
TRAP: Targeted Redirecting of Agentic Preferences
Hangoo Kang
Jehyeok Yeon
Gagandeep Singh
AAML
69
0
0
29 May 2025
Preventing Adversarial AI Attacks Against Autonomous Situational Awareness: A Maritime Case Study
Preventing Adversarial AI Attacks Against Autonomous Situational Awareness: A Maritime Case Study
Mathew J. Walter
Aaron Barrett
Kimberly Tam
AAML
27
1
0
27 May 2025
Are Time-Series Foundation Models Deployment-Ready? A Systematic Study of Adversarial Robustness Across Domains
Are Time-Series Foundation Models Deployment-Ready? A Systematic Study of Adversarial Robustness Across Domains
Jiawen Zhang
Zhenwei Zhang
Shun Zheng
Xumeng Wen
Jia Li
Jiang Bian
AI4TSAAML
163
0
0
26 May 2025
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation
Peiran Sun
AAML
19
0
0
25 May 2025
LORE: Lagrangian-Optimized Robust Embeddings for Visual Encoders
LORE: Lagrangian-Optimized Robust Embeddings for Visual Encoders
Borna Khodabandeh
Amirabbas Afzali
Amirhossein Afsharrad
Seyed Shahabeddin Mousavi
Sanjay Lall
Sajjad Amini
Seyed-Mohsen Moosavi-Dezfooli
AAML
36
0
0
24 May 2025
A Coreset Selection of Coreset Selection Literature: Introduction and Recent Advances
A Coreset Selection of Coreset Selection Literature: Introduction and Recent Advances
Brian B. Moser
Arundhati S. Shanbhag
Stanislav Frolov
Federico Raue
Joachim Folz
Andreas Dengel
256
0
0
23 May 2025
Anomaly Detection Based on Critical Paths for Deep Neural Networks
Anomaly Detection Based on Critical Paths for Deep Neural Networks
Fangzhen Zhao
Chenyi Zhang
Naipeng Dong
Ming Li
Jinxiao Shan
AAML
27
0
0
20 May 2025
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Md Farhan Tasnim Oshim
Nigel Doering
Bashima Islam
Tsui-Wei Weng
Tauhidur Rahman
43
0
0
16 May 2025
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Matteo Brosolo
A. Aazami
R. Agarwal
M. Prabhakaran
S. Nicolazzo
Antonino Nocera
V. P.
Vinod Puthuvath
AAML
79
0
0
12 May 2025
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Yuqiu Liu
Huanqian Yan
Xiaopei Zhu
Xiaolin Hu
L. Tang
Hang Su
Chen Lv
46
0
0
07 May 2025
Data-Driven Falsification of Cyber-Physical Systems
Data-Driven Falsification of Cyber-Physical Systems
Atanu Kundu
Sauvik Gon
Rajarshi Ray
AAMLAI4CE
94
4
0
06 May 2025
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
126
0
0
02 May 2025
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift
Jiamin Chang
Haoyang Li
Hammond Pearce
Ruoxi Sun
Yue Liu
Minhui Xue
81
0
0
28 Apr 2025
Examining the Impact of Optical Aberrations to Image Classification and Object Detection Models
Examining the Impact of Optical Aberrations to Image Classification and Object Detection Models
Patrick Müller
Alexander Braun
Margret Keuper
106
0
0
25 Apr 2025
Analysing the Robustness of Vision-Language-Models to Common Corruptions
Analysing the Robustness of Vision-Language-Models to Common Corruptions
Muhammad Usama
Syeda Aishah Asim
Syed Bilal Ali
Syed Talal Wasim
Umair Bin Mansoor
VLM
93
0
0
18 Apr 2025
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
Jing Chen
Onat Gungor
Zhengli Shang
Elvin Li
T. Rosing
AAML
78
0
0
17 Apr 2025
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification
Reek Majumder
M. Chowdhury
S. Khan
Zadid Khan
Fahim Ahmad
Frank Ngeni
G. Comert
Judith Mwakalonge
Dimitra Michalaka
AAML
40
0
0
17 Apr 2025
Human Aligned Compression for Robust Models
Human Aligned Compression for Robust Models
Samuel Räber
Andreas Plesner
Till Aczél
Roger Wattenhofer
AAML
116
0
0
16 Apr 2025
RDI: An adversarial robustness evaluation metric for deep neural networks based on model statistical features
RDI: An adversarial robustness evaluation metric for deep neural networks based on model statistical features
Jialei Song
Xingquan Zuo
Feiyang Wang
Hai Huang
Tianle Zhang
AAML
369
0
0
16 Apr 2025
QAVA: Query-Agnostic Visual Attack to Large Vision-Language Models
QAVA: Query-Agnostic Visual Attack to Large Vision-Language Models
Yudong Zhang
Ruobing Xie
Jiansheng Chen
Xingwu Sun
Zhanhui Kang
Yu Wang
AAML
83
1
0
15 Apr 2025
Defending Against Frequency-Based Attacks with Diffusion Models
Defending Against Frequency-Based Attacks with Diffusion Models
Fatemeh Amerehi
Patrick Healy
AAML
85
0
0
15 Apr 2025
R-TPT: Improving Adversarial Robustness of Vision-Language Models through Test-Time Prompt Tuning
