ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Evaluation of Generalizability of Neural Program Analyzers under
  Semantic-Preserving Transformations
Evaluation of Generalizability of Neural Program Analyzers under Semantic-Preserving Transformations
Md Rafiqul Islam Rabin
Mohammad Amin Alipour
NAI
82
20
0
15 Apr 2020
Targeted Attack for Deep Hashing based Retrieval
Targeted Attack for Deep Hashing based Retrieval
Jiawang Bai
Bin Chen
Yiming Li
Dongxian Wu
Weiwei Guo
Shutao Xia
En-Hui Yang
AAML
135
87
0
15 Apr 2020
Extending Adversarial Attacks to Produce Adversarial Class Probability
  Distributions
Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions
Jon Vadillo
Roberto Santana
Jose A. Lozano
AAML
51
0
0
14 Apr 2020
Towards Robust Classification with Image Quality Assessment
Towards Robust Classification with Image Quality Assessment
Yeli Feng
Yiyu Cai
102
0
0
14 Apr 2020
Towards Transferable Adversarial Attack against Deep Face Recognition
Towards Transferable Adversarial Attack against Deep Face Recognition
Yaoyao Zhong
Weihong Deng
AAML
105
162
0
13 Apr 2020
Verification of Deep Convolutional Neural Networks Using ImageStars
Verification of Deep Convolutional Neural Networks Using ImageStars
Hoang-Dung Tran
Stanley Bak
Weiming Xiang
Taylor T. Johnson
AAML
70
129
0
12 Apr 2020
Luring of transferable adversarial perturbations in the black-box
  paradigm
Luring of transferable adversarial perturbations in the black-box paradigm
Rémi Bernhard
Pierre-Alain Moëllic
J. Dutertre
AAML
40
2
0
10 Apr 2020
Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Haidong Xie
Lixin Qian
Xueshuang Xiang
Naijin Liu
AAML
30
1
0
10 Apr 2020
Blind Adversarial Training: Balance Accuracy and Robustness
Blind Adversarial Training: Balance Accuracy and Robustness
Haidong Xie
Xueshuang Xiang
Naijin Liu
Bin Dong
AAML
22
2
0
10 Apr 2020
Rethinking the Trigger of Backdoor Attack
Rethinking the Trigger of Backdoor Attack
Yiming Li
Tongqing Zhai
Baoyuan Wu
Yong Jiang
Zhifeng Li
Shutao Xia
LLMSV
104
152
0
09 Apr 2020
On Adversarial Examples and Stealth Attacks in Artificial Intelligence
  Systems
On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systems
I. Tyukin
D. Higham
A. Gorban
AAML
46
39
0
09 Apr 2020
Reciprocal Learning Networks for Human Trajectory Prediction
Reciprocal Learning Networks for Human Trajectory Prediction
Hao Sun
Zhiqun Zhao
Zhihai He
56
57
0
09 Apr 2020
Transferable, Controllable, and Inconspicuous Adversarial Attacks on
  Person Re-identification With Deep Mis-Ranking
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
AAML
62
85
0
08 Apr 2020
Feature Partitioning for Robust Tree Ensembles and their Certification
  in Adversarial Scenarios
Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios
Stefano Calzavara
Claudio Lucchese
Federico Marcuzzi
S. Orlando
AAML
45
9
0
07 Apr 2020
Deep learning for smart fish farming: applications, opportunities and
  challenges
Deep learning for smart fish farming: applications, opportunities and challenges
Xinting Yang
Song Zhang
Jintao Liu
Qinfeng Gao
S. Dong
Chao Zhou
AI4CE
92
242
0
06 Apr 2020
On Tractable Representations of Binary Neural Networks
On Tractable Representations of Binary Neural Networks
Weijia Shi
Andy Shih
Adnan Darwiche
Arthur Choi
TPMOffRL
67
69
0
05 Apr 2020
Physically Realizable Adversarial Examples for LiDAR Object Detection
Physically Realizable Adversarial Examples for LiDAR Object Detection
James Tu
Mengye Ren
S. Manivasagam
Ming Liang
Binh Yang
Richard Du
Frank Cheng
R. Urtasun
