ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Off-Policy Actor-Critic for Adversarial Observation Robustness: Virtual Alternative Training via Symmetric Policy Evaluation
Off-Policy Actor-Critic for Adversarial Observation Robustness: Virtual Alternative Training via Symmetric Policy Evaluation
Kosuke Nakanishi
Akihiro Kubo
Yuji Yasui
Shin Ishii
AAMLOffRL
17
0
0
20 Jun 2025
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Salijona Dyrmishi
Mohamed Djilani
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAMLLMTD
44
0
0
18 Jun 2025
Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Kaleel Mahmood
Caleb Manicke
Ethan Rathbun
Aayushi Verma
Sohaib Ahmad
Nicholas Stamatakis
L. Michel
Benjamin Fuller
AAML
45
0
0
17 Jun 2025
Active Adversarial Noise Suppression for Image Forgery Localization
Active Adversarial Noise Suppression for Image Forgery Localization
Rongxuan Peng
Shunquan Tan
Xianbo Mo
Alex C. Kot
Jiwu Huang
AAML
24
0
0
15 Jun 2025
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Lu Zhang
S. Lambotharan
G. Zheng
G. Liao
Basil AsSadhan
Fabio Roli
AAML
21
7
0
13 Jun 2025
Boosting Adversarial Transferability for Hyperspectral Image Classification Using 3D Structure-invariant Transformation and Intermediate Feature Distance
Boosting Adversarial Transferability for Hyperspectral Image Classification Using 3D Structure-invariant Transformation and Intermediate Feature Distance
Chun Liu
Bingqian Zhu
Tao Xu
Zheng Zheng
Z. Li
Wei Yang
Zhigang Han
Jiayao Wang
110
0
0
12 Jun 2025
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
Stefano Longari
Paolo Cerracchio
Michele Carminati
S. Zanero
AAML
122
0
0
12 Jun 2025
AWP: Activation-Aware Weight Pruning and Quantization with Projected Gradient Descent
AWP: Activation-Aware Weight Pruning and Quantization with Projected Gradient Descent
Jing Liu
T. Koike-Akino
Ye Wang
Hassan Mansour
Matthew Brand
MQ
71
0
0
11 Jun 2025
Explore the vulnerability of black-box models via diffusion models
Explore the vulnerability of black-box models via diffusion models
Jiacheng Shi
Yanfu Zhang
Huajie Shao
Ashley Gao
DiffM
15
0
0
09 Jun 2025
SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks
SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks
Long Dang
T. Hapuarachchi
Kaiqi Xiong
Yi Li
AAML
18
0
0
06 Jun 2025
Robust Few-Shot Vision-Language Model Adaptation
Hanxin Wang
Tian Liu
Shu Kong
VLM
121
0
0
05 Jun 2025
Attacking Attention of Foundation Models Disrupts Downstream Tasks
Attacking Attention of Foundation Models Disrupts Downstream Tasks
Hondamunige Prasanna Silva
Federico Becattini
Lorenzo Seidenari
AAML
27
0
0
03 Jun 2025
How stealthy is stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World
How stealthy is stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World
Francesco Panebianco
Mario DÓnghia
Stefano Zanero aand Michele Carminati
AAML
27
0
0
03 Jun 2025
Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation
Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation
Yuan Gan
Jiaxu Miao
Yunze Wang
Yi Yang
AAMLDiffM
44
0
0
02 Jun 2025
Enhancing Diffusion-based Unrestricted Adversarial Attacks via Adversary Preferences Alignment
Enhancing Diffusion-based Unrestricted Adversarial Attacks via Adversary Preferences Alignment
Kaixun Jiang
Zhaoyu Chen
Haijing Guo
Jinglun Li
Jiyuan Fu
Pinxue Guo
Hao Tang
Bo Li
Wenqiang Zhang
DiffMAAML
84
0
0
