Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1511.04599
Cited By
v1
v2
v3 (latest)
DeepFool: a simple and accurate method to fool deep neural networks
14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"DeepFool: a simple and accurate method to fool deep neural networks"
50 / 2,298 papers shown
Title
Dynamics-aware Adversarial Attack of Adaptive Neural Networks
An Tao
Yueqi Duan
Yingqi Wang
Jiwen Lu
Jie Zhou
AAML
85
6
0
15 Oct 2022
Robust Models are less Over-Confident
Julia Grabinski
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
80
25
0
12 Oct 2022
Stable and Efficient Adversarial Training through Local Linearization
Zhuorong Li
Daiwei Yu
AAML
32
0
0
11 Oct 2022
Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization
Ziquan Liu
Antoni B. Chan
AAML
60
5
0
11 Oct 2022
Universal Adversarial Perturbations: Efficiency on a small image dataset
Waris Radji
AAML
15
0
0
10 Oct 2022
Pruning Adversarially Robust Neural Networks without Adversarial Examples
T. Jian
Zifeng Wang
Yanzhi Wang
Jennifer Dy
Stratis Ioannidis
AAML
VLM
71
13
0
09 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
64
59
0
09 Oct 2022
Symmetry Defense Against CNN Adversarial Perturbation Attacks
Blerta Lindqvist
AAML
74
2
0
08 Oct 2022
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems
Jiahui Chen
Yi Zhao
Qi Li
Xuewei Feng
Ke Xu
AAML
FedML
108
14
0
08 Oct 2022
Utilizing Explainable AI for improving the Performance of Neural Networks
Huawei Sun
Lorenzo Servadei
Hao Feng
Michael Stephan
Robert Wille
Avik Santra
59
7
0
07 Oct 2022
Pre-trained Adversarial Perturbations
Y. Ban
Yinpeng Dong
AAML
98
24
0
07 Oct 2022
Towards Out-of-Distribution Adversarial Robustness
Adam Ibrahim
Charles Guille-Escuret
Ioannis Mitliagkas
Irina Rish
David M. Krueger
P. Bashivan
OOD
51
6
0
06 Oct 2022
SynBench: Task-Agnostic Benchmarking of Pretrained Representations using Synthetic Data
Ching-Yun Ko
Pin-Yu Chen
Jeet Mohapatra
Payel Das
Lucani E. Daniel
111
3
0
06 Oct 2022
Jitter Does Matter: Adapting Gaze Estimation to New Domains
Ruicong Liu
Yiwei Bao
Mingjie Xu
Haofei Wang
Yunfei Liu
Feng Lu
OOD
104
6
0
05 Oct 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
99
47
0
05 Oct 2022
NCVX: A General-Purpose Optimization Solver for Constrained Machine and Deep Learning
Buyun Liang
Tim Mitchell
Ju Sun
OOD
118
7
0
03 Oct 2022
Perceptual Attacks of No-Reference Image Quality Models with Human-in-the-Loop
Weixia Zhang
Dingquan Li
Xiongkuo Min
Guangtao Zhai
Guodong Guo
Xiaokang Yang
Kede Ma
OOD
81
35
0
03 Oct 2022
Push-Pull: Characterizing the Adversarial Robustness for Audio-Visual Active Speaker Detection
Xuan-Bo Chen
Haibin Wu
Helen Meng
Hung-yi Lee
J. Jang
AAML
106
4
0
03 Oct 2022
Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
75
13
0
02 Oct 2022
Learning Robust Kernel Ensembles with Kernel Average Pooling
P. Bashivan
Adam Ibrahim
Amirozhan Dehghani
Yifei Ren
OOD
79
5
0
30 Sep 2022
Hiding Visual Information via Obfuscating Adversarial Perturbations
Zhigang Su
Dawei Zhou
Nannan Wangu
Decheng Liu
Zhen Wang
Xinbo Gao
AAML
39
11
0
30 Sep 2022
Your Out-of-Distribution Detection Method is Not Robust!