3DPC
96
241
0
01 Apr 2020
Towards Achieving Adversarial Robustness by Enforcing Feature
  Consistency Across Bit Planes
Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes
Sravanti Addepalli
S. VivekB.
Arya Baburaj
Gaurang Sriramanan
R. Venkatesh Babu
AAML
31
32
0
01 Apr 2020
A Thorough Comparison Study on Adversarial Attacks and Defenses for
  Common Thorax Disease Classification in Chest X-rays
A Thorough Comparison Study on Adversarial Attacks and Defenses for Common Thorax Disease Classification in Chest X-rays
Ch. Srinivasa Rao
Jingyun Liang
Runhao Zeng
Qi Chen
Huazhu Fu
Yanwu Xu
Mingkui Tan
AAML
26
7
0
31 Mar 2020
Improved Gradient based Adversarial Attacks for Quantized Networks
Improved Gradient based Adversarial Attacks for Quantized Networks
Kartik Gupta
Thalaiyasingam Ajanthan
MQ
58
19
0
30 Mar 2020
Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
Tianlong Chen
Sijia Liu
Shiyu Chang
Yu Cheng
Lisa Amini
Zhangyang Wang
AAML
71
250
0
28 Mar 2020
Adversarial Imitation Attack
Adversarial Imitation Attack
Mingyi Zhou
Jing Wu
Yipeng Liu
Xiaolin Huang
Shuaicheng Liu
Xiang Zhang
Ce Zhu
AAML
39
0
0
28 Mar 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial Attacks
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
84
145
0
28 Mar 2020
Interval Neural Networks as Instability Detectors for Image
  Reconstructions
Interval Neural Networks as Instability Detectors for Image Reconstructions
Jan Macdonald
M. März
Luis Oala
Wojciech Samek
50
2
0
27 Mar 2020
Do Deep Minds Think Alike? Selective Adversarial Attacks for
  Fine-Grained Manipulation of Multiple Deep Neural Networks
Do Deep Minds Think Alike? Selective Adversarial Attacks for Fine-Grained Manipulation of Multiple Deep Neural Networks
Zain Khan
Jirong Yi
R. Mudumbai
Xiaodong Wu
Weiyu Xu
AAMLMLAU
51
1
0
26 Mar 2020
Stochastic Zeroth-order Riemannian Derivative Estimation and
  Optimization
Stochastic Zeroth-order Riemannian Derivative Estimation and Optimization
Jiaxiang Li
Krishnakumar Balasubramanian
Shiqian Ma
18
5
0
25 Mar 2020
Adversarial Light Projection Attacks on Face Recognition Systems: A
  Feasibility Study
Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study
Luan Nguyen
Sunpreet S. Arora
Yuhang Wu
Hao Yang
AAML
58
88
0
24 Mar 2020
Defense Through Diverse Directions
Defense Through Diverse Directions
Christopher M. Bender
Yang Li
Yifeng Shi
Michael K. Reiter
Junier B. Oliva
AAML
51
4
0
24 Mar 2020
Architectural Resilience to Foreground-and-Background Adversarial Noise
Architectural Resilience to Foreground-and-Background Adversarial Noise
Carl Cheng
Evan Hu
AAML
23
0
0
23 Mar 2020
Detecting Adversarial Examples in Learning-Enabled Cyber-Physical
  Systems using Variational Autoencoder for Regression
Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Feiyang Cai
Jiani Li
X. Koutsoukos
DRL
73
12
0
21 Mar 2020
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises
B. Yan
Dong Wang
Huchuan Lu
Xiaoyun Yang
AAML
51
73
0
21 Mar 2020
Breaking certified defenses: Semantic adversarial examples with spoofed
  robustness certificates
Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Amin Ghiasi
Ali Shafahi
Tom Goldstein
102
55
0
19 Mar 2020
Vec2Face: Unveil Human Faces from their Blackbox Features in Face
  Recognition
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition
C. Duong
Thanh-Dat Truong
Kha Gia Quach
Hung Bui
Kaushik Roy
Khoa Luu
CVBM
74
54
0
16 Mar 2020
Minimum-Norm Adversarial Examples on KNN and KNN-Based Models
Minimum-Norm Adversarial Examples on KNN and KNN-Based Models