02 Jun 2025
Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
Raj Patel
Himanshu Tripathi
Jasper Stone
Noorbakhsh Amiri Golilarz
Sudip Mittal
Shahram Rahimi
Vini Chaudhary
AAML
15
0
0
30 May 2025
Adversarial Semantic and Label Perturbation Attack for Pedestrian Attribute Recognition
Adversarial Semantic and Label Perturbation Attack for Pedestrian Attribute Recognition
Weizhe Kong
Xiao Wang
Ruichong Gao
Chenglong Li
Yu Zhang
Xing Yang
Yaowei Wang
Jin Tang
AAML
64
0
0
29 May 2025
Breaking Dataset Boundaries: Class-Agnostic Targeted Adversarial Attacks
Breaking Dataset Boundaries: Class-Agnostic Targeted Adversarial Attacks
Taïga Gonçalves
Tomo Miyazaki
S. Omachi
OODAAML
79
0
0
27 May 2025
SCALOFT: An Initial Approach for Situation Coverage-Based Safety Analysis of an Autonomous Aerial Drone in a Mine Environment
SCALOFT: An Initial Approach for Situation Coverage-Based Safety Analysis of an Autonomous Aerial Drone in a Mine Environment
Nawshin Mannan Proma
Victoria J Hodge
Rob Alexander
20
0
0
27 May 2025
One-Time Soft Alignment Enables Resilient Learning without Weight Transport
One-Time Soft Alignment Enables Resilient Learning without Weight Transport
Jeonghwan Cheon
Jaehyuk Bae
Se-Bum Paik
ODL
48
1
0
27 May 2025
Temporal Consistency Constrained Transferable Adversarial Attacks with Background Mixup for Action Recognition
Ping Li
Jianan Ni
Bo Pang
AAML
250
0
0
23 May 2025
Ownership Verification of DNN Models Using White-Box Adversarial Attacks with Specified Probability Manipulation
Teruki Sano
Minoru Kuribayashi
Masao Sakai
Shuji Ishobe
Eisuke Koizumi
AAML
24
0
0
23 May 2025
Use as Many Surrogates as You Want: Selective Ensemble Attack to Unleash Transferability without Sacrificing Resource Efficiency
Use as Many Surrogates as You Want: Selective Ensemble Attack to Unleash Transferability without Sacrificing Resource Efficiency
Bo Yang
Hengwei Zhang
Jindong Wang
Yuchen Ren
Chenhao Lin
Chao Shen
Zhengyu Zhao
AAML
95
0
0
19 May 2025
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Md Farhan Tasnim Oshim
Nigel Doering
Bashima Islam
Tsui-Wei Weng
Tauhidur Rahman
43
0
0
16 May 2025
DArFace: Deformation Aware Robustness for Low Quality Face Recognition
DArFace: Deformation Aware Robustness for Low Quality Face Recognition
Sadaf Gulshad
Abdullah Aldahlawi Thakaa
CVBM
105
0
0
13 May 2025
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Wei-Long Tian
Peng Gao
Xiao Liu
Long Xu
Hamido Fujita
Hanan Aljuai
Mao-Li Wang
AAML
57
0
0
13 May 2025
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
Xia Du
Jiajie Zhu
Jizhe Zhou
Chi-Man Pun
Zheng Lin
Cong Wu
Zhaoyu Chen
Jun Luo
AAML
78
0
0
11 May 2025
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Jinsheng Yuan
Yuhang Hao
Weisi Guo
Yun Wu
Chongyan Gu
AAMLFedML
52
0
0
09 May 2025
DispBench: Benchmarking Disparity Estimation to Synthetic Corruptions
DispBench: Benchmarking Disparity Estimation to Synthetic Corruptions
Shashank Agnihotri
Amaan Ansari
Annika Dackermann
Fabian Rösch
Margret Keuper
160
0
0
08 May 2025
Reliable Disentanglement Multi-view Learning Against View Adversarial Attacks
Reliable Disentanglement Multi-view Learning Against View Adversarial Attacks
Xuyang Wang
Siyuan Duan
Qizhi Li
Guiduo Duan
Yuan Sun
Dezhong Peng
AAMLEDL
187
0
0
07 May 2025
Attention-aggregated Attack for Boosting the Transferability of Facial Adversarial Examples
