Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
v1
v2
v3
v4 (latest)
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,769 papers shown
Title
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
Kento Hasegawa
Seira Hidano
Kohei Nozawa
S. Kiyomoto
N. Togawa
36
25
0
27 May 2022
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
76
27
0
27 May 2022
Verifying Learning-Based Robotic Navigation Systems
Guy Amir
Davide Corsi
Raz Yerushalmi
Luca Marzari
D. Harel
Alessandro Farinelli
Guy Katz
162
39
0
26 May 2022
PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations
Manaar Alam
Esha Sarkar
Michail Maniatakos
AAML
FedML
132
9
0
26 May 2022
MALICE: Manipulation Attacks on Learned Image ComprEssion
Kang Liu
Di Wu
Yi-Ren Wang
Dan Feng
Benjamin Tan
S. Garg
AAML
88
2
0
26 May 2022
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
85
54
0
26 May 2022
Certified Robustness Against Natural Language Attacks by Causal Intervention
Haiteng Zhao
Chang Ma
Xinshuai Dong
Anh Tuan Luu
Zhi-Hong Deng
Hanwang Zhang
AAML
108
36
0
24 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Stability of the scattering transform for deformations with minimal regularity
F. Nicola
S. I. Trapasso
69
4
0
23 May 2022
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
75
12
0
21 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
67
0
0
21 May 2022
Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification
Jungeum Kim
Tianlin Li
OOD
AAML
26
3
0
20 May 2022
On Trace of PGD-Like Adversarial Attacks
Mo Zhou
Vishal M. Patel
AAML
75
4
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
74
0
0
19 May 2022
Gradient-based Counterfactual Explanations using Tractable Probabilistic Models
Xiaoting Shao
Kristian Kersting
BDL
64
1
0
16 May 2022
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks
Siddhartha Datta
AAML
106
5
0
15 May 2022
Automation Slicing and Testing for in-App Deep Learning Models
Hao Wu
Yuhang Gong
Xiaopeng Ke
Hanzhong Liang
Minghao Li
Fengyuan Xu
Yunxin Liu
Sheng Zhong
78
1
0
15 May 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Yuan Xu
Xingshuo Han
Gelei Deng
Jiwei Li
Yang Liu
Tianwei Zhang
AAML
75
20
0
10 May 2022
SeqNet: An Efficient Neural Network for Automatic Malware Detection
Jiawei Xu
Wenxuan Fu
Haoyu Bu
Zhi Wang
Lingyun Ying
AAML
49
3
0
08 May 2022
Structural Extensions of Basis Pursuit: Guarantees on Adversarial Robustness
Dávid Szeghy
Mahmoud Aslan
Á. Fóthi
Balázs Mészáros
Z. '. Milacski
András Lőrincz
AAML
44
0
0
05 May 2022
Rethinking Classifier and Adversarial Attack
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
64
0
0
04 May 2022
CE-based white-box adversarial attacks will not work using super-fitting
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
104
0
0
04 May 2022
Understanding CNNs from excitations
Zijian Ying
Qianmu Li
Zhichao Lian
Jun Hou
Tong Lin
Tao Wang
AAML
FAtt
85
1
0
02 May 2022
Debiased Contrastive Learning of Unsupervised Sentence Representations
Kun Zhou
Beichen Zhang
Wayne Xin Zhao
Ji-Rong Wen
SSL
105
103
0
02 May 2022
Adversarial Plannning
Valentin Vie
Ryan Sheatsley
Sophia Beyda
S. Shringarputale
Kevin S. Chan
Trent Jaeger
Patrick McDaniel
AAML
33
0
0
01 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAML
MLAU
60
3
0
30 Apr 2022
Adversarial Fine-tune with Dynamically Regulated Adversary
Peng-Fei Hou
Ming Zhou
Jie Han
Petr Musílek
Xingyu Li
AAML
58
3
0
28 Apr 2022
Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering
Lukas Schulth
Christian Berghoff
Matthias Neu
AAML
63
5
0
27 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICV
AAML
74
49
0
26 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
60
28
0
26 Apr 2022
When adversarial examples are excusable
Pieter-Jan Kindermans
Charles Staats
AAML
52
0
0
25 Apr 2022
A Simple Structure For Building A Robust Model
Xiao Tan
Jingbo Gao
Ruolin Li
AAML
OOD
84
3
0
25 Apr 2022
Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images
Zhaoyang Jia
Han Fang
Zehua Ma
Weiming Zhang
WIGM
97
0
0
25 Apr 2022
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Xianglong He
Yuezun Li
Haipeng Qu
Junyu Dong
AAML
39
1
0
22 Apr 2022
Adversarial Contrastive Learning by Permuting Cluster Assignments
Muntasir Wahed
Afrina Tabassum
Ismini Lourentzou
SSL
34
5
0
21 Apr 2022
A Mask-Based Adversarial Defense Scheme
Weizhen Xu
Chenyi Zhang
Fangzhen Zhao
Liangda Fang
AAML
77
4
0
21 Apr 2022
Testing robustness of predictions of trained classifiers against naturally occurring perturbations
S. Scher
A. Trugler
OOD
AAML
90
1
0
21 Apr 2022
Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems
Xugui Zhou
Maxfield Kouzel
H. Alemzadeh
OOD
AAML
69
13
0
20 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
44
2
0
18 Apr 2022
Detect Rumors in Microblog Posts for Low-Resource Domains via Adversarial Contrastive Learning
Hongzhan Lin
Jing Ma
Liangliang Chen
Zhiwei Yang
Mingfei Cheng
Guang Chen
74
59
0
18 Apr 2022
Learning Compositional Representations for Effective Low-Shot Generalization
Samarth Mishra
Pengkai Zhu
Venkatesh Saligrama
OCL
56
3
0
17 Apr 2022
SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Marjan Golmaryami
R. Taheri
Zahra Pooranian
Mohammad Shojafar
Pei Xiao
63
15
0
16 Apr 2022
Patch-wise Contrastive Style Learning for Instagram Filter Removal
Furkan Kinli
B. Özcan
Mustafa Furkan Kıraç
87
7
0
15 Apr 2022
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
108
7
0
14 Apr 2022
Backward Reachability Analysis for Neural Feedback Loops
Nicholas Rober
Michael Everett
Jonathan P. How
64
10
0
14 Apr 2022
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS
Ke He
Dan Dongseong Kim
Jing Sun
J. Yoo
Young Hun Lee
H. Kim
AAML
37
5
0
12 Apr 2022
A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Akshayvarun Subramanya
Hamed Pirsiavash
VLM
66
6
0
11 Apr 2022
Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural Networks
Karthikeyan Nagarajan
Junde Li
Sina Sayyah Ensan
Mohammad Nasim Imtiaz Khan
Sachhidh Kannan
Swaroop Ghosh
AAML
37
7
0
10 Apr 2022
"That Is a Suspicious Reaction!": Interpreting Logits Variation to Detect NLP Adversarial Attacks
Edoardo Mosca
Shreyash Agarwal
Javier Rando
Georg Groh
AAML
95
31
0
10 Apr 2022
Adaptive-Gravity: A Defense Against Adversarial Samples
Ali Mirzaeian
Zhi Tian
Sai Manoj P D
B. S. Latibari
I. Savidis
Houman Homayoun
Avesta Sasan
AAML
OOD
58
1
0
07 Apr 2022
Previous
1
2
3
...
19
20
21
...
54
55
56
Next