ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Towards Better Certified Segmentation via Diffusion Models
Towards Better Certified Segmentation via Diffusion Models
Othmane Laousy
Alexandre Araujo
G. Chassagnon
M. Revel
S. Garg
Farshad Khorrami
Maria Vakalopoulou
DiffM
86
2
0
16 Jun 2023
Global-Local Processing in Convolutional Neural Networks
Global-Local Processing in Convolutional Neural Networks
Z. Rezvani
Soroor Shekarizeh
Mohammad Sabokrou
13
0
0
14 Jun 2023
On the Robustness of Latent Diffusion Models
On the Robustness of Latent Diffusion Models
Jianping Zhang
Zhuoer Xu
Shiwen Cui
Changhua Meng
Weibin Wu
Michael R. Lyu
AAML
82
20
0
14 Jun 2023
Generative Watermarking Against Unauthorized Subject-Driven Image
  Synthesis
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Yi Ma
Zhengyu Zhao
Xinlei He
Zheng Li
Michael Backes
Yang Zhang
AAMLWIGM
90
21
0
13 Jun 2023
On Achieving Optimal Adversarial Test Error
On Achieving Optimal Adversarial Test Error
Justin D. Li
Matus Telgarsky
AAML
62
2
0
13 Jun 2023
On the Robustness of Removal-Based Feature Attributions
On the Robustness of Removal-Based Feature Attributions
Christy Lin
Ian Covert
Su-In Lee
122
13
0
12 Jun 2023
Securing Visually-Aware Recommender Systems: An Adversarial Image Reconstruction and Detection Framework
Securing Visually-Aware Recommender Systems: An Adversarial Image Reconstruction and Detection Framework
Minglei Yin
Bin Liu
Neil Zhenqiang Gong
Xin Li
AAML
53
1
0
11 Jun 2023
Detecting Adversarial Directions in Deep Reinforcement Learning to Make
  Robust Decisions
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions
Ezgi Korkmaz
Jonah Brown-Cohen
AAML
70
9
0
09 Jun 2023
Best Practices for Machine Learning Systems: An Industrial Framework for
  Analysis and Optimization
Best Practices for Machine Learning Systems: An Industrial Framework for Analysis and Optimization
G. Chouliaras
Kornel Kielczewski
Amit Beka
D. Konopnicki
Lucas Bernardi
16
0
0
09 Jun 2023
Spike timing reshapes robustness against attacks in spiking neural
  networks
Spike timing reshapes robustness against attacks in spiking neural networks
Jianhao Ding
Zhaofei Yu
Tiejun Huang
Jian K. Liu
AAML
86
2
0
09 Jun 2023
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning
Mohamed el Shehaby
Ashraf Matrawy
AAML
101
7
0
08 Jun 2023
Boosting Adversarial Transferability by Achieving Flat Local Maxima
Boosting Adversarial Transferability by Achieving Flat Local Maxima
Zhijin Ge
Hongying Liu
Xiaosen Wang
Fanhua Shang
Yuanyuan Liu
AAML
91
48
0
08 Jun 2023
Does Image Anonymization Impact Computer Vision Training?
Does Image Anonymization Impact Computer Vision Training?
Håkon Hukkelås
Frank Lindseth
PICVCVBM
81
20
0
08 Jun 2023
PromptRobust: Towards Evaluating the Robustness of Large Language Models
  on Adversarial Prompts
PromptRobust: Towards Evaluating the Robustness of Large Language Models on Adversarial Prompts
Kaijie Zhu
Jindong Wang
Jiaheng Zhou
Zichen Wang
Hao Chen
...
