ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Life-Cycle Routing Vulnerabilities of LLM Router
Qiqi Lin
Xiaoyang Ji
Shengfang Zhai
Qingni Shen
Zhi-Li Zhang
Yuejian Fang
Yansong Gao
AAML
90
1
0
09 Mar 2025
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
AAML
83
0
0
08 Mar 2025
Boosting the Local Invariance for Better Adversarial Transferability
Bohan Liu
Xiaosen Wang
AAML
157
0
0
08 Mar 2025
Energy-Latency Attacks: A New Adversarial Threat to Deep Learning
H. B. Meftah
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
70
0
0
06 Mar 2025
CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Songlong Xing
Zhengyu Zhao
N. Sebe
AAML
153
2
0
05 Mar 2025
Task-Agnostic Attacks Against Vision Foundation Models
Brian Pulfer
Yury Belousov
Vitaliy Kinakh
Teddy Furon
S. Voloshynovskiy
AAML
111
0
0
05 Mar 2025
A Survey of Adversarial Defenses in Vision-based Systems: Categorization, Methods and Challenges
Nandish Chattopadhyay
Abdul Basit
B. Ouni
Muhammad Shafique
AAML
89
0
0
01 Mar 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
429
0
0
28 Feb 2025
LISArD: Learning Image Similarity to Defend Against Gray-box Adversarial Attacks
LISArD: Learning Image Similarity to Defend Against Gray-box Adversarial Attacks
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
127
0
0
27 Feb 2025
Unified Prompt Attack Against Text-to-Image Generation Models
Unified Prompt Attack Against Text-to-Image Generation Models
Duo Peng
Qiuhong Ke
Mark He Huang
Ping Hu
Jing Liu
89
1
0
23 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
184
0
0
20 Feb 2025
AdvSwap: Covert Adversarial Perturbation with High Frequency Info-swapping for Autonomous Driving Perception
AdvSwap: Covert Adversarial Perturbation with High Frequency Info-swapping for Autonomous Driving Perception
Yuanhao Huang
Qinfan Zhang
Jiandong Xing
Mengyue Cheng
Haiyang Yu
Yilong Ren
Xiao Xiong
AAML
108
2
0
12 Feb 2025
Sparse Autoencoders for Scientifically Rigorous Interpretation of Vision Models
Sparse Autoencoders for Scientifically Rigorous Interpretation of Vision Models
Samuel Stevens
Wei-Lun Chao
T. Berger-Wolf
Yu-Chuan Su
VLM
148
6
0
10 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedImAAML
147
0
0
04 Feb 2025
Scanning Trojaned Models Using Out-of-Distribution Samples
Scanning Trojaned Models Using Out-of-Distribution Samples
Hossein Mirzaei
Ali Ansari
Bahar Dibaei Nia
Mojtaba Nafez
Moein Madadi
...
