ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Dynamics-aware Adversarial Attack of Adaptive Neural Networks
Dynamics-aware Adversarial Attack of Adaptive Neural Networks
An Tao
Yueqi Duan
Yingqi Wang
Jiwen Lu
Jie Zhou
AAML
85
6
0
15 Oct 2022
Robust Models are less Over-Confident
Robust Models are less Over-Confident
Julia Grabinski
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
80
25
0
12 Oct 2022
Stable and Efficient Adversarial Training through Local Linearization
Stable and Efficient Adversarial Training through Local Linearization
Zhuorong Li
Daiwei Yu
AAML
32
0
0
11 Oct 2022
Boosting Adversarial Robustness From The Perspective of Effective Margin
  Regularization
Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization
Ziquan Liu
Antoni B. Chan
AAML
60
5
0
11 Oct 2022
Universal Adversarial Perturbations: Efficiency on a small image dataset
Universal Adversarial Perturbations: Efficiency on a small image dataset
Waris Radji
AAML
15
0
0
10 Oct 2022
Pruning Adversarially Robust Neural Networks without Adversarial
  Examples
Pruning Adversarially Robust Neural Networks without Adversarial Examples
T. Jian
Zifeng Wang
Yanzhi Wang
Jennifer Dy
Stratis Ioannidis
AAMLVLM
71
13
0
09 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a
  Distribution Perspective
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
64
59
0
09 Oct 2022
Symmetry Defense Against CNN Adversarial Perturbation Attacks
Symmetry Defense Against CNN Adversarial Perturbation Attacks
Blerta Lindqvist
AAML
74
2
0
08 Oct 2022
FedDef: Defense Against Gradient Leakage in Federated Learning-based
  Network Intrusion Detection Systems
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems
Jiahui Chen
Yi Zhao
Qi Li
Xuewei Feng
Ke Xu
AAMLFedML
108
14
0
08 Oct 2022
Utilizing Explainable AI for improving the Performance of Neural
  Networks
Utilizing Explainable AI for improving the Performance of Neural Networks
Huawei Sun
Lorenzo Servadei
Hao Feng
Michael Stephan
Robert Wille
Avik Santra
59
7
0
07 Oct 2022
Pre-trained Adversarial Perturbations
Pre-trained Adversarial Perturbations
Y. Ban
Yinpeng Dong
AAML
98
24
0
07 Oct 2022
Towards Out-of-Distribution Adversarial Robustness
Towards Out-of-Distribution Adversarial Robustness
Adam Ibrahim
Charles Guille-Escuret
Ioannis Mitliagkas
Irina Rish
David M. Krueger
P. Bashivan
OOD
51
6
0
06 Oct 2022
SynBench: Task-Agnostic Benchmarking of Pretrained Representations using
  Synthetic Data
SynBench: Task-Agnostic Benchmarking of Pretrained Representations using Synthetic Data
Ching-Yun Ko
Pin-Yu Chen
Jeet Mohapatra
Payel Das
Lucani E. Daniel
111
3
0
06 Oct 2022
Jitter Does Matter: Adapting Gaze Estimation to New Domains
Jitter Does Matter: Adapting Gaze Estimation to New Domains
Ruicong Liu
Yiwei Bao
Mingjie Xu
Haofei Wang
Yunfei Liu
Feng Lu
OOD
104
6
0
05 Oct 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
99
47
0
05 Oct 2022
NCVX: A General-Purpose Optimization Solver for Constrained Machine and
  Deep Learning
NCVX: A General-Purpose Optimization Solver for Constrained Machine and Deep Learning
Buyun Liang
Tim Mitchell
Ju Sun
OOD
118
7
0
03 Oct 2022
Perceptual Attacks of No-Reference Image Quality Models with
  Human-in-the-Loop
Perceptual Attacks of No-Reference Image Quality Models with Human-in-the-Loop
Weixia Zhang
Dingquan Li
Xiongkuo Min
Guangtao Zhai
Guodong Guo
Xiaokang Yang
Kede Ma
OOD
81
35
0
03 Oct 2022
Push-Pull: Characterizing the Adversarial Robustness for Audio-Visual
  Active Speaker Detection
Push-Pull: Characterizing the Adversarial Robustness for Audio-Visual Active Speaker Detection
Xuan-Bo Chen
Haibin Wu
Helen Meng
Hung-yi Lee
J. Jang
AAML
106
4
0
03 Oct 2022
Understanding Adversarial Robustness Against On-manifold Adversarial
  Examples
Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
75
13
0
02 Oct 2022
Learning Robust Kernel Ensembles with Kernel Average Pooling
Learning Robust Kernel Ensembles with Kernel Average Pooling
P. Bashivan
Adam Ibrahim
Amirozhan Dehghani
Yifei Ren
OOD
79
5
0
30 Sep 2022
Hiding Visual Information via Obfuscating Adversarial Perturbations
Hiding Visual Information via Obfuscating Adversarial Perturbations
Zhigang Su
Dawei Zhou
Nannan Wangu
Decheng Liu
Zhen Wang
Xinbo Gao
AAML
39
11
0
30 Sep 2022
Your Out-of-Distribution Detection Method is Not Robust!
Your Out-of-Distribution Detection Method is Not Robust!