Mohammad Azizmalayeri
Arshia Soltani Moakhar
Arman Zarei
Reihaneh Zohrabi
M. T. Manzuri
M. Rohban
OODD
111
17
0
30 Sep 2022
Towards Lightweight Black-Box Attacks against Deep Neural Networks
Chenghao Sun
Yonggang Zhang
Chaoqun Wan
Qizhou Wang
Ya Li
Tongliang Liu
Bo Han
Xinmei Tian
AAML
MLAU
93
5
0
29 Sep 2022
Increasing the Accuracy of a Neural Network Using Frequency Selective Mesh-to-Grid Resampling
Andreas Spruck
Viktoria Heimann
Andre Kaup
13
1
0
28 Sep 2022
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang
Wen Yao
Tingsong Jiang
Guijian Tang
Xiaoqian Chen
AAML
151
39
0
28 Sep 2022
Discussion about Attacks and Defenses for Fair and Robust Recommendation System Design
Mira Kim
Simon S. Woo
117
0
0
28 Sep 2022
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Zhixing Ye
Xinwen Cheng
Xiaolin Huang
AAML
108
11
0
27 Sep 2022
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Ehsan Nowroozi
Mohammadreza Mohammadi
E. Savaş
Mauro Conti
Yassine Mekdad
AAML
75
8
0
25 Sep 2022
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Abhishek Aich
Shasha Li
Chengyu Song
M. Salman Asif
S. Krishnamurthy
Amit K. Roy-Chowdhury
AAML
93
9
0
20 Sep 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
68
29
0
20 Sep 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
M. Salman Asif
Amit K. Roy-Chowdhury
AAML
108
20
0
20 Sep 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
77
3
0
19 Sep 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
73
1
0
17 Sep 2022
Explicit Tradeoffs between Adversarial and Natural Distributional Robustness
Mazda Moayeri
Kiarash Banihashem
Soheil Feizi
OOD
129
23
0
15 Sep 2022
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective Attack
Yanyun Wang
Dehui Du
Haibo Hu
Zi Liang
Yuanhao Liu
AAML
AI4TS
104
3
0
14 Sep 2022
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Ehsan Nowroozi
Mohammadreza Mohammadi
Pargol Golmohammadi
Yassine Mekdad
Mauro Conti
Selcuk Uluagac
AAML
SILM
82
14
0
11 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
103
9
0
11 Sep 2022
Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and Defense
Bo Peng
Bo Peng
Jie Zhou
Jianyue Xie
Li Liu
AAML
92
44
0
11 Sep 2022
Robust-by-Design Classification via Unitary-Gradient Neural Networks
Fabio Brau
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
112
5
0
09 Sep 2022
Revisiting Outer Optimization in Adversarial Training
Ali Dabouei
Fariborz Taherkhani
Sobhan Soleymani
Nasser M. Nasrabadi
AAML
90
4
0
02 Sep 2022
Adversarial Color Film: Effective Physical-World Attack to DNNs
Chen-Hao Hu
Weiwen Shi
AAML
176
14
0
02 Sep 2022
A Black-Box Attack on Optical Character Recognition Systems
Samet Bayram
Kenneth Barner
AAML
121
5
0
30 Aug 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
65
1
0
28 Aug 2022
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
97
18
0
27 Aug 2022
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods
Lichen Jia
Bowen Tang
Chenggang Wu
Zhe Wang
Zihan Jiang
Yuanming Lai
Yan Kang
Ninghui Liu
Jingfeng Zhang
AAML
33
2
0
26 Aug 2022
A Perturbation Resistant Transformation and Classification System for Deep Neural Networks
Nathaniel R. Dean
D. Sarkar
AAML
17
0
0
25 Aug 2022
Rethinking Cost-sensitive Classification in Deep Learning via Adversarial Data Augmentation
Qiyuan Chen
Raed Al Kontar
Maher Nouiehed
Xi Yang
Corey A. Lester
AAML
60
2
0
24 Aug 2022
Black-box Attacks Against Neural Binary Function Detection
Josh Bundt
Michael Davinroy
Ioannis Agadakos
Alina Oprea
William K. Robertson
AAML
51
1
0
24 Aug 2022
Trace and Detect Adversarial Attacks on CNNs using Feature Response Maps
Mohammadreza Amirian
Friedhelm Schwenker
Thilo Stadelmann
AAML
74
16
0
24 Aug 2022
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Simin Li
Huangxinxin Xu
Jiakai Wang
Aishan Liu
Fazhi He
Xianglong Liu
Dacheng Tao
AAML
64
6
0
23 Aug 2022
Previous
1
2
3
...
11
12
13
...
44
45
46
Next