ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Robust Semantic Communications with Masked VQ-VAE Enabled Codebook
Robust Semantic Communications with Masked VQ-VAE Enabled Codebook
Qiyu Hu
Guangyi Zhang
Zhijin Qin
Yunlong Cai
Guanding Yu
Geoffrey Ye Li
AAML
96
150
0
08 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
85
2
0
08 Jun 2022
LADDER: Latent Boundary-guided Adversarial Training
LADDER: Latent Boundary-guided Adversarial Training
Xiaowei Zhou
Ivor W. Tsang
Jie Yin
AAML
47
7
0
08 Jun 2022
Toward Certified Robustness Against Real-World Distribution Shifts
Toward Certified Robustness Against Real-World Distribution Shifts
Haoze Wu
Teruhiro Tagomori
Alexander Robey
Fengjun Yang
Nikolai Matni
George Pappas
Hamed Hassani
C. Păsăreanu
Clark W. Barrett
AAMLOOD
115
18
0
08 Jun 2022
Fooling Explanations in Text Classifiers
Fooling Explanations in Text Classifiers
Adam Ivankay
Ivan Girardi
Chiara Marchiori
P. Frossard
AAML
85
20
0
07 Jun 2022
Certified Robustness in Federated Learning
Certified Robustness in Federated Learning
Motasem Alfarra
Juan C. Pérez
Egor Shulgin
Peter Richtárik
Guohao Li
AAMLFedML
91
8
0
06 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
105
11
0
04 Jun 2022
Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Amrith Rajagopal Setlur
Benjamin Eysenbach
Virginia Smith
Sergey Levine
73
18
0
03 Jun 2022
Adaptive Adversarial Training to Improve Adversarial Robustness of DNNs
  for Medical Image Segmentation and Detection
Adaptive Adversarial Training to Improve Adversarial Robustness of DNNs for Medical Image Segmentation and Detection
Linhai Ma
Liang Liang
OOD
76
6
0
02 Jun 2022
Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNs
Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNs
Chen-Hao Hu
Yilong Wang
Kalibinuer Tiliwalidi
Wen Li
AAML
118
17
0
02 Jun 2022
FACM: Intermediate Layer Still Retain Effective Features against
  Adversarial Examples
FACM: Intermediate Layer Still Retain Effective Features against Adversarial Examples
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
79
0
0
02 Jun 2022
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
Junjian Li
Honglong Chen
AAML
37
2
0
02 Jun 2022
On the reversibility of adversarial attacks
On the reversibility of adversarial attacks
C. Li
Ricardo Sánchez-Matilla
Ali Shahin Shamsabadi
Riccardo Mazzon
Andrea Cavallaro
AAML
47
2
0
01 Jun 2022
Attack-Agnostic Adversarial Detection
Attack-Agnostic Adversarial Detection
Jiaxin Cheng
Mohamed Hussein
J. Billa
Wael AbdAlmageed
AAML
63
0
0
01 Jun 2022
Hide and Seek: on the Stealthiness of Attacks against Deep Learning
  Systems
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
AAML
52
2
0
31 May 2022
Searching for the Essence of Adversarial Perturbations
Searching for the Essence of Adversarial Perturbations
Dennis Y. Menn
Tzu-hsun Feng
Hung-yi Lee
AAML
26
1
0
30 May 2022
Superclass Adversarial Attack
Superclass Adversarial Attack
Soichiro Kumano
Hiroshi Kera
T. Yamasaki
AAML
72
1
0
29 May 2022
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating
  Weather Conditions on the Camera Lens of Autonomous Systems
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems
Alberto Marchisio
Giovanni Caramia
Maurizio Martina
Mohamed Bennai
AAML
70
8
0
27 May 2022
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural
  Networks via Image Quantization and Contrastive Adversarial Learning
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Zhenting Wang
Juan Zhai
Shiqing Ma
AAML
177
102
0
26 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
199
28
0
24 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Post-breach Recovery: Protection against White-box Adversarial Examples
  for Leaked DNN Models
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
75
11
0
21 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
65
0
0
21 May 2022
On the Feasibility and Generality of Patch-based Adversarial Attacks on
  Semantic Segmentation Problems
On the Feasibility and Generality of Patch-based Adversarial Attacks on Semantic Segmentation Problems
Soma Kontár
A. Horváth
AAML
69
1
0
21 May 2022
Robust Sensible Adversarial Learning of Deep Neural Networks for Image
  Classification
Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification
Jungeum Kim
Tianlin Li
OODAAML
26
3
0
20 May 2022
Defending Against Adversarial Attacks by Energy Storage Facility
Defending Against Adversarial Attacks by Energy Storage Facility
Jiawei Li
Jianxiao Wang
Lin Chen
Yang Yu
AAML
25
1
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
74
0
0
19 May 2022
