ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Adversarial attacks and defenses on ML- and hardware-based IoT device
  fingerprinting and identification
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification
Pedro Miguel Sánchez Sánchez
Alberto Huertas Celdrán
Gérome Bovet
Gregorio Martínez Pérez
AAML
89
18
0
30 Dec 2022
Differentiable Search of Accurate and Robust Architectures
Differentiable Search of Accurate and Robust Architectures
Yuwei Ou
Xiangning Xie
Shan Gao
Yanan Sun
Kay Chen Tan
Jiancheng Lv
OODAAML
69
2
0
28 Dec 2022
Publishing Efficient On-device Models Increases Adversarial
  Vulnerability
Publishing Efficient On-device Models Increases Adversarial Vulnerability
Sanghyun Hong
Nicholas Carlini
Alexey Kurakin
AAML
75
3
0
28 Dec 2022
Aliasing is a Driver of Adversarial Attacks
Aliasing is a Driver of Adversarial Attacks
Adrian Rodriguez-Munoz
Antonio Torralba
AAML
64
0
0
22 Dec 2022
End to End Generative Meta Curriculum Learning For Medical Data
  Augmentation
End to End Generative Meta Curriculum Learning For Medical Data Augmentation
Meng Li
Brian C. Lovell
MedIm
96
4
0
20 Dec 2022
A Review of Speech-centric Trustworthy Machine Learning: Privacy,
  Safety, and Fairness
A Review of Speech-centric Trustworthy Machine Learning: Privacy, Safety, and Fairness
Tiantian Feng
Rajat Hebbar
Nicholas Mehlman
Xuan Shi
Aditya Kommineni
and Shrikanth Narayanan
108
34
0
18 Dec 2022
Confidence-aware Training of Smoothed Classifiers for Certified
  Robustness
Confidence-aware Training of Smoothed Classifiers for Certified Robustness
Jongheon Jeong
Seojin Kim
Jinwoo Shin
AAML
89
7
0
18 Dec 2022
Adversarial Example Defense via Perturbation Grading Strategy
Adversarial Example Defense via Perturbation Grading Strategy
Shaowei Zhu
Wanli Lyu
Bin Li
Z. Yin
Bin Luo
AAML
71
1
0
16 Dec 2022
Understanding Zero-Shot Adversarial Robustness for Large-Scale Models
Understanding Zero-Shot Adversarial Robustness for Large-Scale Models
Chengzhi Mao
Scott Geng
Junfeng Yang
Xin Eric Wang
Carl Vondrick
VLM
98
71
0
14 Dec 2022
SAIF: Sparse Adversarial and Imperceptible Attack Framework
SAIF: Sparse Adversarial and Imperceptible Attack Framework
Tooba Imtiaz
Morgan Kohler
Jared Miller
Zifeng Wang
Octavia Camps
Mario Sznaier
Octavia Camps
Jennifer Dy
AAML
100
0
0
14 Dec 2022
Unfolding Local Growth Rate Estimates for (Almost) Perfect Adversarial
  Detection
Unfolding Local Growth Rate Estimates for (Almost) Perfect Adversarial Detection
P. Lorenz
Margret Keuper
J. Keuper
AAML
95
7
0
13 Dec 2022
REAP: A Large-Scale Realistic Adversarial Patch Benchmark
REAP: A Large-Scale Realistic Adversarial Patch Benchmark
Nabeel Hingun
Chawin Sitawarin
Jerry Li
David Wagner
AAML
97
15
0
12 Dec 2022
DISCO: Adversarial Defense with Local Implicit Functions
DISCO: Adversarial Defense with Local Implicit Functions
Chih-Hui Ho
Nuno Vasconcelos
AAML
130
39
0
11 Dec 2022
General Adversarial Defense Against Black-box Attacks via Pixel Level
  and Feature Level Distribution Alignments
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Philip Torr
Jiaya Jia
AAML
61
2
0
11 Dec 2022
Targeted Adversarial Attacks against Neural Network Trajectory
  Predictors
Targeted Adversarial Attacks against Neural Network Trajectory Predictors
Kai Liang Tan
Jun Wang
Y. Kantaros
AAML
82
15
0
08 Dec 2022
Multiple Perturbation Attack: Attack Pixelwise Under Different
  $\ell_p$-norms For Better Adversarial Performance
Multiple Perturbation Attack: Attack Pixelwise Under Different ℓp\ell_pℓp​-norms For Better Adversarial Performance
Ngoc N. Tran
Anh Tuan Bui
Dinh Q. Phung
Trung Le
AAML
53
1
0
05 Dec 2022
Block Selection Method for Using Feature Norm in Out-of-distribution