Linyi Yang
Weirong Ye
Yue Zhang
Neil Zhenqiang Gong
Xingxu Xie
SILM
135
144
0
07 Jun 2023
Adversarial Sample Detection Through Neural Network Transport Dynamics
Adversarial Sample Detection Through Neural Network Transport Dynamics
Skander Karkar
Patrick Gallinari
A. Rakotomamonjy
AAML
49
1
0
07 Jun 2023
Evaluating robustness of support vector machines with the Lagrangian
  dual approach
Evaluating robustness of support vector machines with the Lagrangian dual approach
Yuting Liu
Hong Gu
Pan Qin
AAML
100
2
0
05 Jun 2023
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion
  Attacks
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Jiyi Zhang
Hansheng Fang
E. Chang
AAML
43
0
0
02 Jun 2023
Adversarial Attack Based on Prediction-Correction
Adversarial Attack Based on Prediction-Correction
Chen Wan
Fangjun Huang
AAML
62
4
0
02 Jun 2023
ModelObfuscator: Obfuscating Model Information to Protect Deployed
  ML-based Systems
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems
Mingyi Zhou
Xiang Gao
Jing Wu
John C. Grundy
Xiao Chen
Chunyang Chen
Li Li
AAML
109
13
0
01 Jun 2023
Amplification trojan network: Attack deep neural networks by amplifying
  their inherent weakness
Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness
Zhan Hu
Jun Zhu
Bo Zhang
Xiaolin Hu
AAML
72
2
0
28 May 2023
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness
  and Controllability
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability
Haotian Xue
Alexandre Araujo
Bin Hu
Yongxin Chen
DiffM
145
48
0
25 May 2023
Rectifying Group Irregularities in Explanations for Distribution Shift
Rectifying Group Irregularities in Explanations for Distribution Shift
Adam Stein
Yinjun Wu
Eric Wong
Mayur Naik
92
1
0
25 May 2023
On the Robustness of Segment Anything
On the Robustness of Segment Anything
Yihao Huang
Yue Cao
Tianlin Li
Felix Juefei Xu
Di Lin
Ivor W.Tsang
Yang Liu
Qing Guo
AAMLVLM
88
27
0
25 May 2023
Detecting Adversarial Data by Probing Multiple Perturbations Using
  Expected Perturbation Score
Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score
Shuhai Zhang
Feng Liu
Jiahao Yang
Yifan Yang
Changsheng Li
Bo Han
Mingkui Tan
DiffMAAML
58
18
0
25 May 2023
Adversarial Attacks on Leakage Detectors in Water Distribution Networks
Adversarial Attacks on Leakage Detectors in Water Distribution Networks
Paul Stahlhofen
André Artelt
L. Hermes
Barbara Hammer
AAML
140
2
0
25 May 2023
PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image
  Deraining for Semantic Segmentation
PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image Deraining for Semantic Segmentation
Xianghao Jiao
Yao-Tsorng Liu
Jiaxin Gao
Xinyuan Chu
Risheng Liu
Xin-Yue Fan
VLM
90
6
0
25 May 2023
Fast Adversarial CNN-based Perturbation Attack on No-Reference Image-
  and Video-Quality Metrics
Fast Adversarial CNN-based Perturbation Attack on No-Reference Image- and Video-Quality Metrics
E. Shumitskaya
Anastasia Antsiferova
D. Vatolin
64
7
0
24 May 2023
Introducing Competition to Boost the Transferability of Targeted
  Adversarial Examples through Clean Feature Mixup
Introducing Competition to Boost the Transferability of Targeted Adversarial Examples through Clean Feature Mixup
Junyoung Byun
Myung-Joon Kwon
Seungju Cho
Yoonji Kim
Changick Kim
AAML
93
18
0
24 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition
  Systems
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
71
14
0
23 May 2023
Enhancing Accuracy and Robustness through Adversarial Training in Class
  Incremental Continual Learning
Enhancing Accuracy and Robustness through Adversarial Training in Class Incremental Continual Learning
Minchan Kwon
Kangil Kim
AAML
36
0
0
23 May 2023
DeepBern-Nets: Taming the Complexity of Certifying Neural Networks using
  Bernstein Polynomial Activations and Precise Bound Propagation
