ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,298 papers shown
Title
Graph-based methods coupled with specific distributional distances for
  adversarial attack detection
Graph-based methods coupled with specific distributional distances for adversarial attack detection
dwight nwaigwe
Lucrezia Carboni
Martial Mermillod
Sophie Achard
M. Dojat
AAML
61
3
0
31 May 2023
Signal Is Harder To Learn Than Bias: Debiasing with Focal Loss
Signal Is Harder To Learn Than Bias: Debiasing with Focal Loss
Moritz Vandenhirtz
Laura Manduchi
Ricards Marcinkevics
Julia E. Vogt
46
3
0
31 May 2023
NaturalFinger: Generating Natural Fingerprint with Generative
  Adversarial Networks
NaturalFinger: Generating Natural Fingerprint with Generative Adversarial Networks
Kan Yang
Kunhao Lai
AAML
78
0
0
29 May 2023
Amplification trojan network: Attack deep neural networks by amplifying
  their inherent weakness
Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness
Zhan Hu
Jun Zhu
Bo Zhang
Xiaolin Hu
AAML
72
2
0
28 May 2023
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection
Nils Palumbo
Yang Guo
Xi Wu
Jiefeng Chen
Yingyu Liang
S. Jha
AAML
111
0
0
27 May 2023
A Tale of Two Approximations: Tightening Over-Approximation for DNN
  Robustness Verification via Under-Approximation
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation
Zhiyi Xue
Si Liu
Zhaodi Zhang
Yiting Wu
Hao Fei
AAML
51
2
0
26 May 2023
Counterfactual Explainer Framework for Deep Reinforcement Learning
  Models Using Policy Distillation
Counterfactual Explainer Framework for Deep Reinforcement Learning Models Using Policy Distillation
Amir Samadi
K. Koufos
Kurt Debattista
M. Dianati
OffRL
58
3
0
25 May 2023
Dendritic Integration Based Quadratic Neural Networks Outperform
  Traditional Aritificial Ones
Dendritic Integration Based Quadratic Neural Networks Outperform Traditional Aritificial Ones
Chongmin Liu
Songting Li
Douglas Zhou
45
0
0
25 May 2023
Federated Composite Saddle Point Optimization
Federated Composite Saddle Point Optimization
Site Bai
Brian Bullins
FedML
63
0
0
25 May 2023
Fantastic DNN Classifiers and How to Identify them without Data
Fantastic DNN Classifiers and How to Identify them without Data
Nathaniel R. Dean
D. Sarkar
58
1
0
24 May 2023
Adversarial Defenses via Vector Quantization
Adversarial Defenses via Vector Quantization
Zhiyi Dong
Yongyi Mao
AAML
56
1
0
23 May 2023
Uncertainty-based Detection of Adversarial Attacks in Semantic
  Segmentation
Uncertainty-based Detection of Adversarial Attacks in Semantic Segmentation
Kira Maag
Asja Fischer
AAMLUQCV
79
4
0
22 May 2023
FGAM:Fast Adversarial Malware Generation Method Based on Gradient Sign
FGAM:Fast Adversarial Malware Generation Method Based on Gradient Sign
Kunkun Li
Fan Zhang
Wei Guo
AAML
29
4
0
22 May 2023
Latent Imitator: Generating Natural Individual Discriminatory Instances
  for Black-Box Fairness Testing
Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness Testing
Yisong Xiao
Aishan Liu
Tianlin Li
Xianglong Liu
84
30
0
19 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
120
62
0
18 May 2023
Adversarial Amendment is the Only Force Capable of Transforming an Enemy
  into a Friend
Adversarial Amendment is the Only Force Capable of Transforming an Enemy into a Friend
Chong Yu
Tao Chen
Zhongxue Gan
AAML
46
1
0
18 May 2023
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen
Hechang Chen
Keyan Chen
Yilan Zhang
Zhengxia Zou
Z. Shi
DiffM
116
72
0
14 May 2023
Improving Defensive Distillation using Teacher Assistant
Improving Defensive Distillation using Teacher Assistant
Maniratnam Mandal
Suna Gao
AAML
15
0
0
14 May 2023
The Case for the Anonymization of Offloaded Computation
The Case for the Anonymization of Offloaded Computation
Md Washik Al Azad