  Detection
Block Selection Method for Using Feature Norm in Out-of-distribution Detection
Yeonguk Yu
Sungho Shin
Seongju Lee
C. Jun
Kyoobin Lee
OODD
83
35
0
05 Dec 2022
Recognizing Object by Components with Human Prior Knowledge Enhances
  Adversarial Robustness of Deep Neural Networks
Recognizing Object by Components with Human Prior Knowledge Enhances Adversarial Robustness of Deep Neural Networks
Xiao-Li Li
Ziqi Wang
Bo Zhang
Gang Hua
Xiaolin Hu
72
26
0
04 Dec 2022
Hijack Vertical Federated Learning Models As One Party
Hijack Vertical Federated Learning Models As One Party
Pengyu Qiu
Xuhong Zhang
Shouling Ji
Changjiang Li
Yuwen Pu
Xing Yang
Ting Wang
FedML
117
5
0
01 Dec 2022
Imperceptible Adversarial Attack via Invertible Neural Networks
Imperceptible Adversarial Attack via Invertible Neural Networks
Zihan Chen
Zifan Wang
Junjie Huang
Wentao Zhao
Xiao Liu
Dejian Guan
AAML
114
22
0
28 Nov 2022
Foiling Explanations in Deep Neural Networks
Foiling Explanations in Deep Neural Networks
Snir Vitrack Tamam
Raz Lapid
Moshe Sipper
AAML
75
17
0
27 Nov 2022
The Vanishing Decision Boundary Complexity and the Strong First
  Component
The Vanishing Decision Boundary Complexity and the Strong First Component
Hengshuai Yao
UQCV
66
0
0
25 Nov 2022
Boundary Adversarial Examples Against Adversarial Overfitting
Boundary Adversarial Examples Against Adversarial Overfitting
Muhammad Zaid Hameed
Beat Buesser
AAML
57
1
0
25 Nov 2022
To be or not to be stable, that is the question: understanding neural
  networks for inverse problems
To be or not to be stable, that is the question: understanding neural networks for inverse problems
David Evangelista
J. Nagy
E. Morotti
E. L. Piccolomini
76
5
0
24 Nov 2022
Dual Graphs of Polyhedral Decompositions for the Detection of
  Adversarial Attacks
Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Huma Jamil
Yajing Liu
Christina Cole
Nathaniel Blanchard
E. King
Michael Kirby
C. Peterson
AAML
58
2
0
23 Nov 2022
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action
  Recognition
Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Rohit Gupta
Naveed Akhtar
Gaurav Kumar Nayak
Ajmal Mian
M. Shah
AAML
69
1
0
23 Nov 2022
OCTET: Object-aware Counterfactual Explanations
OCTET: Object-aware Counterfactual Explanations
Mehdi Zemni
Mickaël Chen
Éloi Zablocki
H. Ben-younes
Patrick Pérez
Matthieu Cord
AAML
107
29
0
22 Nov 2022
DualApp: Tight Over-Approximation for Neural Network Robustness
  Verification via Under-Approximation
DualApp: Tight Over-Approximation for Neural Network Robustness Verification via Under-Approximation
Yiting Wu
Zhaodi Zhang
Zhiyi Xue
Si Liu
Hao Fei
AAML
56
0
0
21 Nov 2022
Adversarial Detection by Approximation of Ensemble Boundary
Adversarial Detection by Approximation of Ensemble Boundary
T. Windeatt
AAML
187
0
0
18 Nov 2022
Efficiently Finding Adversarial Examples with DNN Preprocessing
Efficiently Finding Adversarial Examples with DNN Preprocessing
Avriti Chauhan
Mohammad Afzal
Hrishikesh Karmarkar
Y. Elboher
Kumar Madhukar
Guy Katz
AAML
57
0
0
16 Nov 2022
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for
  Object Detection
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for Object Detection
N. Doan
Arda Yüksel
Chih-Hong Cheng
AAML
63
1
0
14 Nov 2022
Test-time adversarial detection and robustness for localizing humans
  using ultra wide band channel impulse responses
Test-time adversarial detection and robustness for localizing humans using ultra wide band channel impulse responses
A. Kolli
M. Jehanzeb Mirza
Horst Possegger
Horst Bischof
AAML
68
1
0
10 Nov 2022
Impact of Adversarial Training on Robustness and Generalizability of
  Language Models
