ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for
  Image Classifier Models
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
70
16
0
19 Aug 2022
Resisting Adversarial Attacks in Deep Neural Networks using Diverse
  Decision Boundaries
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Manaar Alam
Shubhajit Datta
Debdeep Mukhopadhyay
Arijit Mondal
P. Chakrabarti
AAML
30
5
0
18 Aug 2022
Shadows Aren't So Dangerous After All: A Fast and Robust Defense Against
  Shadow-Based Adversarial Attacks
Shadows Aren't So Dangerous After All: A Fast and Robust Defense Against Shadow-Based Adversarial Attacks
Andrew Wang
Wyatt Mayor
Ryan Smith
Gopal Nookula
G. Ditzler
AAML
58
1
0
18 Aug 2022
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for
  Generating Adversarial Instances in Deep Networks
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for Generating Adversarial Instances in Deep Networks
Raz Lapid
Zvika Haramaty
Moshe Sipper
AAMLMLAU
73
12
0
17 Aug 2022
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Dong Huang
Qi Bu
Yuhao Qing
Haowen Pi
Sen Wang
Heming Cui
OODAAML
60
0
0
17 Aug 2022
An Overview and Prospective Outlook on Robust Training and Certification
  of Machine Learning Models
An Overview and Prospective Outlook on Robust Training and Certification of Machine Learning Models
Brendon G. Anderson
Tanmay Gautam
Somayeh Sojoudi
OOD
53
2
0
15 Aug 2022
Scale-free and Task-agnostic Attack: Generating Photo-realistic
  Adversarial Patterns with Patch Quilting Generator
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator
Xiang Gao
Cheng Luo
Qinliang Lin
Weicheng Xie
Minmin Liu
Linlin Shen
Keerthy Kusumam
Siyang Song
50
5
0
12 Aug 2022
Abutting Grating Illusion: Cognitive Challenge to Neural Network Models
Abutting Grating Illusion: Cognitive Challenge to Neural Network Models
Jinyu Fan
Yi Zeng
AAML
58
1
0
08 Aug 2022
Design of secure and robust cognitive system for malware detection
Design of secure and robust cognitive system for malware detection
Sanket Shukla
AAML
51
2
0
03 Aug 2022
Is current research on adversarial robustness addressing the right
  problem?
Is current research on adversarial robustness addressing the right problem?
Ali Borji
OODAAML
56
1
0
31 Jul 2022
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against
  Adversarial Machine Learning
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning
Mohammad Hossein Samavatian
Saikat Majumdar
Kristin Barber
R. Teodorescu
AAML
90
2
0
31 Jul 2022
Why Accuracy Is Not Enough: The Need for Consistency in Object Detection
Why Accuracy Is Not Enough: The Need for Consistency in Object Detection
Caleb Tung
Abhinav Goel
Fischer Bordwell
Nick Eliopoulos
Xiao Hu
George K. Thiruvathukal
Yung-Hsiang Lu
25
4
0
28 Jul 2022
Look Closer to Your Enemy: Learning to Attack via Teacher-Student
  Mimicking
Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking
Mingejie Wang
Jianxiong Guo
Sirui Li
Dingwen Xiao
Zhiqing Tang
AAML
83
0
0
27 Jul 2022
Point Cloud Attacks in Graph Spectral Domain: When 3D Geometry Meets
  Graph Signal Processing
Point Cloud Attacks in Graph Spectral Domain: When 3D Geometry Meets Graph Signal Processing
Daizong Liu
Wei Hu
Xin Li
AAML3DPC
95
16
0
27 Jul 2022
SegPGD: An Effective and Efficient Adversarial Attack for Evaluating and
  Boosting Segmentation Robustness
SegPGD: An Effective and Efficient Adversarial Attack for Evaluating and Boosting Segmentation Robustness
Jindong Gu
Hengshuang Zhao
Volker Tresp
Philip Torr
AAML
119
77
0
25 Jul 2022
Contrastive Self-Supervised Learning Leads to Higher Adversarial
  Susceptibility