Attention-aggregated Attack for Boosting the Transferability of Facial Adversarial Examples
Jian-Wei Li
Wen-Ze Shao
AAML
68
0
0
06 May 2025
Data-Driven Falsification of Cyber-Physical Systems
Data-Driven Falsification of Cyber-Physical Systems
Atanu Kundu
Sauvik Gon
Rajarshi Ray
AAMLAI4CE
94
4
0
06 May 2025
ABE: A Unified Framework for Robust and Faithful Attribution-Based Explainability
ABE: A Unified Framework for Robust and Faithful Attribution-Based Explainability
Zhiyu Zhu
Jiayu Zhang
Zhibo Jin
Fang Chen
Jianlong Zhou
FAtt
70
0
0
03 May 2025
How to Backdoor the Knowledge Distillation
How to Backdoor the Knowledge Distillation
Chien-Sheng Wu
Qian Ma
P. Mitra
Sencun Zhu
AAML
85
0
0
30 Apr 2025
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Elad Sofer
Tomer Shaked
Caroline Chaux
Nir Shlezinger
AAML
74
1
0
26 Apr 2025
Edge-Based Learning for Improved Classification Under Adversarial Noise
Edge-Based Learning for Improved Classification Under Adversarial Noise
Manish Kansana
Keyan Alexander Rahimi
Elias Hossain
Iman Dehzangi
Noorbakhsh Amiri Golilarz
AAML
63
0
0
25 Apr 2025
A Simple DropConnect Approach to Transfer-based Targeted Attack
A Simple DropConnect Approach to Transfer-based Targeted Attack
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAML
199
0
0
24 Apr 2025
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation
Meixi Zheng
Kehan Wu
Yanbo Fan
Rui Huang
Baoyuan Wu
AAML
74
0
0
23 Apr 2025
Adversarial Observations in Weather Forecasting
Adversarial Observations in Weather Forecasting
Erik Imgrund
Thorsten Eisenhofer
Konrad Rieck
AAML
61
0
0
22 Apr 2025
Unifying Image Counterfactuals and Feature Attributions with Latent-Space Adversarial Attacks
Unifying Image Counterfactuals and Feature Attributions with Latent-Space Adversarial Attacks
Jeremy Goldwasser
Giles Hooker
AAML
86
0
0
21 Apr 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAMLSILM
576
1
0
20 Apr 2025
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
Jing Chen
Onat Gungor
Zhengli Shang
Elvin Li
T. Rosing
AAML
78
0
0
17 Apr 2025
Defending Against Frequency-Based Attacks with Diffusion Models
Defending Against Frequency-Based Attacks with Diffusion Models
Fatemeh Amerehi
Patrick Healy
AAML
85
0
0
15 Apr 2025
Multi-Robot Coordination with Adversarial Perception
Multi-Robot Coordination with Adversarial Perception
Rayan Bahrami
H. Jafarnejadsani
AAML
224
0
0
12 Apr 2025
On Transfer-based Universal Attacks in Pure Black-box Setting
On Transfer-based Universal Attacks in Pure Black-box Setting
M. Jalwana
Naveed Akhtar
Ajmal Mian
Nazanin Rahnavard
Mubarak Shah
AAML
73
0
0
11 Apr 2025
Adversarial Examples in Environment Perception for Automated Driving (Review)
Adversarial Examples in Environment Perception for Automated Driving (Review)
Jun Yan
Huilin Yin
AAML
90
0
0
11 Apr 2025
A Framework for the Assurance of AI-Enabled Systems
A Framework for the Assurance of AI-Enabled Systems
Ariel S. Kapusta
David Jin
Peter M. Teague
Robert A. Houston
Jonathan B. Elliott
Grace Y. Park
Shelby S. Holdren
26
0
0
03 Apr 2025
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
Chaohu Liu
Tianyi Gui
Yu Liu
Linli Xu
VLMAAML
126
1
0
02 Apr 2025
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Haibo Zhang
Zhihua Yao
Kouichi Sakurai
Takeshi Saitoh
AAML
93
0
0
02 Apr 2025
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
73
0
0
01 Apr 2025
1234...545556
Next