Impact of Adversarial Training on Robustness and Generalizability of Language Models
Enes Altinisik
Hassan Sajjad
Husrev Taha Sencar
Safa Messaoud
Sanjay Chawla
AAML
59
11
0
10 Nov 2022
Robust Smart Home Face Recognition under Starving Federated Data
Robust Smart Home Face Recognition under Starving Federated Data
Jaechul Roh
Yajun Fang
FedMLCVBMAAML
61
0
0
10 Nov 2022
Extending Temporal Data Augmentation for Video Action Recognition
Extending Temporal Data Augmentation for Video Action Recognition
Artjoms Gorpincenko
Michal Mackiewicz
ViT
74
4
0
09 Nov 2022
On the Robustness of Explanations of Deep Neural Network Models: A
  Survey
On the Robustness of Explanations of Deep Neural Network Models: A Survey
Amlan Jyoti
Karthik Balaji Ganesh
Manoj Gayala
Nandita Lakshmi Tunuguntla
Sandesh Kamath
V. Balasubramanian
XAIFAttAAML
82
4
0
09 Nov 2022
Decoding Neural Signals with Computational Models: A Systematic Review of Invasive BMI
Rezwan Firuzi
Hamed Ahmadyani
Mohammad Foad Abdi
Dana Naderi
Jahanfar Hassan
Ayub Bokani
AI4CE
101
1
0
07 Nov 2022
An Adversarial Robustness Perspective on the Topology of Neural Networks
An Adversarial Robustness Perspective on the Topology of Neural Networks
Morgane Goibert
Thomas Ricatte
Elvis Dohmatob
AAML
66
2
0
04 Nov 2022
Visually Adversarial Attacks and Defenses in the Physical World: A
  Survey
Visually Adversarial Attacks and Defenses in the Physical World: A Survey
Xingxing Wei
Bangzheng Pu
Jiefan Lu
Baoyuan Wu
AAML
148
11
0
03 Nov 2022
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for
  Improving Adversarial Training
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Junhao Dong
Seyed-Mohsen Moosavi-Dezfooli
Jianhuang Lai
Xiaohua Xie
AAML
112
29
0
01 Nov 2022
Scoring Black-Box Models for Adversarial Robustness
Scoring Black-Box Models for Adversarial Robustness
Jian Vora
Pranay Reddy Samala
68
0
0
31 Oct 2022
Benchmarking Adversarial Patch Against Aerial Detection
Benchmarking Adversarial Patch Against Aerial Detection
Jiawei Lian
Shaohui Mei
Shun Zhang
Mingyang Ma
AAML
94
58
0
30 Oct 2022
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion
  Attacks against Network Intrusion Detection Systems
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems
Islam Debicha
Richard Bauwens
Thibault Debatty
Jean-Michel Dricot
Tayeb Kenaza
Wim Mees
AAML
69
46
0
27 Oct 2022
Improving Adversarial Robustness with Self-Paced Hard-Class Pair
  Reweighting
Improving Adversarial Robustness with Self-Paced Hard-Class Pair Reweighting
Peng-Fei Hou
Jie Han
Xingyu Li
AAMLOOD
40
11
0
26 Oct 2022
LP-BFGS attack: An adversarial attack based on the Hessian with limited
  pixels
LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
AAML
68
6
0
26 Oct 2022
Geo-SIC: Learning Deformable Geometric Shapes in Deep Image Classifiers
Geo-SIC: Learning Deformable Geometric Shapes in Deep Image Classifiers
Jian Wang
Miaomiao Zhang
82
10
0
25 Oct 2022
Adversarial Pretraining of Self-Supervised Deep Networks: Past, Present
  and Future
Adversarial Pretraining of Self-Supervised Deep Networks: Past, Present and Future
Guo-Jun Qi
M. Shah
SSL
78
8
0
23 Oct 2022
Augmentation by Counterfactual Explanation -- Fixing an Overconfident
  Classifier
Augmentation by Counterfactual Explanation -- Fixing an Overconfident Classifier
Sumedha Singla
Nihal Murali
Forough Arabshahi
Sofia Triantafyllou
Kayhan Batmanghelich
CML
122
5
0
21 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAMLMLAU
111
31
0
21 Oct 2022
Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial
  Examples
Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples
Hui Liu
Bo Zhao
Kehuan Zhang
Peng Liu
AAML
58
4
0
16 Oct 2022
Previous
123...101112...444546
Next