Contrastive Self-Supervised Learning Leads to Higher Adversarial Susceptibility
Rohit Gupta
Naveed Akhtar
Ajmal Mian
M. Shah
AAMLSSL
60
5
0
22 Jul 2022
Generating and Detecting True Ambiguity: A Forgotten Danger in DNN
  Supervision Testing
Generating and Detecting True Ambiguity: A Forgotten Danger in DNN Supervision Testing
Michael Weiss
A. Gómez
Paolo Tonella
AAML
62
6
0
21 Jul 2022
Decorrelative Network Architecture for Robust Electrocardiogram
  Classification
Decorrelative Network Architecture for Robust Electrocardiogram Classification
Christopher Wiedeman
Ge Wang
OOD
77
2
0
19 Jul 2022
Multi-step domain adaptation by adversarial attack to $\mathcal{H}
  Δ\mathcal{H}$-divergence
Multi-step domain adaptation by adversarial attack to HΔH\mathcal{H} Δ\mathcal{H}HΔH-divergence
Arip Asadulaev
Alexander Panfilov
Andrey Filchenkov
AAML
26
0
0
18 Jul 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable
  Perturbations
Adversarial Pixel Restoration as a Pretext Task for Transferable Perturbations
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
Fahad Shahbaz Khan
AAML
57
8
0
18 Jul 2022
Rank-based Decomposable Losses in Machine Learning: A Survey
Rank-based Decomposable Losses in Machine Learning: A Survey
Shu Hu
Xin Wang
Siwei Lyu
100
32
0
18 Jul 2022
DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking
DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking
Xiangyu Yin
Wenjie Ruan
J. Fieldsend
AAML
74
29
0
17 Jul 2022
Masked Spatial-Spectral Autoencoders Are Excellent Hyperspectral
  Defenders
Masked Spatial-Spectral Autoencoders Are Excellent Hyperspectral Defenders
Jiahao Qi
Z. Gong
Xingyue Liu
Kangcheng Bin
Chen Chen
Yongqiang Li
Wei Xue
Yu Zhang
P. Zhong
AAML
81
6
0
16 Jul 2022
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial
  Training
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Xiaoyu Liang
Yaguan Qian
Jianchang Huang
Xiang Ling
Bin Wang
Chunming Wu
Wassim Swaileh
AAML
45
4
0
16 Jul 2022
Work In Progress: Safety and Robustness Verification of
  Autoencoder-Based Regression Models using the NNV Tool
Work In Progress: Safety and Robustness Verification of Autoencoder-Based Regression Models using the NNV Tool
Neelanjana Pal
Taylor T. Johnson
35
1
0
14 Jul 2022
Interactive Machine Learning: A State of the Art Review
Interactive Machine Learning: A State of the Art Review
Natnael A. Wondimu
Cédric Buche
U. Visser
VLMHAI
102
10
0
13 Jul 2022
Perturbation Inactivation Based Adversarial Defense for Face Recognition
Perturbation Inactivation Based Adversarial Defense for Face Recognition
Min Ren
Yuhao Zhu
Yunlong Wang
Zhenan Sun
AAML
56
14
0
13 Jul 2022
Exploring Adversarial Examples and Adversarial Robustness of
  Convolutional Neural Networks by Mutual Information
Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
GANAAML
61
0
0
12 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
103
167
0
12 Jul 2022
Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust
  Deep Neural Architectures
Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust Deep Neural Architectures
Jia-Wei Liu
Ran Cheng
Yaochu Jin
AAML
114
7
0
12 Jul 2022
RUSH: Robust Contrastive Learning via Randomized Smoothing
Yijiang Pang
Boyang Liu
Jiayu Zhou
OODAAML
61
1
0
11 Jul 2022
How many perturbations break this model? Evaluating robustness beyond
  adversarial accuracy
How many perturbations break this model? Evaluating robustness beyond adversarial accuracy
R. Olivier
Bhiksha Raj
AAML
66
5
0
08 Jul 2022
Guiding the retraining of convolutional neural networks against
  adversarial inputs
Guiding the retraining of convolutional neural networks against adversarial inputs