Kian Shamsaie
Mahdi Hajialilue
Jafar Habibi
Mohammad Sabokrou
M. Rohban
OODD
143
3
0
28 Jan 2025
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
N. Shah
Ayan Kashyap
Shirish S. Karande
Vineet Gandhi
84
1
0
20 Jan 2025
On the uncertainty principle of neural networks
On the uncertainty principle of neural networks
Jun-Jie Zhang
Dong-xiao Zhang
Jian-Nan Chen
L. Pang
Deyu Meng
145
3
0
17 Jan 2025
Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness
Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness
Olukorede Fakorede
Modeste Atsague
Jin Tian
AAML
77
0
0
31 Dec 2024
Sample Correlation for Fingerprinting Deep Face Recognition
Sample Correlation for Fingerprinting Deep Face Recognition
Jiyang Guan
Jian Liang
Yanbo Wang
Ran He
AAML
154
0
0
31 Dec 2024
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
Ziqi Zhou
Bowen Li
Yufei Song
Zhifei Yu
Shengshan Hu
Wei Wan
L. Zhang
Dezhong Yao
Hai Jin
AAML
177
2
0
22 Dec 2024
Texture- and Shape-based Adversarial Attacks for Vehicle Detection in
  Synthetic Overhead Imagery
Texture- and Shape-based Adversarial Attacks for Vehicle Detection in Synthetic Overhead Imagery
Mikael Yeghiazaryan
Sai Abhishek Siddhartha Namburu
Emily Kim
Stanislav Panev
Celso de Melo
Brent Lance
Fernando de la Torre
Jessica K. Hodgins
AAML
130
0
0
20 Dec 2024
Sonar-based Deep Learning in Underwater Robotics: Overview, Robustness
  and Challenges
Sonar-based Deep Learning in Underwater Robotics: Overview, Robustness and Challenges
Martin Aubard
Ana Madureira
Luis F. Teixeira
José Pinto
AAML
140
3
0
16 Dec 2024
Towards Adversarial Robustness of Model-Level Mixture-of-Experts
  Architectures for Semantic Segmentation
Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation
Svetlana Pavlitska
Enrico Eisen
J. Marius Zöllner
AAMLUQCVMoE
176
1
0
16 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffMAAML
203
1
0
16 Dec 2024
Improving Graph Neural Networks via Adversarial Robustness Evaluation
Improving Graph Neural Networks via Adversarial Robustness Evaluation
Yongyu Wang
AAML
102
0
0
14 Dec 2024
Image Privacy Protection: A Survey
Image Privacy Protection: A Survey
Wenying Wen
Ziye Yuan
Yushu Zhang
Tao Wang
Xiangli Xiao
Ruoyu Zhao
Yuming Fang
PILM
136
0
0
05 Dec 2024
Pre-trained Multiple Latent Variable Generative Models are good
  defenders against Adversarial Attacks
Pre-trained Multiple Latent Variable Generative Models are good defenders against Adversarial Attacks
Dario Serez
Marco Cristani
Alessio Del Bue
Vittorio Murino
Pietro Morerio
AAML
164
0
0
04 Dec 2024
Hard-Label Black-Box Attacks on 3D Point Clouds
Hard-Label Black-Box Attacks on 3D Point Clouds
Daizong Liu
Yunbo Tao
Pan Zhou
Wei Hu
3DPC
158
0
0
30 Nov 2024
Face De-identification: State-of-the-art Methods and Comparative Studies
Face De-identification: State-of-the-art Methods and Comparative Studies
Jingyi Cao
Xiangyi Chen
Bo Liu
Ming Ding
Rong Xie
Li Song
Zhu Li
Wenjun Zhang
PICV
91
2
0
15 Nov 2024
A Survey of AI-Related Cyber Security Risks and Countermeasures in
  Mobility-as-a-Service
A Survey of AI-Related Cyber Security Risks and Countermeasures in Mobility-as-a-Service
Kai-Fung Chu
Haiyue Yuan
Jinsheng Yuan
Weisi Guo
Nazmiye Balta-Ozkan
Shujun Li
76
3
0
08 Nov 2024
Deferred Poisoning: Making the Model More Vulnerable via Hessian
  Singularization
Deferred Poisoning: Making the Model More Vulnerable via Hessian Singularization
Yuhao He
Jinyu Tian
Xianwei Zheng
Li Dong
Yuanman Li
L. Zhang
AAML
88
0
0
06 Nov 2024
Trustworthy Federated Learning: Privacy, Security, and Beyond
Trustworthy Federated Learning: Privacy, Security, and Beyond
Chunlu Chen
Ji Liu
Haowen Tan
Xingjian Li
Kevin I-Kai Wang
