ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXivPDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 910 papers shown
Title
Multiple Perturbation Attack: Attack Pixelwise Under Different
  $\ell_p$-norms For Better Adversarial Performance
Multiple Perturbation Attack: Attack Pixelwise Under Different ℓp\ell_pℓp​-norms For Better Adversarial Performance
Ngoc N. Tran
Anh Tuan Bui
Dinh Q. Phung
Trung Le
AAML
36
1
0
05 Dec 2022
Block Selection Method for Using Feature Norm in Out-of-distribution
  Detection
Block Selection Method for Using Feature Norm in Out-of-distribution Detection
Yeonguk Yu
Sungho Shin
Seongju Lee
C. Jun
Kyoobin Lee
OODD
25
31
0
05 Dec 2022
The Vanishing Decision Boundary Complexity and the Strong First
  Component
The Vanishing Decision Boundary Complexity and the Strong First Component
Hengshuai Yao
UQCV
41
0
0
25 Nov 2022
To be or not to be stable, that is the question: understanding neural
  networks for inverse problems
To be or not to be stable, that is the question: understanding neural networks for inverse problems
David Evangelista
J. Nagy
E. Morotti
E. L. Piccolomini
33
4
0
24 Nov 2022
OCTET: Object-aware Counterfactual Explanations
OCTET: Object-aware Counterfactual Explanations
Mehdi Zemni
Mickaël Chen
Éloi Zablocki
H. Ben-younes
Patrick Pérez
Matthieu Cord
AAML
29
29
0
22 Nov 2022
Adversarial Detection by Approximation of Ensemble Boundary
Adversarial Detection by Approximation of Ensemble Boundary
T. Windeatt
AAML
31
0
0
18 Nov 2022
Efficiently Finding Adversarial Examples with DNN Preprocessing
Efficiently Finding Adversarial Examples with DNN Preprocessing
Avriti Chauhan
Mohammad Afzal
Hrishikesh Karmarkar
Y. Elboher
Kumar Madhukar
Guy Katz
AAML
34
0
0
16 Nov 2022
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for
  Object Detection
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for Object Detection
N. Doan
Arda Yüksel
Chih-Hong Cheng
AAML
23
1
0
14 Nov 2022
Test-time adversarial detection and robustness for localizing humans
  using ultra wide band channel impulse responses
Test-time adversarial detection and robustness for localizing humans using ultra wide band channel impulse responses
A. Kolli
M. Jehanzeb Mirza
Horst Possegger
Horst Bischof
AAML
43
1
0
10 Nov 2022
Impact of Adversarial Training on Robustness and Generalizability of
  Language Models
Impact of Adversarial Training on Robustness and Generalizability of Language Models
Enes Altinisik
Hassan Sajjad
Husrev Taha Sencar
Safa Messaoud
Sanjay Chawla
AAML
24
9
0
10 Nov 2022
Robust Smart Home Face Recognition under Starving Federated Data
Robust Smart Home Face Recognition under Starving Federated Data
Jaechul Roh
Yajun Fang
FedML
CVBM
AAML
29
0
0
10 Nov 2022
Extending Temporal Data Augmentation for Video Action Recognition
Extending Temporal Data Augmentation for Video Action Recognition
Artjoms Gorpincenko
Michal Mackiewicz
ViT
31
4
0
09 Nov 2022
On the Robustness of Explanations of Deep Neural Network Models: A
  Survey
On the Robustness of Explanations of Deep Neural Network Models: A Survey
Amlan Jyoti
Karthik Balaji Ganesh
Manoj Gayala
Nandita Lakshmi Tunuguntla
Sandesh Kamath
V. Balasubramanian
XAI
FAtt
AAML
37
4
0
09 Nov 2022
Decoding Neural Signals with Computational Models: A Systematic Review of Invasive BMI
Rezwan Firuzi
Hamed Ahmadyani
Mohammad Foad Abdi
Dana Naderi
Jahanfar Hassan
Ayub Bokani
AI4CE
26
1
0
07 Nov 2022
An Adversarial Robustness Perspective on the Topology of Neural Networks