Francisco Durán
Silverio Martínez-Fernández
Michael Felderer
Xavier Franch
AAML
117
1
0
08 Jul 2022
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean
  Label
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
107
46
0
01 Jul 2022
MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples
  Detectors
MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples Detectors
Federica Granese
Marine Picot
Marco Romanelli
Francisco Messina
Pablo Piantanida
AAML
79
3
0
30 Jun 2022
Detecting and Recovering Adversarial Examples from Extracting Non-robust
  and Highly Predictive Adversarial Perturbations
Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Mingyu Dong
Jiahao Chen
Diqun Yan
Jingxing Gao
Li Dong
Rangding Wang
AAML
56
0
0
30 Jun 2022
A Deep Learning Approach to Create DNS Amplification Attacks
A Deep Learning Approach to Create DNS Amplification Attacks
Jared Mathews
Prosenjit Chatterjee
S. Banik
Cory Nance
AAML
41
1
0
29 Jun 2022
Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Chen-Hao Hu
Weiwen Shi
AAML
106
5
0
23 Jun 2022
Transferable Graph Backdoor Attack
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
Damith C. Ranasinghe
S. Kanhere
AAML
96
39
0
21 Jun 2022
Measuring Lower Bounds of Local Differential Privacy via Adversary
  Instantiations in Federated Learning
Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Marin Matsumoto
Tsubasa Takahashi
Seng Pei Liew
M. Oguchi
FedMLBDL
55
0
0
18 Jun 2022
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal
  Fake News Detection
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection
Jinyin Chen
Chengyu Jia
Haibin Zheng
Ruoxi Chen
Chenbo Fu
AAML
73
12
0
17 Jun 2022
Adversarial Patch Attacks and Defences in Vision-Based Tasks: A Survey
Adversarial Patch Attacks and Defences in Vision-Based Tasks: A Survey
Abhijith Sharma
Yijun Bian
Phil Munz
Apurva Narayan
VLMAAML
82
20
0
16 Jun 2022
Improving Diversity with Adversarially Learned Transformations for
  Domain Generalization
Improving Diversity with Adversarially Learned Transformations for Domain Generalization
Tejas Gokhale
Rushil Anirudh
Jayaraman J. Thiagarajan
B. Kailkhura
Chitta Baral
Yezhou Yang
75
31
0
15 Jun 2022
Proximal Splitting Adversarial Attacks for Semantic Segmentation
Proximal Splitting Adversarial Attacks for Semantic Segmentation
Jérôme Rony
J. Pesquet
Ismail Ben Ayed
AAML
55
23
0
14 Jun 2022
Adversarial Vulnerability of Randomized Ensembles
Adversarial Vulnerability of Randomized Ensembles
Hassan Dbouk
Naresh R Shanbhag
AAML
61
7
0
14 Jun 2022
Pixel to Binary Embedding Towards Robustness for CNNs
Pixel to Binary Embedding Towards Robustness for CNNs
Ikki Kishida
Hideki Nakayama
140
0
0
13 Jun 2022
Security of Machine Learning-Based Anomaly Detection in Cyber Physical
  Systems
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems
Zahra Jadidi
S. Pal
Nithesh Nayak K
A. Selvakkumar
C. Chang
Maedeh Beheshti
A. Jolfaei
AAML
40
11
0
12 Jun 2022
An Efficient Method for Sample Adversarial Perturbations against
  Nonlinear Support Vector Machines
An Efficient Method for Sample Adversarial Perturbations against Nonlinear Support Vector Machines
Wen Su
Qingna Li
AAML
31
0
0
12 Jun 2022
Rare event failure test case generation in Learning-Enabled-Controllers
Rare event failure test case generation in Learning-Enabled-Controllers
H. Vardhan
J. Sztipanovits
68
20
0
11 Jun 2022
Defending Adversarial Examples by Negative Correlation Ensemble
Defending Adversarial Examples by Negative Correlation Ensemble
Wenjian Luo
Hongwei Zhang
Linghao Kong
Zhijian Chen
Jiaheng Zhang
AAML
27
1
0
11 Jun 2022
Previous
123...121314...444546
Next