ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
73
0
0
01 Apr 2025
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Samra Irshad
Seungkyu Lee
Nassir Navab
Hong Joo Lee
S. T. Kim
GANAAML
136
0
0
27 Mar 2025
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent
Philip Doldo
Derek Everett
Amol Khanna
A. Nguyen
Edward Raff
AAML
85
0
0
25 Mar 2025
Quality-focused Active Adversarial Policy for Safe Grasping in Human-Robot Interaction
Quality-focused Active Adversarial Policy for Safe Grasping in Human-Robot Interaction
Chenghao Li
Razvan Beuran
Nak Young Chong
AAML
135
0
0
25 Mar 2025
Boosting the Transferability of Audio Adversarial Examples with Acoustic Representation Optimization
Boosting the Transferability of Audio Adversarial Examples with Acoustic Representation Optimization
Weifei Jin
Junjie Su
Hejia Wang
Yulin Ye
Jie Hao
AAML
74
0
0
25 Mar 2025
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
João B. S. Carvalho
Alessandro Torcinovich
Victor Jimenez Rodriguez
Antonio Emanuele Cinà
Carlos Cotrini
Lea Schönherr
J. M. Buhmann
OOD
111
0
0
20 Mar 2025
Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement
Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement
Yuchen Ren
Zhengyu Zhao
Chenhao Lin
Bo Yang
Zhe Liu
Jiafei Wu
Chao Shen
ViT
92
2
0
19 Mar 2025
AIGVE-Tool: AI-Generated Video Evaluation Toolkit with Multifaceted Benchmark
AIGVE-Tool: AI-Generated Video Evaluation Toolkit with Multifaceted Benchmark
Xinhao Xiang
Xiao Liu
Zizhong Li
Zhuosheng Liu
Jiawei Zhang
91
0
0
18 Mar 2025
TarPro: Targeted Protection against Malicious Image Editing
TarPro: Targeted Protection against Malicious Image Editing
Kaixin Shen
Ruijie Quan
Jiaxu Miao
Jun Xiao
Yi Yang
111
1
0
18 Mar 2025
Shape Bias and Robustness Evaluation via Cue Decomposition for Image Classification and Segmentation
Shape Bias and Robustness Evaluation via Cue Decomposition for Image Classification and Segmentation
Edgar Heinert
Thomas Gottwald
Annika Mütze
Matthias Rottmann
145
0
0
16 Mar 2025
Identifying Trustworthiness Challenges in Deep Learning Models for Continental-Scale Water Quality Prediction
Identifying Trustworthiness Challenges in Deep Learning Models for Continental-Scale Water Quality Prediction
Xiaobo Xia
Xiaofeng Liu
Jiale Liu
K. Fang
Lu Lu
Samet Oymak
William S. Currie
Tongliang Liu
130
0
0
13 Mar 2025
Attacking Multimodal OS Agents with Malicious Image Patches
Lukas Aichberger
Alasdair Paren
Y. Gal
Philip Torr
Adel Bibi
AAML
121
5
0
13 Mar 2025
AdvPaint: Protecting Images from Inpainting Manipulation via Adversarial Attention Disruption
Joonsung Jeon
Woo Jae Kim
Suhyeon Ha
Sooel Son
Sung-eui Yoon
DiffMAAML
144
2
0
13 Mar 2025
A Frustratingly Simple Yet Highly Effective Attack Baseline: Over 90% Success Rate Against the Strong Black-box Models of GPT-4.5/4o/o1
Zhaoyi Li
Xiaohan Zhao
Dong-Dong Wu
Jiacheng Cui
Zhiqiang Shen
AAMLVLM
144
3
0
13 Mar 2025
Enhancing Adversarial Example Detection Through Model Explanation
Qian Ma
Ziping Ye
AAML
100
0
0
12 Mar 2025
MIGA: Mutual Information-Guided Attack on Denoising Models for Semantic Manipulation
Guanghao Li
Mingzhi Chen
Hao Yu
Shuting Dong
Wenhao Jiang
Ming Tang
Chun Yuan
DiffMAAML
84
0
0
10 Mar 2025
Utilizing Jailbreak Probability to Attack and Safeguard Multimodal LLMs
Wenzhuo Xu
Zhipeng Wei
Xiongtao Sun
Deyue Zhang
Dongdong Yang
Quanchen Zou
Xinming Zhang
AAML
90
0
0
10 Mar 2025
MMARD: Improving the Min-Max Optimization Process in Adversarial Robustness Distillation
Yuzheng Wang
Zhaoyu Chen
Dingkang Yang
Yuanhang Wang
Lizhe Qi
AAML
147
0
0
09 Mar 2025
Life-Cycle Routing Vulnerabilities of LLM Router
Qiqi Lin
Xiaoyang Ji
Shengfang Zhai
Qingni Shen
Zhi-Li Zhang
Yuejian Fang
Yansong Gao
AAML
90
1
0
09 Mar 2025
Exploring Adversarial Transferability between Kolmogorov-arnold Networks
Exploring Adversarial Transferability between Kolmogorov-arnold Networks
Songping Wang
Xinquan Yue
Yueming Lyu
Caifeng Shan
AAML
136
2
0
08 Mar 2025
Boosting the Local Invariance for Better Adversarial Transferability
Bohan Liu
Xiaosen Wang
AAML
157
0
0
08 Mar 2025
Robust Intrusion Detection System with Explainable Artificial Intelligence
Betül Güvenç Paltun
Ramin Fuladi
Rim El Malki
AAML
76
0
0
07 Mar 2025
Poisoning Bayesian Inference via Data Deletion and Replication
Matthieu Carreau
Roi Naveiro
William N. Caballero
AAMLKELM
93
1
0
06 Mar 2025
CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Songlong Xing
Zhengyu Zhao
N. Sebe
AAML
153
2
0
05 Mar 2025
One Stone, Two Birds: Enhancing Adversarial Defense Through the Lens of Distributional Discrepancy