An Adversarial Robustness Perspective on the Topology of Neural Networks
Morgane Goibert
Thomas Ricatte
Elvis Dohmatob
AAML
21
2
0
04 Nov 2022
Scoring Black-Box Models for Adversarial Robustness
Scoring Black-Box Models for Adversarial Robustness
Jian Vora
Pranay Reddy Samala
33
0
0
31 Oct 2022
Benchmarking Adversarial Patch Against Aerial Detection
Benchmarking Adversarial Patch Against Aerial Detection
Jiawei Lian
Shaohui Mei
Shun Zhang
Mingyang Ma
AAML
37
57
0
30 Oct 2022
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion
  Attacks against Network Intrusion Detection Systems
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems
Islam Debicha
Richard Bauwens
Thibault Debatty
Jean-Michel Dricot
Tayeb Kenaza
Wim Mees
AAML
24
40
0
27 Oct 2022
Improving Adversarial Robustness with Self-Paced Hard-Class Pair
  Reweighting
Improving Adversarial Robustness with Self-Paced Hard-Class Pair Reweighting
Peng-Fei Hou
Jie Han
Xingyu Li
AAML
OOD
23
11
0
26 Oct 2022
Geo-SIC: Learning Deformable Geometric Shapes in Deep Image Classifiers
Geo-SIC: Learning Deformable Geometric Shapes in Deep Image Classifiers
Jian Wang
Miaomiao Zhang
58
10
0
25 Oct 2022
Adversarial Pretraining of Self-Supervised Deep Networks: Past, Present
  and Future
Adversarial Pretraining of Self-Supervised Deep Networks: Past, Present and Future
Guo-Jun Qi
M. Shah
SSL
23
8
0
23 Oct 2022
Augmentation by Counterfactual Explanation -- Fixing an Overconfident
  Classifier
Augmentation by Counterfactual Explanation -- Fixing an Overconfident Classifier
Sumedha Singla
Nihal Murali
Forough Arabshahi
Sofia Triantafyllou
Kayhan Batmanghelich
CML
59
5
0
21 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAML
MLAU
55
29
0
21 Oct 2022
Robust Models are less Over-Confident
Robust Models are less Over-Confident
Julia Grabinski
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
38
24
0
12 Oct 2022
Boosting Adversarial Robustness From The Perspective of Effective Margin
  Regularization
Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization
Ziquan Liu
Antoni B. Chan
AAML
33
5
0
11 Oct 2022
Universal Adversarial Perturbations: Efficiency on a small image dataset
Universal Adversarial Perturbations: Efficiency on a small image dataset
Waris Radji
AAML
11
0
0
10 Oct 2022
Towards Understanding and Boosting Adversarial Transferability from a
  Distribution Perspective
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
33
58
0
09 Oct 2022
Towards Out-of-Distribution Adversarial Robustness
Towards Out-of-Distribution Adversarial Robustness
Adam Ibrahim
Charles Guille-Escuret
Ioannis Mitliagkas
Irina Rish
David M. Krueger
P. Bashivan
OOD
33
6
0
06 Oct 2022
SynBench: Task-Agnostic Benchmarking of Pretrained Representations using
  Synthetic Data
SynBench: Task-Agnostic Benchmarking of Pretrained Representations using Synthetic Data
Ching-Yun Ko
Pin-Yu Chen
Jeet Mohapatra
Payel Das
Lucani E. Daniel
35
3
0
06 Oct 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
29
42
0
05 Oct 2022
NCVX: A General-Purpose Optimization Solver for Constrained Machine and
  Deep Learning
NCVX: A General-Purpose Optimization Solver for Constrained Machine and Deep Learning
Buyun Liang
Tim Mitchell
Ju Sun
OOD
20
7
0
03 Oct 2022
Perceptual Attacks of No-Reference Image Quality Models with
  Human-in-the-Loop
Perceptual Attacks of No-Reference Image Quality Models with Human-in-the-Loop
Weixia Zhang
Dingquan Li
Xiongkuo Min
Guangtao Zhai
Guodong Guo
Xiaokang Yang
Kede Ma
OOD
49
34
0
