ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Improved Network Robustness with Adversary Critic
Improved Network Robustness with Adversary Critic
Alexander Matyasko
Lap-Pui Chau
AAML
50
14
0
30 Oct 2018
Adversarial Risk and Robustness: General Definitions and Implications
  for the Uniform Distribution
Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution
Dimitrios I. Diochnos
Saeed Mahloujifar
Mohammad Mahmoody
AAML
58
72
0
29 Oct 2018
Evading classifiers in discrete domains with provable optimality
  guarantees
Evading classifiers in discrete domains with provable optimality guarantees
B. Kulynych
Jamie Hayes
N. Samarin
Carmela Troncoso
AAML
85
20
0
25 Oct 2018
Robust Adversarial Learning via Sparsifying Front Ends
Robust Adversarial Learning via Sparsifying Front Ends
S. Gopalakrishnan
Zhinus Marzi
Metehan Cekic
Upamanyu Madhow
Ramtin Pedarsani
AAML
58
3
0
24 Oct 2018
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial
  Examples Against Gradient Obfuscation Defenses
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses
Mohammad J. Hashemi
Greg Cusack
Eric Keller
AAMLSILM
51
8
0
23 Oct 2018
One Bit Matters: Understanding Adversarial Examples as the Abuse of
  Redundancy
One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Jingkang Wang
R. Jia
Gerald Friedland
Yangqiu Song
C. Spanos
AAML
40
4
0
23 Oct 2018
Sparse DNNs with Improved Adversarial Robustness
Sparse DNNs with Improved Adversarial Robustness
Yiwen Guo
Chao Zhang
Changshui Zhang
Yurong Chen
AAML
100
154
0
23 Oct 2018
On Extensions of CLEVER: A Neural Network Robustness Evaluation
  Algorithm
On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Tsui-Wei Weng
Huan Zhang
Pin-Yu Chen
A. Lozano
Cho-Jui Hsieh
Luca Daniel
51
10
0
19 Oct 2018
Provable Robustness of ReLU networks via Maximization of Linear Regions
Provable Robustness of ReLU networks via Maximization of Linear Regions
Francesco Croce
Maksym Andriushchenko
Matthias Hein
92
166
0
17 Oct 2018
Security Matters: A Survey on Adversarial Machine Learning
Security Matters: A Survey on Adversarial Machine Learning
Guofu Li
Pengjia Zhu
Jin Li
Zhemin Yang
Ning Cao
Zhiyi Chen
AAML
90
25
0
16 Oct 2018
Multi-scale Geometric Summaries for Similarity-based Sensor Fusion
Multi-scale Geometric Summaries for Similarity-based Sensor Fusion
Christopher J. Tralie
Paul Bendich
J. Harer
18
2
0
13 Oct 2018
MeshAdv: Adversarial Meshes for Visual Recognition
MeshAdv: Adversarial Meshes for Visual Recognition
Chaowei Xiao
Dawei Yang
Yue Liu
Jia Deng
M. Liu
AAML
63
25
0
11 Oct 2018
Secure Deep Learning Engineering: A Software Quality Assurance
  Perspective
Secure Deep Learning Engineering: A Software Quality Assurance Perspective
Lei Ma
Felix Juefei Xu
Minhui Xue
Q. Hu
Sen Chen
Yue Liu
Yang Liu
Jianjun Zhao
Jianxiong Yin
Simon See
AAML
80
35
0
10 Oct 2018
Analyzing the Noise Robustness of Deep Neural Networks
Analyzing the Noise Robustness of Deep Neural Networks
Mengchen Liu
Shixia Liu
Hang Su
Kelei Cao
Jun Zhu
AAML
70
7
0
09 Oct 2018
The Adversarial Attack and Detection under the Fisher Information Metric
The Adversarial Attack and Detection under the Fisher Information Metric
Chenxiao Zhao
P. T. Fletcher
Mixue Yu
Chaomin Shen
Guixu Zhang
Yaxin Peng
AAML
76
47
0
09 Oct 2018
Efficient Two-Step Adversarial Defense for Deep Neural Networks
Efficient Two-Step Adversarial Defense for Deep Neural Networks
Ting-Jui Chang
Yukun He
Peng Li
AAML
69
11
0
08 Oct 2018
Combinatorial Attacks on Binarized Neural Networks
Combinatorial Attacks on Binarized Neural Networks
Elias Boutros Khalil
Amrita Gupta
B. Dilkina
AAML
89
40
0
08 Oct 2018
Interpretable Convolutional Neural Networks via Feedforward Design
Interpretable Convolutional Neural Networks via Feedforward Design
C.-C. Jay Kuo
Min Zhang
Siyang Li
Jiali Duan
Yueru Chen
88
157
0
05 Oct 2018
Improved Generalization Bounds for Adversarially Robust Learning
Improved Generalization Bounds for Adversarially Robust Learning
Idan Attias
A. Kontorovich
Yishay Mansour
82
20
0
04 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
Large batch size training of neural networks with adversarial training
  and second-order information
Large batch size training of neural networks with adversarial training and second-order information
Z. Yao
A. Gholami
Daiyaan Arfeen
Richard Liaw
Joseph E. Gonzalez
Kurt Keutzer
Michael W. Mahoney
ODL
96
42
0
02 Oct 2018
Improved robustness to adversarial examples using Lipschitz regularization of the loss
Chris Finlay
Adam M. Oberman
B. Abbasi
80
34
0
01 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
74
67
0
30 Sep 2018
To compress or not to compress: Understanding the Interactions between
