Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
v1
v2
v3
v4 (latest)
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,769 papers shown
Title
Off-Policy Actor-Critic for Adversarial Observation Robustness: Virtual Alternative Training via Symmetric Policy Evaluation
Kosuke Nakanishi
Akihiro Kubo
Yuji Yasui
Shin Ishii
AAML
OffRL
17
0
0
20 Jun 2025
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Salijona Dyrmishi
Mohamed Djilani
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAML
LMTD
44
0
0
18 Jun 2025
Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Kaleel Mahmood
Caleb Manicke
Ethan Rathbun
Aayushi Verma
Sohaib Ahmad
Nicholas Stamatakis
L. Michel
Benjamin Fuller
AAML
45
0
0
17 Jun 2025
Active Adversarial Noise Suppression for Image Forgery Localization
Rongxuan Peng
Shunquan Tan
Xianbo Mo
Alex C. Kot
Jiwu Huang
AAML
24
0
0
15 Jun 2025
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Lu Zhang
S. Lambotharan
G. Zheng
G. Liao
Basil AsSadhan
Fabio Roli
AAML
21
7
0
13 Jun 2025
Boosting Adversarial Transferability for Hyperspectral Image Classification Using 3D Structure-invariant Transformation and Intermediate Feature Distance
Chun Liu
Bingqian Zhu
Tao Xu
Zheng Zheng
Z. Li
Wei Yang
Zhigang Han
Jiayao Wang
110
0
0
12 Jun 2025
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation
Stefano Longari
Paolo Cerracchio
Michele Carminati
S. Zanero
AAML
122
0
0
12 Jun 2025
AWP: Activation-Aware Weight Pruning and Quantization with Projected Gradient Descent
Jing Liu
T. Koike-Akino
Ye Wang
Hassan Mansour
Matthew Brand
MQ
71
0
0
11 Jun 2025
Explore the vulnerability of black-box models via diffusion models
Jiacheng Shi
Yanfu Zhang
Huajie Shao
Ashley Gao
DiffM
15
0
0
09 Jun 2025
SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks
Long Dang
T. Hapuarachchi
Kaiqi Xiong
Yi Li
AAML
18
0
0
06 Jun 2025
Robust Few-Shot Vision-Language Model Adaptation
Hanxin Wang
Tian Liu
Shu Kong
VLM
121
0
0
05 Jun 2025
Attacking Attention of Foundation Models Disrupts Downstream Tasks
Hondamunige Prasanna Silva
Federico Becattini
Lorenzo Seidenari
AAML
27
0
0
03 Jun 2025
How stealthy is stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World
Francesco Panebianco
Mario DÓnghia
Stefano Zanero aand Michele Carminati
AAML
27
0
0
03 Jun 2025
Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation
Yuan Gan
Jiaxu Miao
Yunze Wang
Yi Yang
AAML
DiffM
44
0
0
02 Jun 2025
Enhancing Diffusion-based Unrestricted Adversarial Attacks via Adversary Preferences Alignment
Kaixun Jiang
Zhaoyu Chen
Haijing Guo
Jinglun Li
Jiyuan Fu
Pinxue Guo
Hao Tang
Bo Li
Wenqiang Zhang
DiffM
AAML
84
0
0
02 Jun 2025
Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
Raj Patel
Himanshu Tripathi
Jasper Stone
Noorbakhsh Amiri Golilarz
Sudip Mittal
Shahram Rahimi
Vini Chaudhary
AAML
15
0
0
30 May 2025
Adversarial Semantic and Label Perturbation Attack for Pedestrian Attribute Recognition
Weizhe Kong
Xiao Wang
Ruichong Gao
Chenglong Li
Yu Zhang
Xing Yang
Yaowei Wang
Jin Tang
AAML
64
0
0
29 May 2025
Breaking Dataset Boundaries: Class-Agnostic Targeted Adversarial Attacks
Taïga Gonçalves
Tomo Miyazaki
S. Omachi
OOD
AAML
79
0
0
27 May 2025
SCALOFT: An Initial Approach for Situation Coverage-Based Safety Analysis of an Autonomous Aerial Drone in a Mine Environment
Nawshin Mannan Proma
Victoria J Hodge
Rob Alexander
20
0
0
27 May 2025
One-Time Soft Alignment Enables Resilient Learning without Weight Transport
Jeonghwan Cheon
Jaehyuk Bae
Se-Bum Paik
ODL
48
1
0
27 May 2025
Temporal Consistency Constrained Transferable Adversarial Attacks with Background Mixup for Action Recognition
Ping Li
Jianan Ni
Bo Pang
AAML
250
0
0
23 May 2025
Ownership Verification of DNN Models Using White-Box Adversarial Attacks with Specified Probability Manipulation
Teruki Sano
Minoru Kuribayashi
Masao Sakai
Shuji Ishobe
Eisuke Koizumi
AAML
24
0
0
23 May 2025
Use as Many Surrogates as You Want: Selective Ensemble Attack to Unleash Transferability without Sacrificing Resource Efficiency