03 Oct 2022
Learning Robust Kernel Ensembles with Kernel Average Pooling
Learning Robust Kernel Ensembles with Kernel Average Pooling
P. Bashivan
Adam Ibrahim
Amirozhan Dehghani
Yifei Ren
OOD
24
5
0
30 Sep 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
Ulugbek S. Kamilov
Amit K. Roy-Chowdhury
AAML
56
17
0
20 Sep 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
38
3
0
19 Sep 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
26
1
0
17 Sep 2022
Resisting Deep Learning Models Against Adversarial Attack
  Transferability via Feature Randomization
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Ehsan Nowroozi
Mohammadreza Mohammadi
Pargol Golmohammadi
Yassine Mekdad
Mauro Conti
Selcuk Uluagac
AAML
SILM
43
13
0
11 Sep 2022
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via
  Attention-based Network in Face Recognition
Vec2Face-v2: Unveil Human Faces from their Blackbox Features via Attention-based Network in Face Recognition
Thanh-Dat Truong
C. Duong
Ngan Le
Marios Savvides
Khoa Luu
CVBM
77
9
0
11 Sep 2022
Scattering Model Guided Adversarial Examples for SAR Target Recognition:
  Attack and Defense
Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and Defense
Bo Peng
Bo Peng
Jie Zhou
Jianyue Xie
Li Liu
AAML
47
43
0
11 Sep 2022
A Black-Box Attack on Optical Character Recognition Systems
A Black-Box Attack on Optical Character Recognition Systems
Samet Bayram
Kenneth Barner
AAML
20
5
0
30 Aug 2022
Adversarial Robustness for Tabular Data through Cost and Utility
  Awareness
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
26
16
0
27 Aug 2022
Trace and Detect Adversarial Attacks on CNNs using Feature Response Maps
Trace and Detect Adversarial Attacks on CNNs using Feature Response Maps
Mohammadreza Amirian
Friedhelm Schwenker
Thilo Stadelmann
AAML
27
16
0
24 Aug 2022
Hierarchical Perceptual Noise Injection for Social Media Fingerprint
  Privacy Protection
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Simin Li
Huangxinxin Xu
Jiakai Wang
Aishan Liu
Fazhi He
Xianglong Liu
Dacheng Tao
AAML
28
5
0
23 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for
  Image Classifier Models
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
18
15
0
19 Aug 2022
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Dong Huang
Qi Bu
Yuhao Qing
Haowen Pi
Sen Wang
Heming Cui
OOD
AAML
42
0
0
17 Aug 2022
Design of secure and robust cognitive system for malware detection
Design of secure and robust cognitive system for malware detection
Sanket Shukla
AAML
27
2
0
03 Aug 2022
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against
  Adversarial Machine Learning
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning
Mohammad Hossein Samavatian
Saikat Majumdar
Kristin Barber
R. Teodorescu
AAML
28
2
0
31 Jul 2022
Contrastive Self-Supervised Learning Leads to Higher Adversarial
  Susceptibility
Contrastive Self-Supervised Learning Leads to Higher Adversarial Susceptibility
Rohit Gupta
Naveed Akhtar
Ajmal Mian
M. Shah
AAML
SSL
33
5
0
22 Jul 2022
Generating and Detecting True Ambiguity: A Forgotten Danger in DNN
  Supervision Testing
Generating and Detecting True Ambiguity: A Forgotten Danger in DNN Supervision Testing
Michael Weiss
A. Gómez
Paolo Tonella
AAML
18
6
0
21 Jul 2022
Decorrelative Network Architecture for Robust Electrocardiogram
  Classification
Decorrelative Network Architecture for Robust Electrocardiogram Classification
Christopher Wiedeman
Ge Wang
OOD
13
2
0
19 Jul 2022
Previous
12345...171819
Next