R-TPT: Improving Adversarial Robustness of Vision-Language Models through Test-Time Prompt Tuning
Lijun Sheng
Jian Liang
Ziyi Wang
Ran He
AAMLVLM
79
1
0
15 Apr 2025
RGB-Event based Pedestrian Attribute Recognition: A Benchmark Dataset and An Asymmetric RWKV Fusion Framework
RGB-Event based Pedestrian Attribute Recognition: A Benchmark Dataset and An Asymmetric RWKV Fusion Framework
Xinyu Wang
Haiyang Wang
Shiao Wang
Qiang Chen
Jiandong Jin
Haoyu Song
Bo Jiang
Chenglong Li
110
1
0
14 Apr 2025
From Visual Explanations to Counterfactual Explanations with Latent Diffusion
From Visual Explanations to Counterfactual Explanations with Latent Diffusion
Tung Luu
Nam Le
Duc Le
Bac Le
DiffMAAMLFAtt
218
0
0
12 Apr 2025
ZipIR: Latent Pyramid Diffusion Transformer for High-Resolution Image Restoration
ZipIR: Latent Pyramid Diffusion Transformer for High-Resolution Image Restoration
Yongsheng Yu
Haitian Zheng
Zhifei Zhang
Jianming Zhang
Yuqian Zhou
Connelly Barnes
Yixiao Liu
Wei Xiong
Zhe Lin
Jiebo Luo
132
0
0
11 Apr 2025
Adversarial Examples in Environment Perception for Automated Driving (Review)
Adversarial Examples in Environment Perception for Automated Driving (Review)
Jun Yan
Huilin Yin
AAML
89
0
0
11 Apr 2025
On Transfer-based Universal Attacks in Pure Black-box Setting
On Transfer-based Universal Attacks in Pure Black-box Setting
M. Jalwana
Naveed Akhtar
Ajmal Mian
Nazanin Rahnavard
Mubarak Shah
AAML
73
0
0
11 Apr 2025
Deep Sturm--Liouville: From Sample-Based to 1D Regularization with Learnable Orthogonal Basis Functions
Deep Sturm--Liouville: From Sample-Based to 1D Regularization with Learnable Orthogonal Basis Functions
David Vigouroux
Joseba Dalmau
Louis Bethune
Victor Boutin
69
0
0
09 Apr 2025
Two is Better than One: Efficient Ensemble Defense for Robust and Compact Models
Two is Better than One: Efficient Ensemble Defense for Robust and Compact Models
Yoojin Jung
Byung Cheol Song
AAMLVLMMQ
91
0
0
07 Apr 2025
Multifaceted Evaluation of Audio-Visual Capability for MLLMs: Effectiveness, Efficiency, Generalizability and Robustness
Multifaceted Evaluation of Audio-Visual Capability for MLLMs: Effectiveness, Efficiency, Generalizability and Robustness
Yusheng Zhao
Junyu Luo
Zhiyuan Ning
Weizhi Zhang
Zhiping Xiao
Wei Ju
Philip S. Yu
Ming Zhang
AuLLM
111
0
0
03 Apr 2025
A Study on Adversarial Robustness of Discriminative Prototypical Learning
A Study on Adversarial Robustness of Discriminative Prototypical Learning
Ramin Zarei-Sabzevar
Hamed Mohammadzadeh
Tahmineh Tavakoli
Ahad Harati
AAML
89
0
0
03 Apr 2025
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Haibo Zhang
Zhihua Yao
Kouichi Sakurai
Takeshi Saitoh
AAML
93
0
0
02 Apr 2025
TenAd: A Tensor-based Low-rank Black Box Adversarial Attack for Video Classification
TenAd: A Tensor-based Low-rank Black Box Adversarial Attack for Video Classification
Kimia haghjooei
Mansoor Rezghi
91
0
0
01 Apr 2025
Data-Free Universal Attack by Exploiting the Intrinsic Vulnerability of Deep Models
Data-Free Universal Attack by Exploiting the Intrinsic Vulnerability of Deep Models
YangTian Yan
Jinyu Tian
AAMLFedML
123
0
0
28 Mar 2025
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation
Jingdan Kang
Haoxin Yang
Yan Cai
Huaidong Zhang
Xuemiao Xu
Yong Du
Shengfeng He
AAML
92
0
0
25 Mar 2025
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
João B. S. Carvalho
Alessandro Torcinovich
Victor Jimenez Rodriguez
Antonio Emanuele Cinà
Carlos Cotrini
Lea Schönherr
J. M. Buhmann
OOD
111
0
0
20 Mar 2025
Narrowing Class-Wise Robustness Gaps in Adversarial Training
Narrowing Class-Wise Robustness Gaps in Adversarial Training
Fatemeh Amerehi
Patrick Healy
101
0
0
20 Mar 2025
RAT: Boosting Misclassification Detection Ability without Extra Data
RAT: Boosting Misclassification Detection Ability without Extra Data
Ge Yan
Tsui-Wei Weng
AAML
140
0
0
18 Mar 2025
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
114
0
0
17 Mar 2025
Robustness Tokens: Towards Adversarial Robustness of Transformers
Brian Pulfer
Yury Belousov
S. Voloshynovskiy
AAML
83
0
0
13 Mar 2025
Enhancing Adversarial Example Detection Through Model Explanation
Qian Ma
Ziping Ye
AAML
100
0
0
12 Mar 2025
Runtime Detection of Adversarial Attacks in AI Accelerators Using Performance Counters
Habibur Rahaman
Atri Chatterjee
Swarup Bhunia
141
0
0
10 Mar 2025
1234...444546
Next