ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILM
    AAML
ArXivPDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 1,598 papers shown
Title
CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Songlong Xing
Zhengyu Zhao
N. Sebe
AAML
62
0
0
05 Mar 2025
DDAD: A Two-pronged Adversarial Defense Based on Distributional Discrepancy
Jiacheng Zhang
Benjamin I. P. Rubinstein
J. Zhang
Feng Liu
69
0
0
04 Mar 2025
Improving the Transferability of Adversarial Attacks by an Input Transpose
Qing Wan
Shilong Deng
Xun Wang
AAML
34
0
0
02 Mar 2025
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Li Yang
Mirna El Rajab
Abdallah Shami
Sami Muhaidat
73
6
0
28 Feb 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
124
0
0
28 Feb 2025
Steganography Beyond Space-Time with Chain of Multimodal AI
Steganography Beyond Space-Time with Chain of Multimodal AI
Ching-Chun Chang
Isao Echizen
69
0
0
25 Feb 2025
Interpreting Adversarial Attacks and Defences using Architectures with Enhanced Interpretability
Interpreting Adversarial Attacks and Defences using Architectures with Enhanced Interpretability
Akshay G Rao
Chandrashekhar Lakshminarayanan
Arun Rajkumar
AI4CE
AAML
31
0
0
24 Feb 2025
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features
Mingli Zhu
Shaokui Wei
Hongyuan Zha
Baoyuan Wu
AAML
37
0
0
23 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
62
0
0
20 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
52
0
0
16 Feb 2025
PDA: Generalizable Detection of AI-Generated Images via Post-hoc Distribution Alignment
PDA: Generalizable Detection of AI-Generated Images via Post-hoc Distribution Alignment
Li Wang
Wenyu Chen
Zheng Li
Shanqing Guo
36
0
0
15 Feb 2025
Universal Adversarial Attack on Aligned Multimodal LLMs
Universal Adversarial Attack on Aligned Multimodal LLMs
Temurbek Rahmatullaev
Polina Druzhinina
Matvey Mikhalchuk
Andrey Kuznetsov
Anton Razzhigaev
AAML
100
0
0
11 Feb 2025
Confidence Elicitation: A New Attack Vector for Large Language Models
Confidence Elicitation: A New Attack Vector for Large Language Models
Brian Formento
Chuan-Sheng Foo
See-Kiong Ng
AAML
94
0
0
07 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedIm
AAML
56
0
0
04 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
137
0
0
31 Jan 2025
A Privacy Enhancing Technique to Evade Detection by Street Video Cameras Without Using Adversarial Accessories
Jacob Shams
Ben Nassi
Satoru Koda
A. Shabtai
Yuval Elovici
121
0
0
28 Jan 2025
Self-supervised Benchmark Lottery on ImageNet: Do Marginal Improvements Translate to Improvements on Similar Datasets?
Utku Ozbulak
Esla Timothy Anzaku
Solha Kang
W. D. Neve
J. Vankerschaver
50
0
0
28 Jan 2025
With Great Backbones Comes Great Adversarial Transferability
With Great Backbones Comes Great Adversarial Transferability
Erik Arakelyan
Karen Hambardzumyan
Davit Papikyan
Pasquale Minervini
Albert Gordo
Isabelle Augenstein
Aram H. Markosyan
AAML
65
0
0
21 Jan 2025
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
MRI2Speech: Speech Synthesis from Articulatory Movements Recorded by Real-time MRI
N. Shah
Ayan Kashyap
Shirish S. Karande
Vineet Gandhi
47
0
0
20 Jan 2025
On the uncertainty principle of neural networks
On the uncertainty principle of neural networks
Jun-Jie Zhang
Dong-xiao Zhang
Jian-Nan Chen
L. Pang
Deyu Meng
57
2
0
17 Jan 2025
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
Ping Guo
Cheng Gong
Xi Victoria Lin
Fei Liu
Zhichao Lu
Qingfu Zhang
Zhenkun Wang
AAML
43
0
0
13 Jan 2025
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Jialin Wu
Kaikai Pan
Yanjiao Chen
Jiangyi Deng
Shengyuan Pang
Wenyuan Xu
ViT
AAML
43
0
0
13 Jan 2025
GCP: Guarded Collaborative Perception with Spatial-Temporal Aware Malicious Agent Detection
Yihang Tao
Senkang Hu
Yue Hu
Haonan An
Hangcheng Cao
Yuguang Fang
AAML
42
1
0
05 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
35
0
0
04 Jan 2025
Familiarity-Based Open-Set Recognition Under Adversarial Attacks
Familiarity-Based Open-Set Recognition Under Adversarial Attacks
Philip Enevoldsen
Christian Gundersen
Nico Lang
Serge J. Belongie
Christian Igel
59
1
0
03 Jan 2025
Region-Guided Attack on the Segment Anything Model (SAM)
Region-Guided Attack on the Segment Anything Model (SAM)
Xiaoliang Liu
F. Shen
Jian Zhao
AAML
28
0
0
03 Jan 2025
AIM: Additional Image Guided Generation of Transferable Adversarial Attacks
Teng Li
Xingjun Ma
Yu-Gang Jiang
AAML
DiffM
22
0
0
03 Jan 2025
Boosting Adversarial Transferability with Spatial Adversarial Alignment
Zhaoyu Chen
Haijing Guo
Kaixun Jiang
Jiyuan Fu
Xinyu Zhou
Dingkang Yang
H. Tang
Bo-wen Li
Wenqiang Zhang
AAML
38
0
0
03 Jan 2025
