ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Liuer Mihou: A Practical Framework for Generating and Evaluating
  Grey-box Adversarial Attacks against NIDS
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS
Ke He
Dan Dongseong Kim
Jing Sun
J. Yoo
Young Hun Lee
H. Kim
AAML
21
5
0
12 Apr 2022
Anti-Adversarially Manipulated Attributions for Weakly Supervised
  Semantic Segmentation and Object Localization
Anti-Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization
Jungbeom Lee
Eunji Kim
J. Mok
Sung-Hoon Yoon
WSOL
111
32
0
11 Apr 2022
Measuring the False Sense of Security
Measuring the False Sense of Security
Carlos Gomes
AAML
51
0
0
10 Apr 2022
Adaptive-Gravity: A Defense Against Adversarial Samples
Adaptive-Gravity: A Defense Against Adversarial Samples
Ali Mirzaeian
Zhi Tian
Sai Manoj P D
B. S. Latibari
I. Savidis
Houman Homayoun
Avesta Sasan
AAMLOOD
40
1
0
07 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Optimization Models and Interpretations for Three Types of Adversarial
  Perturbations against Support Vector Machines
Optimization Models and Interpretations for Three Types of Adversarial Perturbations against Support Vector Machines
Wen Su
Qingna Li
Chunfeng Cui
AAML
48
1
0
07 Apr 2022
Adversarial Robustness through the Lens of Convolutional Filters
Adversarial Robustness through the Lens of Convolutional Filters
Paul Gavrikov
J. Keuper
70
15
0
05 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
93
9
0
02 Apr 2022
Supervised Robustness-preserving Data-free Neural Network Pruning
Supervised Robustness-preserving Data-free Neural Network Pruning
Mark Huasong Meng
Guangdong Bai
Sin Gee Teo
Jin Song Dong
AAML
96
4
0
02 Apr 2022
FrequencyLowCut Pooling -- Plug & Play against Catastrophic Overfitting
FrequencyLowCut Pooling -- Plug & Play against Catastrophic Overfitting
Julia Grabinski
Steffen Jung
J. Keuper
Margret Keuper
AAML
73
22
0
01 Apr 2022
Scalable Whitebox Attacks on Tree-based Models
Scalable Whitebox Attacks on Tree-based Models
Giuseppe Castiglione
G. Ding
Masoud Hashemi
C. Srinivasa
Ga Wu
AAML
23
1
0
31 Mar 2022
StyleFool: Fooling Video Classification Systems via Style Transfer
StyleFool: Fooling Video Classification Systems via Style Transfer
Yu Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
AAML
118
26
0
30 Mar 2022
NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image
  Caption Generation Models
NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models
Simin Chen
Zihe Song
Mirazul Haque
Cong Liu
Wei Yang
66
42
0
29 Mar 2022
Boosting Black-Box Adversarial Attacks with Meta Learning
Boosting Black-Box Adversarial Attacks with Meta Learning
Junjie Fu
Jian Sun
Chongqing
AAML
34
4
0
28 Mar 2022
A Survey of Robust Adversarial Training in Pattern Recognition:
  Fundamental, Theory, and Methodologies
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
Zhuang Qian
Kaizhu Huang
Qiufeng Wang
Xu-Yao Zhang
OODAAMLObjD
128
73
0
26 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
112
5
0
25 Mar 2022
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep
  Neural Networks
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks
Xiaofei Xie
Tianlin Li
Jian-Xun Wang
Lei Ma
Qing Guo
Felix Juefei Xu
Yang Liu
AAML
87
55
0
24 Mar 2022
Making DeepFakes more spurious: evading deep face forgery detection via
  trace removal attack
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Chi Liu
Huajie Chen
Tianqing Zhu
Jun Zhang
Wanlei Zhou
AAML
69
24
0
22 Mar 2022
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Johannes Schneider
Giovanni Apruzzese
AAML
132
8
0
18 Mar 2022
Neural Predictor for Black-Box Adversarial Attacks on Speech Recognition
Neural Predictor for Black-Box Adversarial Attacks on Speech Recognition
Marie Biolková
Bac Nguyen
AAML
37
2
0
18 Mar 2022
Leveraging Adversarial Examples to Quantify Membership Information
  Leakage
Leveraging Adversarial Examples to Quantify Membership Information Leakage
Ganesh Del Grosso
Hamid Jalalzai
Georg Pichler
C. Palamidessi
Pablo Piantanida
MIACV
77
23
0
17 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAMLMLAU
141
25
0
16 Mar 2022
Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?
Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?
