Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
v1
v2
v3
v4 (latest)
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,769 papers shown
Title
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
73
0
0
01 Apr 2025
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Samra Irshad
Seungkyu Lee
Nassir Navab
Hong Joo Lee
S. T. Kim
GAN
AAML
136
0
0
27 Mar 2025
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent
Philip Doldo
Derek Everett
Amol Khanna
A. Nguyen
Edward Raff
AAML
85
0
0
25 Mar 2025
Quality-focused Active Adversarial Policy for Safe Grasping in Human-Robot Interaction
Chenghao Li
Razvan Beuran
Nak Young Chong
AAML
135
0
0
25 Mar 2025
Boosting the Transferability of Audio Adversarial Examples with Acoustic Representation Optimization
Weifei Jin
Junjie Su
Hejia Wang
Yulin Ye
Jie Hao
AAML
74
0
0
25 Mar 2025
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
João B. S. Carvalho
Alessandro Torcinovich
Victor Jimenez Rodriguez
Antonio Emanuele Cinà
Carlos Cotrini
Lea Schönherr
J. M. Buhmann
OOD
111
0
0
20 Mar 2025
Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement
Yuchen Ren
Zhengyu Zhao
Chenhao Lin
Bo Yang
Zhe Liu
Jiafei Wu
Chao Shen
ViT
92
2
0
19 Mar 2025
AIGVE-Tool: AI-Generated Video Evaluation Toolkit with Multifaceted Benchmark
Xinhao Xiang
Xiao Liu
Zizhong Li
Zhuosheng Liu
Jiawei Zhang
91
0
0
18 Mar 2025
TarPro: Targeted Protection against Malicious Image Editing
Kaixin Shen
Ruijie Quan
Jiaxu Miao
Jun Xiao
Yi Yang
111
1
0
18 Mar 2025
Shape Bias and Robustness Evaluation via Cue Decomposition for Image Classification and Segmentation
Edgar Heinert
Thomas Gottwald
Annika Mütze
Matthias Rottmann
145
0
0
16 Mar 2025
Identifying Trustworthiness Challenges in Deep Learning Models for Continental-Scale Water Quality Prediction
Xiaobo Xia
Xiaofeng Liu
Jiale Liu
K. Fang
Lu Lu
Samet Oymak
William S. Currie
Tongliang Liu
130
0
0
13 Mar 2025
Attacking Multimodal OS Agents with Malicious Image Patches
Lukas Aichberger
Alasdair Paren
Y. Gal
Philip Torr
Adel Bibi
AAML
121
5
0
13 Mar 2025
AdvPaint: Protecting Images from Inpainting Manipulation via Adversarial Attention Disruption
Joonsung Jeon
Woo Jae Kim
Suhyeon Ha
Sooel Son
Sung-eui Yoon
DiffM
AAML
144
2
0
13 Mar 2025
A Frustratingly Simple Yet Highly Effective Attack Baseline: Over 90% Success Rate Against the Strong Black-box Models of GPT-4.5/4o/o1
Zhaoyi Li
Xiaohan Zhao
Dong-Dong Wu
Jiacheng Cui
Zhiqiang Shen
AAML
VLM
144
3
0
13 Mar 2025
Enhancing Adversarial Example Detection Through Model Explanation
Qian Ma
Ziping Ye
AAML
100
0
0
12 Mar 2025
MIGA: Mutual Information-Guided Attack on Denoising Models for Semantic Manipulation
Guanghao Li
Mingzhi Chen
Hao Yu
Shuting Dong
Wenhao Jiang
Ming Tang
Chun Yuan
DiffM
AAML
84
0
0
10 Mar 2025
Utilizing Jailbreak Probability to Attack and Safeguard Multimodal LLMs
Wenzhuo Xu
Zhipeng Wei
Xiongtao Sun
Deyue Zhang
Dongdong Yang
Quanchen Zou
Xinming Zhang
AAML
90
0
0
10 Mar 2025
MMARD: Improving the Min-Max Optimization Process in Adversarial Robustness Distillation
Yuzheng Wang
Zhaoyu Chen
Dingkang Yang
Yuanhang Wang
Lizhe Qi
AAML
147
0
0
09 Mar 2025
Life-Cycle Routing Vulnerabilities of LLM Router
Qiqi Lin
Xiaoyang Ji
Shengfang Zhai
Qingni Shen
Zhi-Li Zhang
Yuejian Fang
Yansong Gao
AAML
90
1
0
09 Mar 2025
Exploring Adversarial Transferability between Kolmogorov-arnold Networks
Songping Wang
Xinquan Yue
Yueming Lyu
Caifeng Shan
AAML
136
2
0
08 Mar 2025
Boosting the Local Invariance for Better Adversarial Transferability
Bohan Liu
Xiaosen Wang
AAML
157
0
0
08 Mar 2025
Robust Intrusion Detection System with Explainable Artificial Intelligence
Betül Güvenç Paltun
Ramin Fuladi
Rim El Malki
AAML
76
0
0
07 Mar 2025
Poisoning Bayesian Inference via Data Deletion and Replication
Matthieu Carreau
Roi Naveiro
William N. Caballero
AAML