Chawin Sitawarin
David Wagner
AAML
57
20
0
14 Mar 2020
Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic
  Segmentation
Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic Segmentation
Xiaogang Xu
Hengshuang Zhao
Jiaya Jia
AAML
49
40
0
14 Mar 2020
GeoDA: a geometric framework for black-box adversarial attacks
GeoDA: a geometric framework for black-box adversarial attacks
A. Rahmati
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
H. Dai
MLAUAAML
146
120
0
13 Mar 2020
Topological Effects on Attacks Against Vertex Classification
Topological Effects on Attacks Against Vertex Classification
B. A. Miller
Mustafa Çamurcu
Alexander J. Gomez
Kevin S. Chan
Tina Eliassi-Rad
AAML
46
2
0
12 Mar 2020
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical
  Systems
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Jin Young Lee
AAML
117
55
0
12 Mar 2020
Frequency-Tuned Universal Adversarial Attacks
Frequency-Tuned Universal Adversarial Attacks
Yingpeng Deng
Lina Karam
AAML
51
7
0
11 Mar 2020
SuperMix: Supervising the Mixing Data Augmentation
SuperMix: Supervising the Mixing Data Augmentation
Ali Dabouei
Sobhan Soleymani
Fariborz Taherkhani
Nasser M. Nasrabadi
123
101
0
10 Mar 2020
Using an ensemble color space model to tackle adversarial examples
Using an ensemble color space model to tackle adversarial examples
Shreyank N. Gowda
C. Yuan
AAML
30
1
0
10 Mar 2020
SAD: Saliency-based Defenses Against Adversarial Examples
SAD: Saliency-based Defenses Against Adversarial Examples
Richard Tran
David Patrick
Michaela Geyer
Amanda Fernandez
AAML
55
5
0
10 Mar 2020
Generating Natural Language Adversarial Examples on a Large Scale with
  Generative Models
Generating Natural Language Adversarial Examples on a Large Scale with Generative Models
Yankun Ren
J. Lin
Siliang Tang
Jun Zhou
Shuang Yang
Yuan Qi
Xiang Ren
GANAAMLSILM
63
23
0
10 Mar 2020
Causal Interpretability for Machine Learning -- Problems, Methods and
  Evaluation
Causal Interpretability for Machine Learning -- Problems, Methods and Evaluation
Raha Moraffah
Mansooreh Karami
Ruocheng Guo
A. Raglin
Huan Liu
CMLELMXAI
98
221
0
09 Mar 2020
Search Space of Adversarial Perturbations against Image Filters
Search Space of Adversarial Perturbations against Image Filters
D. D. Thang
Toshihiro Matsui
AAML
33
1
0
05 Mar 2020
Confusing and Detecting ML Adversarial Attacks with Injected Attractors
Confusing and Detecting ML Adversarial Attacks with Injected Attractors
Jiyi Zhang
E. Chang
H. Lee
AAML
60
1
0
05 Mar 2020
Adversarial Vertex Mixup: Toward Better Adversarially Robust
  Generalization
Adversarial Vertex Mixup: Toward Better Adversarially Robust Generalization
Saehyung Lee
Hyungyu Lee
Sungroh Yoon
AAML
252
119
0
05 Mar 2020
The Impact of Hole Geometry on Relative Robustness of In-Painting
  Networks: An Empirical Study
The Impact of Hole Geometry on Relative Robustness of In-Painting Networks: An Empirical Study
Masood S. Mortazavi
Ning Yan
AAMLOOD
26
0
0
04 Mar 2020
Deep Neural Network Perception Models and Robust Autonomous Driving
  Systems
Deep Neural Network Perception Models and Robust Autonomous Driving Systems
M. Shafiee
Ahmadreza Jeddi
Amir Nazemi
Paul Fieguth
A. Wong
OOD
62
16
0
04 Mar 2020
Metrics and methods for robustness evaluation of neural networks with
  generative models
Metrics and methods for robustness evaluation of neural networks with generative models
Igor Buzhinsky
Arseny Nerinovsky
S. Tripakis
AAML
84
25
0
04 Mar 2020
Previous
123...293031...444546
Next