  Adversarial Attacks and Neural Network Compression
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression
Yiren Zhao
Ilia Shumailov
Robert D. Mullins
Ross J. Anderson
AAML
82
43
0
29 Sep 2018
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
148
683
0
28 Sep 2018
Scenic: A Language for Scenario Specification and Scene Generation
Scenic: A Language for Scenario Specification and Scene Generation
Daniel J. Fremont
T. Dreossi
Shromona Ghosh
Xiangyu Yue
Alberto L. Sangiovanni-Vincentelli
Sanjit A. Seshia
78
263
0
25 Sep 2018
Fast Geometrically-Perturbed Adversarial Faces
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBMAAML
64
65
0
24 Sep 2018
On The Utility of Conditional Generation Based Mutual Information for
  Characterizing Adversarial Subspaces
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces
Chia-Yi Hsu
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
70
1
0
24 Sep 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial Perturbation
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
68
168
0
24 Sep 2018
Adversarial Recommendation: Attack of the Learned Fake Users
Adversarial Recommendation: Attack of the Learned Fake Users
Konstantina Christakopoulou
A. Banerjee
AAML
47
12
0
21 Sep 2018
Playing the Game of Universal Adversarial Perturbations
Playing the Game of Universal Adversarial Perturbations
Julien Perolat
Mateusz Malinowski
Bilal Piot
Olivier Pietquin
AAML
69
25
0
20 Sep 2018
Generating 3D Adversarial Point Clouds
Generating 3D Adversarial Point Clouds
Chong Xiang
C. Qi
Yue Liu
3DPC
117
294
0
19 Sep 2018
Model-Protected Multi-Task Learning
Model-Protected Multi-Task Learning
Jian Liang
Ziqi Liu
Jiayu Zhou
Xiaoqian Jiang
Changshui Zhang
Fei Wang
61
13
0
18 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors
  via Imperceptible Background Patches
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAMLObjD
78
31
0
16 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
72
106
0
16 Sep 2018
Query-Efficient Black-Box Attack by Active Learning
Query-Efficient Black-Box Attack by Active Learning
Pengcheng Li
Jinfeng Yi
Lijun Zhang
AAMLMLAU
73
55
0
13 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
57
234
0
13 Sep 2018
On the Structural Sensitivity of Deep Convolutional Networks to the
  Directions of Fourier Basis Functions
On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions
Yusuke Tsuzuku
Issei Sato
AAML
82
62
0
11 Sep 2018
Certified Adversarial Robustness with Additive Noise
Certified Adversarial Robustness with Additive Noise
Bai Li
Changyou Chen
Wenlin Wang
Lawrence Carin
AAML
117
350
0
10 Sep 2018
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Yali Du
Meng Fang
Jinfeng Yi
Jun Cheng
Dacheng Tao
AAML
71
21
0
09 Sep 2018
Query Attack via Opposite-Direction Feature:Towards Robust Image
  Retrieval
Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval
Zhedong Zheng
Liang Zheng
Yi Yang
Zhilan Hu
AAML
75
24
0
07 Sep 2018
Bridging machine learning and cryptography in defence against
  adversarial attacks
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Svyatoslav Voloshynovskiy
AAML
57
22
0
05 Sep 2018
Adversarial Attack Type I: Cheat Classifiers by Significant Changes
Adversarial Attack Type I: Cheat Classifiers by Significant Changes
Sanli Tang
Xiaolin Huang
Mingjian Chen
Chengjin Sun
J. Yang
AAML
69
2
0
03 Sep 2018
MULDEF: Multi-model-based Defense Against Adversarial Examples for
  Neural Networks
MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks
Siwakorn Srisakaokul
Yuhao Zhang
Zexuan Zhong
Wei Yang
Tao Xie
Bo Li
AAML
87
19
0
31 Aug 2018
Backdoor Embedding in Convolutional Neural Network Models via Invisible
  Perturbation
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
C. Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
SILM
100
317
0
30 Aug 2018
Analysis of adversarial attacks against CNN-based image forgery
  detectors
Analysis of adversarial attacks against CNN-based image forgery detectors
Diego Gragnaniello
Francesco Marra
Giovanni Poggi
L. Verdoliva
AAML
44
31
0
25 Aug 2018
Controlling Over-generalization and its Effect on Adversarial Examples
  Generation and Detection
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
74
9
0
21 Aug 2018
Reinforcement Learning for Autonomous Defence in Software-Defined
  Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Yi Han
Benjamin I. P. Rubinstein
Tamas Abraham
T. Alpcan
O. Vel
S. Erfani
David Hubczenko
C. Leckie
Paul Montague
AAML
55
69
0
17 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
44
1
0
16 Aug 2018
Distributionally Adversarial Attack
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
101
123
0
16 Aug 2018
Previous
123...404142...444546
Next