KELM
93
1
0
06 Mar 2025
CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Songlong Xing
Zhengyu Zhao
N. Sebe
AAML
153
2
0
05 Mar 2025
One Stone, Two Birds: Enhancing Adversarial Defense Through the Lens of Distributional Discrepancy
Jiacheng Zhang
Benjamin I. P. Rubinstein
Jing Zhang
Feng Liu
131
0
0
04 Mar 2025
Improving the Transferability of Adversarial Attacks by an Input Transpose
Qing Wan
Shilong Deng
Xun Wang
AAML
104
0
0
02 Mar 2025
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Li Yang
Mirna El Rajab
Abdallah Shami
Sami Muhaidat
156
9
0
28 Feb 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
429
0
0
28 Feb 2025
Steganography Beyond Space-Time with Chain of Multimodal AI
Ching-Chun Chang
Isao Echizen
165
0
0
25 Feb 2025
On the Vulnerability of Concept Erasure in Diffusion Models
Lucas Beerens
Alex D. Richardson
Peng Sun
Dongdong Chen
DiffM
175
2
0
24 Feb 2025
Interpreting Adversarial Attacks and Defences using Architectures with Enhanced Interpretability
Akshay G Rao
Chandrashekhar Lakshminarayanan
Arun Rajkumar
AI4CE
AAML
69
0
0
24 Feb 2025
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
Hongyuan Zha
Baoyuan Wu
AAML
123
0
0
23 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
184
0
0
20 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
117
0
0
16 Feb 2025
PDA: Generalizable Detection of AI-Generated Images via Post-hoc Distribution Alignment
Li Wang
Wenyu Chen
Zheng Li
Shanqing Guo
99
0
0
15 Feb 2025
Universal Adversarial Attack on Aligned Multimodal LLMs
Temurbek Rahmatullaev
Polina Druzhinina
Nikita Kurdiukov
Matvey Mikhalchuk
Andrey Kuznetsov
Anton Razzhigaev
AAML
219
0
0
11 Feb 2025
Confidence Elicitation: A New Attack Vector for Large Language Models
Brian Formento
Chuan-Sheng Foo
See-Kiong Ng
AAML
266
0
0
07 Feb 2025
Federated Learning for Anomaly Detection in Energy Consumption Data: Assessing the Vulnerability to Adversarial Attacks
Yohannis Kifle Telila
Damitha Senevirathne
Dumindu Tissera
Apurva Narayan
Miriam A.M. Capretz
Katarina Grolinger
AAML
75
0
0
07 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedIm
AAML
147
0
0
04 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
512
0
0
31 Jan 2025
Document Screenshot Retrievers are Vulnerable to Pixel Poisoning Attacks
Shengyao Zhuang
Ekaterina Khramtsova
Xueguang Ma
Bevan Koopman
Jimmy Lin
Guido Zuccon
AAML
108
1
0
28 Jan 2025
A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Jacob Shams
Ben Nassi
Satoru Koda
A. Shabtai
Yuval Elovici
410
0
0
28 Jan 2025
Self-supervised Benchmark Lottery on ImageNet: Do Marginal Improvements Translate to Improvements on Similar Datasets?
Utku Ozbulak
Esla Timothy Anzaku
Solha Kang
W. D. Neve
J. Vankerschaver
136
0
0
28 Jan 2025
With Great Backbones Comes Great Adversarial Transferability
Erik Arakelyan
Karen Hambardzumyan
Davit Papikyan
Pasquale Minervini
Albert Gordo
Isabelle Augenstein
Aram H. Markosyan
AAML
155
0
0
21 Jan 2025
Enhancing Adversarial Transferability via Component-Wise Transformation
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
Donglin Wang
AAML
88
0
0
21 Jan 2025
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
N. Shah
Ayan Kashyap
Shirish S. Karande
Vineet Gandhi
84
1
0
20 Jan 2025
On the uncertainty principle of neural networks
Jun-Jie Zhang
Dong-xiao Zhang
Jian-Nan Chen
L. Pang
Deyu Meng
145
3
0
17 Jan 2025
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
Ping Guo
Cheng Gong
Xi Lin
Fei Liu
Zhichao Lu
Qingfu Zhang
Zhenkun Wang
AAML
118
0
0
13 Jan 2025
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Jialin Wu
Kaikai Pan
Yanjiao Chen
Jiangyi Deng
Shengyuan Pang
Wenyuan Xu
ViT
AAML
125
0
0
13 Jan 2025
Transferable Adversarial Examples with Bayes Approach
Mingyuan Fan
Cen Chen
Ximeng Liu
Wenzhong Guo
AAML
121
1
0
08 Jan 2025
Previous
1
2
3
4
5
...
54
55
56
Next