Y. Fu
Shunyao Zhang
Shan-Hung Wu
Cheng Wan
Yingyan Lin
AAML
113
67
0
16 Mar 2022
Active Learning by Feature Mixing
Active Learning by Feature Mixing
Amin Parvaneh
Ehsan Abbasnejad
Damien Teney
Reza Haffari
Anton Van Den Hengel
Javen Qinfeng Shi
81
94
0
14 Mar 2022
LAS-AT: Adversarial Training with Learnable Attack Strategy
LAS-AT: Adversarial Training with Learnable Attack Strategy
Xiaojun Jia
Yong Zhang
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
76
140
0
13 Mar 2022
Block-Sparse Adversarial Attack to Fool Transformer-Based Text
  Classifiers
Block-Sparse Adversarial Attack to Fool Transformer-Based Text Classifiers
Sahar Sadrizadeh
Ljiljana Dolamic
P. Frossard
AAML
118
10
0
11 Mar 2022
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Ye Liu
Yaya Cheng
Lianli Gao
Xianglong Liu
Qilong Zhang
Jingkuan Song
AAML
109
61
0
10 Mar 2022
Robust Federated Learning Against Adversarial Attacks for Speech Emotion
  Recognition
Robust Federated Learning Against Adversarial Attacks for Speech Emotion Recognition
Yi Chang
Sofiane Laridi
Zhao Ren
Gregory Palmer
Björn W. Schuller
M. Fisichella
FedMLAAML
72
14
0
09 Mar 2022
Adaptative Perturbation Patterns: Realistic Adversarial Learning for
  Robust Intrusion Detection
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
João Vitorino
Nuno Oliveira
Isabel Praça
AAML
58
29
0
08 Mar 2022
Data augmentation with mixtures of max-entropy transformations for
  filling-level classification
Data augmentation with mixtures of max-entropy transformations for filling-level classification
Apostolos Modas
Andrea Cavallaro
P. Frossard
95
0
0
08 Mar 2022
Adversarial Texture for Fooling Person Detectors in the Physical World
Adversarial Texture for Fooling Person Detectors in the Physical World
Zhan Hu
Siyuan Huang
Xiaopei Zhu
Gang Hua
Bo Zhang
Xiaolin Hu
AAML
77
108
0
07 Mar 2022
Hybrid Deep Learning Model using SPCAGAN Augmentation for Insider Threat
  Analysis
Hybrid Deep Learning Model using SPCAGAN Augmentation for Insider Threat Analysis
Gayathri R.G.
Atul Sajjanhar
Yong Xiang
AAML
62
8
0
06 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
107
1
0
04 Mar 2022
Why adversarial training can hurt robust accuracy
Why adversarial training can hurt robust accuracy
Jacob Clarysse
Julia Hörrmann
Fanny Yang
AAML
43
19
0
03 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial
  Training
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
48
2
0
28 Feb 2022
Limitations of Deep Learning for Inverse Problems on Digital Hardware
Limitations of Deep Learning for Inverse Problems on Digital Hardware
Holger Boche
Adalbert Fono
Gitta Kutyniok
97
25
0
28 Feb 2022
Adversarial robustness of sparse local Lipschitz predictors
Adversarial robustness of sparse local Lipschitz predictors
Ramchandran Muthukumar
Jeremias Sulam
AAML
92
13
0
26 Feb 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
44
2
0
25 Feb 2022
MUC-driven Feature Importance Measurement and Adversarial Analysis for
  Random Forest
MUC-driven Feature Importance Measurement and Adversarial Analysis for Random Forest
Shucen Ma
Jianqi Shi
Yanhong Huang
Shengchao Qin
Zhe Hou
AAML
59
4
0
25 Feb 2022
Understanding Adversarial Robustness from Feature Maps of Convolutional
  Layers
Understanding Adversarial Robustness from Feature Maps of Convolutional Layers
Cong Xu
Wei Zhang
Jun Wang
Min Yang
AAML
62
2
0
25 Feb 2022
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Spyridon Mouselinos
Henryk Michalewski
Mateusz Malinowski
69
3
0
24 Feb 2022
Improving Robustness of Convolutional Neural Networks Using Element-Wise
  Activation Scaling
Improving Robustness of Convolutional Neural Networks Using Element-Wise Activation Scaling
Zhi-Yuan Zhang
Di Liu
AAML
17
1
0
24 Feb 2022
LPF-Defense: 3D Adversarial Defense based on Frequency Analysis
LPF-Defense: 3D Adversarial Defense based on Frequency Analysis
Hanieh Naderi
Kimia Noorbakhsh
Arian Etemadi
S. Kasaei
AAML
76
14
0
23 Feb 2022
Universal adversarial perturbation for remote sensing images
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
57
5
0
22 Feb 2022
Adversarial Attacks on Speech Recognition Systems for Mission-Critical
  Applications: A Survey
Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey
Ngoc Dung Huynh
Mohamed Reda Bouadjenek
Imran Razzak
Kevin Lee
Chetan Arora
Ali Hassani
A. Zaslavsky
AAML
61
6
0
22 Feb 2022
Model-Agnostic Augmentation for Accurate Graph Classification
Model-Agnostic Augmentation for Accurate Graph Classification
Jaemin Yoo
Sooyeon Shim
U. Kang
GNN
87
30
0
21 Feb 2022
Robustness and Accuracy Could Be Reconcilable by (Proper) Definition
Robustness and Accuracy Could Be Reconcilable by (Proper) Definition
Tianyu Pang
Min Lin
Xiao Yang
Junyi Zhu
Shuicheng Yan
120
124
0
21 Feb 2022
Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML
  Systems
Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML Systems
Mohamad Fazelnia
I. Khokhlov
Mehdi Mirakhorli
AAML
28
5
0
18 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAMLFedML
117
68
0
17 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
72
7
0
15 Feb 2022
Previous
123...141516...444546
Next