Mohammad Azizmalayeri
Arshia Soltani Moakhar
Arman Zarei
Reihaneh Zohrabi
M. T. Manzuri
M. Rohban
OODD
111
17
0
30 Sep 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAMLMLAU
93
5
0
29 Sep 2022
Increasing the Accuracy of a Neural Network Using Frequency Selective
  Mesh-to-Grid Resampling
Increasing the Accuracy of a Neural Network Using Frequency Selective Mesh-to-Grid Resampling
Andreas Spruck
Viktoria Heimann
Andre Kaup
13
1
0
28 Sep 2022
A Survey on Physical Adversarial Attack in Computer Vision
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang
Wen Yao
Tingsong Jiang
Guijian Tang
Xiaoqian Chen
AAML
151
39
0
28 Sep 2022
Discussion about Attacks and Defenses for Fair and Robust Recommendation
  System Design
Discussion about Attacks and Defenses for Fair and Robust Recommendation System Design
Mira Kim
Simon S. Woo
117
0
0
28 Sep 2022
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Zhixing Ye
Xinwen Cheng
Xiaolin Huang
AAML
108
11
0
27 Sep 2022
Employing Deep Ensemble Learning for Improving the Security of Computer
  Networks against Adversarial Attacks
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Ehsan Nowroozi
Mohammadreza Mohammadi
E. Savaş
Mauro Conti
Yassine Mekdad
AAML
75
8
0
25 Sep 2022
Leveraging Local Patch Differences in Multi-Object Scenes for Generative
  Adversarial Attacks
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Abhishek Aich
Shasha Li
Chengyu Song
M. Salman Asif
S. Krishnamurthy
Amit K. Roy-Chowdhury
AAML
93
9
0
20 Sep 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Understanding Real-world Threats to Deep Learning Models in Android Apps
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
68
29
0
20 Sep 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
M. Salman Asif
Amit K. Roy-Chowdhury
AAML
108
20
0
20 Sep 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
77
3
0
19 Sep 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
73
1
0
17 Sep 2022
Explicit Tradeoffs between Adversarial and Natural Distributional
  Robustness
Explicit Tradeoffs between Adversarial and Natural Distributional Robustness
Mazda Moayeri
Kiarash Banihashem
Soheil Feizi
OOD
129
23
0
15 Sep 2022
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through
  Multi-Objective Attack
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective Attack
Yanyun Wang
Dehui Du
Haibo Hu
Zi Liang
Yuanhao Liu
AAMLAI4TS
104
3
0
14 Sep 2022
Resisting Deep Learning Models Against Adversarial Attack
  Transferability via Feature Randomization
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Ehsan Nowroozi
Mohammadreza Mohammadi
Pargol Golmohammadi
Yassine Mekdad
Mauro Conti
Selcuk Uluagac
AAMLSILM
82
14
0
11 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via
  Attention-based Network in Face Recognition
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
103
9
0
11 Sep 2022
Scattering Model Guided Adversarial Examples for SAR Target Recognition:
  Attack and Defense
Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and Defense
Bo Peng
Bo Peng
Jie Zhou
Jianyue Xie
Li Liu
AAML
92
44
0
11 Sep 2022
Robust-by-Design Classification via Unitary-Gradient Neural Networks
Robust-by-Design Classification via Unitary-Gradient Neural Networks
Fabio Brau
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
112
5
0
09 Sep 2022
Revisiting Outer Optimization in Adversarial Training
Revisiting Outer Optimization in Adversarial Training
Ali Dabouei
Fariborz Taherkhani
Sobhan Soleymani
Nasser M. Nasrabadi
AAML
90
4
0
02 Sep 2022
Adversarial Color Film: Effective Physical-World Attack to DNNs
Adversarial Color Film: Effective Physical-World Attack to DNNs
Chen-Hao Hu
Weiwen Shi
AAML
176
14
0
02 Sep 2022
A Black-Box Attack on Optical Character Recognition Systems
A Black-Box Attack on Optical Character Recognition Systems
Samet Bayram
Kenneth Barner
AAML
121
5
0
30 Aug 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models
  with Transferred Evolutionary Strategies
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
65
1
0
28 Aug 2022
Adversarial Robustness for Tabular Data through Cost and Utility
  Awareness
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
97
18
0
27 Aug 2022
FuncFooler: A Practical Black-box Attack Against Learning-based Binary
  Code Similarity Detection Methods
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods
Lichen Jia
Bowen Tang
Chenggang Wu
Zhe Wang
Zihan Jiang
Yuanming Lai
Yan Kang
Ninghui Liu
Jingfeng Zhang
AAML
33
2
0
26 Aug 2022
A Perturbation Resistant Transformation and Classification System for
  Deep Neural Networks
A Perturbation Resistant Transformation and Classification System for Deep Neural Networks
Nathaniel R. Dean
D. Sarkar
AAML
17
0
0
25 Aug 2022
Rethinking Cost-sensitive Classification in Deep Learning via
  Adversarial Data Augmentation
Rethinking Cost-sensitive Classification in Deep Learning via Adversarial Data Augmentation
Qiyuan Chen
Raed Al Kontar
Maher Nouiehed
Xi Yang
Corey A. Lester
AAML
60
2
0
24 Aug 2022
Black-box Attacks Against Neural Binary Function Detection
Black-box Attacks Against Neural Binary Function Detection
Josh Bundt
Michael Davinroy
Ioannis Agadakos
Alina Oprea
William K. Robertson
AAML
51
1
0
24 Aug 2022
Trace and Detect Adversarial Attacks on CNNs using Feature Response Maps
Trace and Detect Adversarial Attacks on CNNs using Feature Response Maps
Mohammadreza Amirian
Friedhelm Schwenker
Thilo Stadelmann
AAML
74
16
0
24 Aug 2022
Hierarchical Perceptual Noise Injection for Social Media Fingerprint
  Privacy Protection
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Simin Li
Huangxinxin Xu
Jiakai Wang
Aishan Liu
Fazhi He
Xianglong Liu
Dacheng Tao
AAML
64
6
0
23 Aug 2022
Previous
123...111213...444546
Next