Shifat Sarwar
Sifat Ut Taki
Spyridon Mastorakis
99
0
0
12 May 2023
Adversarial Examples Detection with Enhanced Image Difference Features
  based on Local Histogram Equalization
Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization
Z. Yin
Shaowei Zhu
Han Su
Jianteng Peng
Wanli Lyu
Bin Luo
AAML
60
2
0
08 May 2023
Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling
  Augmentation Framework
Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Ruijia Wu
Yuhang Wang
Huafeng Shi
Zhipeng Yu
Yichao Wu
Ding Liang
DiffM
67
9
0
06 May 2023
A Comprehensive Study on Dataset Distillation: Performance, Privacy,
  Robustness and Fairness
A Comprehensive Study on Dataset Distillation: Performance, Privacy, Robustness and Fairness
Zongxiong Chen
Jiahui Geng
Derui Zhu
Herbert Woisetschlaeger
Qing Li
Sonja Schimmler
Ruben Mayer
Chunming Rong
DD
79
9
0
05 May 2023
Single Node Injection Label Specificity Attack on Graph Neural Networks
  via Reinforcement Learning
Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning
Dayuan Chen
Jian Zhang
Yuqian Lv
Jinhuan Wang
Hongjie Ni
Shanqing Yu
Zhen Wang
Qi Xuan
AAML
97
4
0
04 May 2023
New Adversarial Image Detection Based on Sentiment Analysis
New Adversarial Image Detection Based on Sentiment Analysis
Yulong Wang
Tianxiang Li
Shenghong Li
Xinnan Yuan
W. Ni
AAML
83
11
0
03 May 2023
Physical Adversarial Attacks for Surveillance: A Survey
Physical Adversarial Attacks for Surveillance: A Survey
Kien Nguyen Thanh
Tharindu Fernando
Clinton Fookes
Sridha Sridharan
AAML
101
8
0
01 May 2023
Optimizing the AI Development Process by Providing the Best Support
  Environment
Optimizing the AI Development Process by Providing the Best Support Environment
Taha Khamis
Hamam Mokayed
52
1
0
29 Apr 2023
Universal Adversarial Backdoor Attacks to Fool Vertical Federated
  Learning in Cloud-Edge Collaboration
Universal Adversarial Backdoor Attacks to Fool Vertical Federated Learning in Cloud-Edge Collaboration
Peng Chen
Xin Du
Zhihui Lu
Hongfeng Chai
FedMLAAML
95
11
0
22 Apr 2023
Stochastic MPC Based Attacks on Object Tracking in Autonomous Driving
  Systems
Stochastic MPC Based Attacks on Object Tracking in Autonomous Driving Systems
Sourav Sinha
M. Farhood
AAML
58
0
0
21 Apr 2023
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
59
4
0
20 Apr 2023
Physical Knowledge Enhanced Deep Neural Network for Sea Surface
  Temperature Prediction
Physical Knowledge Enhanced Deep Neural Network for Sea Surface Temperature Prediction
Yuxin Meng
Feng Gao
Eric Rigall
Ran Dong
Junyu Dong
Q. Du
71
20
0
19 Apr 2023
Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Feng Guo
Zhengyi Sun
Yuxuan Chen
Lei Ju
AAML
63
2
0
18 Apr 2023
Implementing Responsible AI: Tensions and Trade-Offs Between Ethics
  Aspects
Implementing Responsible AI: Tensions and Trade-Offs Between Ethics Aspects
Conrad Sanderson
David M. Douglas
Qinghua Lu
98
13
0
17 Apr 2023
A Random-patch based Defense Strategy Against Physical Attacks for Face
  Recognition Systems
A Random-patch based Defense Strategy Against Physical Attacks for Face Recognition Systems
Jiahao Xie
Ye Luo
Jianwei Lu
AAMLCVBM
33
3
0
16 Apr 2023
Interpretability is a Kind of Safety: An Interpreter-based Ensemble for
  Adversary Defense
Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Jingyuan Wang
Yufan Wu
Mingxuan Li
Xin Lin
Junjie Wu
Chao Li
AAML
62
13
0
14 Apr 2023
Generating Adversarial Attacks in the Latent Space
Generating Adversarial Attacks in the Latent Space
Nitish Shukla
Sudipta Banerjee
79
8
0
10 Apr 2023
Hyper-parameter Tuning for Adversarially Robust Models
Hyper-parameter Tuning for Adversarially Robust Models
Pedro Mendes
Paolo Romano
David Garlan
AAML
44
2
0
05 Apr 2023
How to choose your best allies for a transferable attack?