Bo Yang
Hengwei Zhang
Jindong Wang
Yuchen Ren
Chenhao Lin
Chao Shen
Zhengyu Zhao
AAML
95
0
0
19 May 2025
Anti-Sensing: Defense against Unauthorized Radar-based Human Vital Sign Sensing with Physically Realizable Wearable Oscillators
Md Farhan Tasnim Oshim
Nigel Doering
Bashima Islam
Tsui-Wei Weng
Tauhidur Rahman
43
0
0
16 May 2025
DArFace: Deformation Aware Robustness for Low Quality Face Recognition
Sadaf Gulshad
Abdullah Aldahlawi Thakaa
CVBM
105
0
0
13 May 2025
Towards Adaptive Meta-Gradient Adversarial Examples for Visual Tracking
Wei-Long Tian
Peng Gao
Xiao Liu
Long Xu
Hamido Fujita
Hanan Aljuai
Mao-Li Wang
AAML
57
0
0
13 May 2025
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
Xia Du
Jiajie Zhu
Jizhe Zhou
Chi-Man Pun
Zheng Lin
Cong Wu
Zhaoyu Chen
Jun Luo
AAML
78
0
0
11 May 2025
Remote Rowhammer Attack using Adversarial Observations on Federated Learning Clients
Jinsheng Yuan
Yuhang Hao
Weisi Guo
Yun Wu
Chongyan Gu
AAML
FedML
52
0
0
09 May 2025
DispBench: Benchmarking Disparity Estimation to Synthetic Corruptions
Shashank Agnihotri
Amaan Ansari
Annika Dackermann
Fabian Rösch
Margret Keuper
160
0
0
08 May 2025
Reliable Disentanglement Multi-view Learning Against View Adversarial Attacks
Xuyang Wang
Siyuan Duan
Qizhi Li
Guiduo Duan
Yuan Sun
Dezhong Peng
AAML
EDL
187
0
0
07 May 2025
Attention-aggregated Attack for Boosting the Transferability of Facial Adversarial Examples
Jian-Wei Li
Wen-Ze Shao
AAML
68
0
0
06 May 2025
Data-Driven Falsification of Cyber-Physical Systems
Atanu Kundu
Sauvik Gon
Rajarshi Ray
AAML
AI4CE
94
4
0
06 May 2025
ABE: A Unified Framework for Robust and Faithful Attribution-Based Explainability
Zhiyu Zhu
Jiayu Zhang
Zhibo Jin
Fang Chen
Jianlong Zhou
FAtt
70
0
0
03 May 2025
How to Backdoor the Knowledge Distillation
Chien-Sheng Wu
Qian Ma
P. Mitra
Sencun Zhu
AAML
85
0
0
30 Apr 2025
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Elad Sofer
Tomer Shaked
Caroline Chaux
Nir Shlezinger
AAML
74
1
0
26 Apr 2025
Edge-Based Learning for Improved Classification Under Adversarial Noise
Manish Kansana
Keyan Alexander Rahimi
Elias Hossain
Iman Dehzangi
Noorbakhsh Amiri Golilarz
AAML
63
0
0
25 Apr 2025
A Simple DropConnect Approach to Transfer-based Targeted Attack
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAML
199
0
0
24 Apr 2025
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation
Meixi Zheng
Kehan Wu
Yanbo Fan
Rui Huang
Baoyuan Wu
AAML
74
0
0
23 Apr 2025
Adversarial Observations in Weather Forecasting
Erik Imgrund
Thorsten Eisenhofer
Konrad Rieck
AAML
61
0
0
22 Apr 2025
Unifying Image Counterfactuals and Feature Attributions with Latent-Space Adversarial Attacks
Jeremy Goldwasser
Giles Hooker
AAML
86
0
0
21 Apr 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
576
1
0
20 Apr 2025
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
Jing Chen
Onat Gungor
Zhengli Shang
Elvin Li
T. Rosing
AAML
78
0
0
17 Apr 2025
Defending Against Frequency-Based Attacks with Diffusion Models
Fatemeh Amerehi
Patrick Healy
AAML
85
0
0
15 Apr 2025
Multi-Robot Coordination with Adversarial Perception
Rayan Bahrami
H. Jafarnejadsani
AAML
224
0
0
12 Apr 2025
On Transfer-based Universal Attacks in Pure Black-box Setting
M. Jalwana
Naveed Akhtar
Ajmal Mian
Nazanin Rahnavard
Mubarak Shah
AAML
73
0
0
11 Apr 2025
Adversarial Examples in Environment Perception for Automated Driving (Review)
Jun Yan
Huilin Yin
AAML
90
0
0
11 Apr 2025
A Framework for the Assurance of AI-Enabled Systems
Ariel S. Kapusta
David Jin
Peter M. Teague
Robert A. Houston
Jonathan B. Elliott
Grace Y. Park
Shelby S. Holdren
26
0
0
03 Apr 2025
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
Chaohu Liu
Tianyi Gui
Yu Liu
Linli Xu
VLM
AAML
126
1
0
02 Apr 2025
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Haibo Zhang
Zhihua Yao
Kouichi Sakurai
Takeshi Saitoh
AAML
93
0
0
02 Apr 2025
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
73
0
0
01 Apr 2025
1
2
3
4
...
54
55
56
Next