Peng Li
Kouichi Sakurai
Dejing Dou
FedML
105
11
0
03 Nov 2024
DeepCore: Simple Fingerprint Construction for Differentiating Homologous
  and Piracy Models
DeepCore: Simple Fingerprint Construction for Differentiating Homologous and Piracy Models
Haifeng Sun
Lan Zhang
Xiang-Yang Li
97
0
0
01 Nov 2024
Protecting Feed-Forward Networks from Adversarial Attacks Using
  Predictive Coding
Protecting Feed-Forward Networks from Adversarial Attacks Using Predictive Coding
Ehsan Ganjidoost
Jeff Orchard
AAML
47
0
0
31 Oct 2024
FAIR-TAT: Improving Model Fairness Using Targeted Adversarial Training
FAIR-TAT: Improving Model Fairness Using Targeted Adversarial Training
Tejaswini Medi
Steffen Jung
Margret Keuper
AAML
94
3
0
30 Oct 2024
Text-Guided Attention is All You Need for Zero-Shot Robustness in
  Vision-Language Models
Text-Guided Attention is All You Need for Zero-Shot Robustness in Vision-Language Models
Lu Yu
Haiyang Zhang
Changsheng Xu
AAMLVLM
102
7
0
29 Oct 2024
Conflict-Aware Adversarial Training
Conflict-Aware Adversarial Training
Zhiyu Xue
Haohan Wang
Yao Qin
Ramtin Pedarsani
AAML
70
0
0
21 Oct 2024
Adversarial Training: A Survey
Adversarial Training: A Survey
Mengnan Zhao
Lihe Zhang
Jingwen Ye
Huchuan Lu
Baocai Yin
Xinchao Wang
AAML
84
1
0
19 Oct 2024
A Hybrid Defense Strategy for Boosting Adversarial Robustness in
  Vision-Language Models
A Hybrid Defense Strategy for Boosting Adversarial Robustness in Vision-Language Models
Yuhan Liang
Yijun Li
Yumeng Niu
Qianhe Shen
Hangyu Liu
VLMAAML
42
1
0
18 Oct 2024
Low-Rank Adversarial PGD Attack
Low-Rank Adversarial PGD Attack
Dayana Savostianova
Emanuele Zangrando
Francesco Tudisco
AAML
66
1
0
16 Oct 2024
Efficient Optimization Algorithms for Linear Adversarial Training
Efficient Optimization Algorithms for Linear Adversarial Training
Antônio H. Ribeiro
Thomas B. Schon
Dave Zahariah
Francis Bach
AAML
112
2
0
16 Oct 2024
Geometric Inductive Biases of Deep Networks: The Role of Data and Architecture
Geometric Inductive Biases of Deep Networks: The Role of Data and Architecture
Sajad Movahedi
Antonio Orvieto
Seyed-Mohsen Moosavi-Dezfooli
AI4CEAAML
583
0
0
15 Oct 2024
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object
  Detectors
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object Detectors
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
AAML
105
1
0
14 Oct 2024
Robustness Reprogramming for Representation Learning
Robustness Reprogramming for Representation Learning
Zhichao Hou
MohamadAli Torkamani
Hamid Krim
Xiaorui Liu
AAMLOOD
81
1
0
06 Oct 2024
TA3: Testing Against Adversarial Attacks on Machine Learning Models
TA3: Testing Against Adversarial Attacks on Machine Learning Models
Yuanzhe Jin
Min Chen
72
0
0
06 Oct 2024
A Brain-Inspired Regularizer for Adversarial Robustness
A Brain-Inspired Regularizer for Adversarial Robustness
Elie Attias
Cengiz Pehlevan
D. Obeid
AAMLOOD
71
0
0
04 Oct 2024
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks
Rakesh Podder
Sudipto Ghosh
AAML
58
1
0
02 Oct 2024
On Using Certified Training towards Empirical Robustness
On Using Certified Training towards Empirical Robustness
Alessandro De Palma
Serge Durand
Zakaria Chihani
François Terrier
Caterina Urban
OODAAML
108
1
0
02 Oct 2024
Discerning the Chaos: Detecting Adversarial Perturbations while
  Disentangling Intentional from Unintentional Noises
Discerning the Chaos: Detecting Adversarial Perturbations while Disentangling Intentional from Unintentional Noises
Anubhooti Jain
Susim Roy
Kwanit Gupta
Mayank Vatsa
Richa Singh
AAML
85
0
0
29 Sep 2024
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
97
0
0
27 Sep 2024
Previous
12345...444546
Next