How to choose your best allies for a transferable attack?
Thibault Maho
Seyed-Mohsen Moosavi-Dezfooli
Teddy Furon
AAML
63
1
0
05 Apr 2023
Randomized Adversarial Style Perturbations for Domain Generalization
Randomized Adversarial Style Perturbations for Domain Generalization
Taehoon Kim
Bohyung Han
AAML
87
2
0
04 Apr 2023
Cross-Class Feature Augmentation for Class Incremental Learning
Cross-Class Feature Augmentation for Class Incremental Learning
Taehoon Kim
Jaeyoo Park
Bohyung Han
CLL
68
5
0
04 Apr 2023
Improving Fast Adversarial Training with Prior-Guided Knowledge
Improving Fast Adversarial Training with Prior-Guided Knowledge
Xiaojun Jia
Yong Zhang
Xingxing Wei
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
98
32
0
01 Apr 2023
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Ruyi Ding
Gongye Cheng
Siyue Wang
A. A. Ding
Yunsi Fei
AAML
49
6
0
27 Mar 2023
Anti-DreamBooth: Protecting users from personalized text-to-image
  synthesis
Anti-DreamBooth: Protecting users from personalized text-to-image synthesis
T. Le
Hao Phung
Thuan Hoang Nguyen
Quan Dao
Ngoc N. Tran
Anh Tran
109
100
0
27 Mar 2023
ACAT: Adversarial Counterfactual Attention for Classification and
  Detection in Medical Imaging
ACAT: Adversarial Counterfactual Attention for Classification and Detection in Medical Imaging
Alessandro Fontanella
Antreas Antoniou
Wenwen Li
Joanna M. Wardlaw
Grant Mair
Emanuele Trucco
Amos Storkey
MedIm
83
11
0
27 Mar 2023
CAT:Collaborative Adversarial Training
CAT:Collaborative Adversarial Training
Xingbin Liu
Huafeng Kuang
Xianming Lin
Yongjian Wu
Rongrong Ji
AAML
49
4
0
27 Mar 2023
AdvCheck: Characterizing Adversarial Examples via Local Gradient
  Checking
AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking
Ruoxi Chen
Haibo Jin
Jinyin Chen
Haibin Zheng
AAML
49
0
0
25 Mar 2023
How many dimensions are required to find an adversarial example?
How many dimensions are required to find an adversarial example?
Charles Godfrey
Henry Kvinge
Elise Bishoff
Myles Mckay
Davis Brown
T. Doster
E. Byler
AAML
82
5
0
24 Mar 2023
Adversarial Attack and Defense for Medical Image Analysis: Methods and
  Applications
Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Junhao Dong
Junxi Chen
Xiaohua Xie
Jianhuang Lai
Hechang Chen
AAMLMedIm
129
19
0
24 Mar 2023
Optimization and Optimizers for Adversarial Robustness
Optimization and Optimizers for Adversarial Robustness
Hengyue Liang
Buyun Liang
Le Peng
Ying Cui
Tim Mitchell
Ju Sun
AAML
69
5
0
23 Mar 2023
Decentralized Adversarial Training over Graphs
Decentralized Adversarial Training over Graphs
Ying Cao
Elsa Rizk
Stefan Vlaski
Ali H. Sayed
AAML
168
1
0
23 Mar 2023
Reliable and Efficient Evaluation of Adversarial Robustness for Deep
  Hashing-Based Retrieval
Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Xunguang Wang
Jiawang Bai
Xin-Chao Xu
Xuelong Li
AAML
65
1
0
22 Mar 2023
Previous
123...8910...444546
Next