Gradient-based Counterfactual Explanations using Tractable Probabilistic
  Models
Gradient-based Counterfactual Explanations using Tractable Probabilistic Models
Xiaoting Shao
Kristian Kersting
BDL
56
1
0
16 May 2022
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial
  Attacks
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks
Siddhartha Datta
AAML
106
5
0
15 May 2022
Evaluating Membership Inference Through Adversarial Robustness
Evaluating Membership Inference Through Adversarial Robustness
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Bilal Hussain Abbasi
Shengshan Hu
AAML
85
17
0
14 May 2022
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary
  Backdoor Pattern Types Using a Maximum Margin Statistic
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
96
44
0
13 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
67
56
0
12 May 2022
Btech thesis report on adversarial attack detection and purification of
  adverserially attacked images
Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Dvij Kalaria
AAML
17
1
0
09 May 2022
Holistic Approach to Measure Sample-level Adversarial Vulnerability and
  its Utility in Building Trustworthy Systems
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems
Gaurav Kumar Nayak
Ruchit Rawal
Rohit Lal
Himanshu Patil
Anirban Chakraborty
AAML
58
2
0
05 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
89
7
0
05 May 2022
Rethinking Classifier and Adversarial Attack
Rethinking Classifier and Adversarial Attack
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
57
0
0
04 May 2022
CE-based white-box adversarial attacks will not work using super-fitting
CE-based white-box adversarial attacks will not work using super-fitting
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
104
0
0
04 May 2022
DDDM: a Brain-Inspired Framework for Robust Classification
DDDM: a Brain-Inspired Framework for Robust Classification
Xiyuan Chen
Xingyu Li
Yi Zhou
Tianming Yang
AAMLDiffM
77
7
0
01 May 2022
Software Testing for Machine Learning
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
60
29
0
30 Apr 2022
Detecting Textual Adversarial Examples Based on Distributional
  Characteristics of Data Representations
Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Na Liu
Mark Dras
Wei Emma Zhang
AAML
51
6
0
29 Apr 2022
Defending Person Detection Against Adversarial Patch Attack by using
  Universal Defensive Frame
Defending Person Detection Against Adversarial Patch Attack by using Universal Defensive Frame
Youngjoon Yu
Hong Joo Lee
Hakmin Lee
Yong Man Ro
AAML
44
11
0
27 Apr 2022
A Simple Structure For Building A Robust Model
A Simple Structure For Building A Robust Model
Xiao Tan
Jingbo Gao
Ruolin Li
AAMLOOD
84
3
0
25 Apr 2022
A Mask-Based Adversarial Defense Scheme
A Mask-Based Adversarial Defense Scheme
Weizhen Xu
Chenyi Zhang
Fangzhen Zhao
Liangda Fang
AAML
77
3
0
21 Apr 2022
Testing robustness of predictions of trained classifiers against
  naturally occurring perturbations
Testing robustness of predictions of trained classifiers against naturally occurring perturbations
S. Scher
A. Trugler
OODAAML
90
1
0
21 Apr 2022
Special Session: Towards an Agile Design Methodology for Efficient,
  Reliable, and Secure ML Systems
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems
Shail Dave
Alberto Marchisio
Muhammad Abdullah Hanif
Amira Guesmi
Aviral Shrivastava
Ihsen Alouani
Mohamed Bennai
75
14
0
18 Apr 2022
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based
  Retrieval
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based Retrieval
Xunguang Wang
Yinqun Lin
Xuelong Li
AAMLGAN
82
7
0
18 Apr 2022
Learning Compositional Representations for Effective Low-Shot
  Generalization
Learning Compositional Representations for Effective Low-Shot Generalization
Samarth Mishra
Pengkai Zhu
Venkatesh Saligrama
OCL
56
3
0
17 Apr 2022
Towards Comprehensive Testing on the Robustness of Cooperative
  Multi-agent Reinforcement Learning
Towards Comprehensive Testing on the Robustness of Cooperative Multi-agent Reinforcement Learning
Jun Guo
Yonghong Chen
Yihang Hao
Zixin Yin
Yin Yu
Simin Li
AAML
106
34
0
17 Apr 2022
Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot
  Learning
Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot Learning
Mathias Lechner
Alexander Amini
Daniela Rus
T. Henzinger
AAML
91
10
0
15 Apr 2022
From Environmental Sound Representation to Robustness of 2D CNN Models
  Against Adversarial Attacks
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
108
7
0
14 Apr 2022
Previous
123...131415...444546
Next