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search
Zhaohui Wang
Min Zhang
Jingran Yang
Bojie Shao
Min Zhang
46
4
0
31 Dec 2024
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Hui Zeng
Sanshuai Cui
Biwei Chen
Anjie Peng
AAML
35
0
0
31 Dec 2024
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
38
0
0
31 Dec 2024
Attribution for Enhanced Explanation with Transferable Adversarial
  eXploration
Attribution for Enhanced Explanation with Transferable Adversarial eXploration
Zhiyu Zhu
Jiayu Zhang
Zhibo Jin
Huaming Chen
Jianlong Zhou
Fang Chen
AAML
ViT
38
0
0
27 Dec 2024
Central limit theorems for vector-valued composite functionals with
  smoothing and applications
Central limit theorems for vector-valued composite functionals with smoothing and applications
Huhui Chen
Darinka Dentcheva
Yang Lin
Gregory J. Stock
48
0
0
26 Dec 2024
AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF
  Models
AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF Models
Tommy Nguyen
Mehmet Ergezer
Christian Green
76
0
0
18 Dec 2024
Targeted View-Invariant Adversarial Perturbations for 3D Object
  Recognition
Targeted View-Invariant Adversarial Perturbations for 3D Object Recognition
Christian Green
Mehmet Ergezer
Abdurrahman Zeybey
AAML
80
0
0
17 Dec 2024
Adversarially robust generalization theory via Jacobian regularization
  for deep neural networks
Adversarially robust generalization theory via Jacobian regularization for deep neural networks
Dongya Wu
Xin Li
AAML
72
0
0
17 Dec 2024
Towards Adversarial Robustness of Model-Level Mixture-of-Experts
  Architectures for Semantic Segmentation
Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation
Svetlana Pavlitska
Enrico Eisen
J. Marius Zöllner
AAML
UQCV
MoE
90
1
0
16 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffM
AAML
72
1
0
16 Dec 2024
Are Language Models Agnostic to Linguistically Grounded Perturbations? A
  Case Study of Indic Languages
Are Language Models Agnostic to Linguistically Grounded Perturbations? A Case Study of Indic Languages
Poulami Ghosh
Raj Dabre
Pushpak Bhattacharyya
AAML
70
0
0
14 Dec 2024
Safety Monitoring of Machine Learning Perception Functions: a Survey
Safety Monitoring of Machine Learning Perception Functions: a Survey
Raul Sena Ferreira
Joris Guérin
Kevin Delmas
Jérémie Guiochet
H. Waeselynck
65
0
0
09 Dec 2024
Hijacking Vision-and-Language Navigation Agents with Adversarial
  Environmental Attacks
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks
Zijiao Yang
Xiangxi Shi
Eric Slyman
Stefan Lee
AAML
74
0
0
03 Dec 2024
Sustainable Self-evolution Adversarial Training
Sustainable Self-evolution Adversarial Training
Wenxuan Wang
Chenglei Wang
Huihui Qi
Menghao Ye
Xuelin Qian
Peng Wang
Yanning Zhang
AAML
66
0
0
03 Dec 2024
The Evolution and Future Perspectives of Artificial Intelligence
  Generated Content
The Evolution and Future Perspectives of Artificial Intelligence Generated Content
Chengzhang Zhu
Luobin Cui
Ying Tang
Jiacun Wang
92
1
0
02 Dec 2024
DiffPatch: Generating Customizable Adversarial Patches using Diffusion Models
DiffPatch: Generating Customizable Adversarial Patches using Diffusion Models
Zhixiang Wang
Guangnan Ye
X. Wang
Siheng Chen
Z. Wang
Xingjun Ma
Yu-Gang Jiang
AAML
DiffM
88
0
0
02 Dec 2024
Lightweight Contenders: Navigating Semi-Supervised Text Mining through
  Peer Collaboration and Self Transcendence
Lightweight Contenders: Navigating Semi-Supervised Text Mining through Peer Collaboration and Self Transcendence
Qianren Mao
Weifeng Jiang
J. Liu
Chenghua Lin
Qian Li
Xianqing Wen
Jianxin Li
Jinhu Lu
67
0
0
01 Dec 2024
Adversarial Training in Low-Label Regimes with Margin-Based
  Interpolation
Adversarial Training in Low-Label Regimes with Margin-Based Interpolation
Tian Ye
R. Kannan
Viktor Prasanna
AAML
61
0
0
27 Nov 2024
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient
  Fine-Tuning
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning
Zhen Sun
Tianshuo Cong
Yule Liu
Chenhao Lin
Xinlei He
Rongmao Chen
Xingshuo Han
Xinyi Huang
AAML
77
3
0
26 Nov 2024
RED: Robust Environmental Design
RED: Robust Environmental Design
Jinghan Yan
AAML
70
0
0
26 Nov 2024
A Tunable Despeckling Neural Network Stabilized via Diffusion Equation
A Tunable Despeckling Neural Network Stabilized via Diffusion Equation
Yi Ran
Zhichang Guo
Jia Li
Yao Li
Martin Burger
Boying Wu
DiffM
61
0
0
24 Nov 2024
Improving Transferable Targeted Attacks with Feature Tuning Mixup
Improving Transferable Targeted Attacks with Feature Tuning Mixup
K. Liang
Xuelong Dai
Yanjie Li
Dong Wang
Bin Xiao
AAML
146
0
0
23 Nov 2024
Previous
12345...303132
Next