DeepBern-Nets: Taming the Complexity of Certifying Neural Networks using Bernstein Polynomial Activations and Precise Bound Propagation
Haitham Khedr
Yasser Shoukry
67
5
0
22 May 2023
Latent Magic: An Investigation into Adversarial Examples Crafted in the
  Semantic Latent Space
Latent Magic: An Investigation into Adversarial Examples Crafted in the Semantic Latent Space
Bo Zheng
DiffM
92
1
0
22 May 2023
Towards Benchmarking and Assessing Visual Naturalness of Physical World
  Adversarial Attacks
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks
Simin Li
Shuing Zhang
Gujun Chen
Dong Wang
Pu Feng
Jiakai Wang
Aishan Liu
Xin Yi
Xianglong Liu
AAML
65
18
0
22 May 2023
DisCo: Distilled Student Models Co-training for Semi-supervised Text
  Mining
DisCo: Distilled Student Models Co-training for Semi-supervised Text Mining
Weifeng Jiang
Qianren Mao
Chenghua Lin
Jianxin Li
Ting Deng
Weiyi Yang
Ziyi Wang
32
3
0
20 May 2023
DAP: A Dynamic Adversarial Patch for Evading Person Detectors
DAP: A Dynamic Adversarial Patch for Evading Person Detectors
Amira Guesmi
Ruitian Ding
Muhammad Abdullah Hanif
Ihsen Alouani
Mohamed Bennai
AAML
114
28
0
19 May 2023
Testing System Intelligence
Testing System Intelligence
J. Sifakis
29
3
0
19 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
120
62
0
18 May 2023
Content-based Unrestricted Adversarial Attack
Content-based Unrestricted Adversarial Attack
Zhaoyu Chen
Yue Liu
Shuang Wu
Kaixun Jiang
Shouhong Ding
Wenqiang Zhang
DiffM
91
70
0
18 May 2023
Noise robust neural network architecture
Noise robust neural network architecture
Yunuo Xiong
Hongwei Xiong
63
1
0
16 May 2023
Attacking Perceptual Similarity Metrics
Attacking Perceptual Similarity Metrics
Abhijay Ghildyal
Feng Liu
AAML
91
10
0
15 May 2023
Exploiting Frequency Spectrum of Adversarial Images for General
  Robustness
Exploiting Frequency Spectrum of Adversarial Images for General Robustness
Chun Yang Tan
K. Kawamoto
Hiroshi Kera
AAMLOOD
61
1
0
15 May 2023
Improving Defensive Distillation using Teacher Assistant
Improving Defensive Distillation using Teacher Assistant
Maniratnam Mandal
Suna Gao
AAML
13
0
0
14 May 2023
Adversarial Security and Differential Privacy in mmWave Beam Prediction
  in 6G networks
Adversarial Security and Differential Privacy in mmWave Beam Prediction in 6G networks
G. S. Krishna
Kundrapu Supriya
Sanskar Singh
S. Baidya
AAML
37
0
0
12 May 2023
Inter-frame Accelerate Attack against Video Interpolation Models
Inter-frame Accelerate Attack against Video Interpolation Models
Junpei Liao
Zhikai Chen
Liang Yi
Wenyuan Yang
Baoyuan Wu
Xiaochun Cao
AAML
97
1
0
11 May 2023
Understanding Noise-Augmented Training for Randomized Smoothing
Understanding Noise-Augmented Training for Randomized Smoothing
Ambar Pal
Jeremias Sulam
AAML
67
7
0
08 May 2023
Adversarial Examples Detection with Enhanced Image Difference Features
  based on Local Histogram Equalization
Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization
Z. Yin
Shaowei Zhu
Han Su
Jianteng Peng
Wanli Lyu
Bin Luo
AAML
60
2
0
08 May 2023
Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling
  Augmentation Framework
Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Ruijia Wu
Yuhang Wang
Huafeng Shi
Zhipeng Yu
Yichao Wu
Ding Liang
DiffM
67
9
0
06 May 2023
Beyond the Model: Data Pre-processing Attack to Deep Learning Models in
  Android Apps
Beyond the Model: Data Pre-processing Attack to Deep Learning Models in Android Apps
Ye Sang
Yujin Huang
Shuo Huang
Helei Cui
AAMLSILM
64
5
0
06 May 2023
Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning
Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning
Zijian Wang
Shuo Huang
Yu-Jen Huang
Helei Cui
SILM
34
11
0
06 May 2023
Expectation Maximization Pseudo Labels
Expectation Maximization Pseudo Labels
Moucheng Xu
Yukun Zhou
Chen Jin
M. Groot
Daniel C. Alexander
N. Oxtoby
Yipeng Hu
Joseph Jacob
123
3
0
02 May 2023
Previous
123...111213...545556
Next