One Stone, Two Birds: Enhancing Adversarial Defense Through the Lens of Distributional Discrepancy
Jiacheng Zhang
Benjamin I. P. Rubinstein
Jing Zhang
Feng Liu
131
0
0
04 Mar 2025
Improving the Transferability of Adversarial Attacks by an Input Transpose
Qing Wan
Shilong Deng
Xun Wang
AAML
104
0
0
02 Mar 2025
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Li Yang
Mirna El Rajab
Abdallah Shami
Sami Muhaidat
156
9
0
28 Feb 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
429
0
0
28 Feb 2025
Steganography Beyond Space-Time with Chain of Multimodal AI
Steganography Beyond Space-Time with Chain of Multimodal AI
Ching-Chun Chang
Isao Echizen
165
0
0
25 Feb 2025
On the Vulnerability of Concept Erasure in Diffusion Models
On the Vulnerability of Concept Erasure in Diffusion Models
Lucas Beerens
Alex D. Richardson
Peng Sun
Dongdong Chen
DiffM
175
2
0
24 Feb 2025
Interpreting Adversarial Attacks and Defences using Architectures with Enhanced Interpretability
Interpreting Adversarial Attacks and Defences using Architectures with Enhanced Interpretability
Akshay G Rao
Chandrashekhar Lakshminarayanan
Arun Rajkumar
AI4CEAAML
69
0
0
24 Feb 2025
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
Hongyuan Zha
Baoyuan Wu
AAML
123
0
0
23 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
184
0
0
20 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
117
0
0
16 Feb 2025
PDA: Generalizable Detection of AI-Generated Images via Post-hoc Distribution Alignment
PDA: Generalizable Detection of AI-Generated Images via Post-hoc Distribution Alignment
Li Wang
Wenyu Chen
Zheng Li
Shanqing Guo
99
0
0
15 Feb 2025
Universal Adversarial Attack on Aligned Multimodal LLMs
Universal Adversarial Attack on Aligned Multimodal LLMs
Temurbek Rahmatullaev
Polina Druzhinina
Nikita Kurdiukov
Matvey Mikhalchuk
Andrey Kuznetsov
Anton Razzhigaev
AAML
219
0
0
11 Feb 2025
Confidence Elicitation: A New Attack Vector for Large Language Models
Confidence Elicitation: A New Attack Vector for Large Language Models
Brian Formento
Chuan-Sheng Foo
See-Kiong Ng
AAML
266
0
0
07 Feb 2025
Federated Learning for Anomaly Detection in Energy Consumption Data: Assessing the Vulnerability to Adversarial Attacks
Federated Learning for Anomaly Detection in Energy Consumption Data: Assessing the Vulnerability to Adversarial Attacks
Yohannis Kifle Telila
Damitha Senevirathne
Dumindu Tissera
Apurva Narayan
Miriam A.M. Capretz
Katarina Grolinger
AAML
75
0
0
07 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedImAAML
147
0
0
04 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
512
0
0
31 Jan 2025
Document Screenshot Retrievers are Vulnerable to Pixel Poisoning Attacks
Document Screenshot Retrievers are Vulnerable to Pixel Poisoning Attacks
Shengyao Zhuang
Ekaterina Khramtsova
Xueguang Ma
Bevan Koopman
Jimmy Lin
Guido Zuccon
AAML
108
1
0
28 Jan 2025
A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Jacob Shams
Ben Nassi
Satoru Koda
A. Shabtai
Yuval Elovici
410
0
0
28 Jan 2025
Self-supervised Benchmark Lottery on ImageNet: Do Marginal Improvements Translate to Improvements on Similar Datasets?
Utku Ozbulak
Esla Timothy Anzaku
Solha Kang
W. D. Neve
J. Vankerschaver
136
0
0
28 Jan 2025
With Great Backbones Comes Great Adversarial Transferability
With Great Backbones Comes Great Adversarial Transferability
Erik Arakelyan
Karen Hambardzumyan
Davit Papikyan
Pasquale Minervini
Albert Gordo
Isabelle Augenstein
Aram H. Markosyan
AAML
155
0
0
21 Jan 2025
Enhancing Adversarial Transferability via Component-Wise Transformation
Enhancing Adversarial Transferability via Component-Wise Transformation
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
Donglin Wang
AAML
88
0
0
21 Jan 2025
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
N. Shah
Ayan Kashyap
Shirish S. Karande
Vineet Gandhi
84
1
0
20 Jan 2025
On the uncertainty principle of neural networks
On the uncertainty principle of neural networks
Jun-Jie Zhang
Dong-xiao Zhang
Jian-Nan Chen
L. Pang
Deyu Meng
145
3
0
17 Jan 2025
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
Ping Guo
Cheng Gong
Xi Lin
Fei Liu
Zhichao Lu
Qingfu Zhang
Zhenkun Wang
AAML
118
0
0
13 Jan 2025
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Jialin Wu
Kaikai Pan
Yanjiao Chen
Jiangyi Deng
Shengyuan Pang
Wenyuan Xu
ViTAAML
125
0
0
13 Jan 2025
Transferable Adversarial Examples with Bayes Approach
Transferable Adversarial Examples with Bayes Approach
Mingyuan Fan
Cen Chen
Ximeng Liu
Wenzhong Guo
AAML
121
1
0
08 Jan 2025
Previous
12345...545556
Next