ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial
  Training
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
Kento Hasegawa
Seira Hidano
Kohei Nozawa
S. Kiyomoto
N. Togawa
36
25
0
27 May 2022
Adversarial attacks and defenses in Speaker Recognition Systems: A
  survey
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Jiahe Lan
Rui Zhang
Zheng Yan
Jie Wang
Yu Chen
Ronghui Hou
AAML
76
27
0
27 May 2022
Verifying Learning-Based Robotic Navigation Systems
Verifying Learning-Based Robotic Navigation Systems
Guy Amir
Davide Corsi
Raz Yerushalmi
Luca Marzari
D. Harel
Alessandro Farinelli
Guy Katz
162
39
0
26 May 2022
PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using
  Adversarial Perturbations
PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations
Manaar Alam
Esha Sarkar
Michail Maniatakos
AAMLFedML
132
9
0
26 May 2022
MALICE: Manipulation Attacks on Learned Image ComprEssion
MALICE: Manipulation Attacks on Learned Image ComprEssion
Kang Liu
Di Wu
Yi-Ren Wang
Dan Feng
Benjamin Tan
S. Garg
AAML
88
2
0
26 May 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
85
54
0
26 May 2022
Certified Robustness Against Natural Language Attacks by Causal
  Intervention
Certified Robustness Against Natural Language Attacks by Causal Intervention
Haiteng Zhao
Chang Ma
Xinshuai Dong
Anh Tuan Luu
Zhi-Hong Deng
Hanwang Zhang
AAML
108
36
0
24 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Stability of the scattering transform for deformations with minimal
  regularity
Stability of the scattering transform for deformations with minimal regularity
F. Nicola
S. I. Trapasso
69
4
0
23 May 2022
Post-breach Recovery: Protection against White-box Adversarial Examples
  for Leaked DNN Models
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
75
12
0
21 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
67
0
0
21 May 2022
Robust Sensible Adversarial Learning of Deep Neural Networks for Image
  Classification
Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification
Jungeum Kim
Tianlin Li
OODAAML
26
3
0
20 May 2022
On Trace of PGD-Like Adversarial Attacks
On Trace of PGD-Like Adversarial Attacks
Mo Zhou
Vishal M. Patel
AAML
75
4
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
74
0
0
19 May 2022
Gradient-based Counterfactual Explanations using Tractable Probabilistic
  Models
Gradient-based Counterfactual Explanations using Tractable Probabilistic Models
Xiaoting Shao
Kristian Kersting
BDL
64
1
0
16 May 2022
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial
  Attacks
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks
Siddhartha Datta
AAML
106
5
0
15 May 2022
Automation Slicing and Testing for in-App Deep Learning Models
Automation Slicing and Testing for in-App Deep Learning Models
Hao Wu
Yuhang Gong
Xiaopeng Ke
Hanzhong Liang
Minghao Li
Fengyuan Xu
Yunxin Liu
Sheng Zhong
78
1
0
15 May 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a
  Systematic View
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Yuan Xu
Xingshuo Han
Gelei Deng
Jiwei Li
Yang Liu
Tianwei Zhang
AAML
75
20
0
10 May 2022
SeqNet: An Efficient Neural Network for Automatic Malware Detection
SeqNet: An Efficient Neural Network for Automatic Malware Detection
Jiawei Xu
Wenxuan Fu
Haoyu Bu
Zhi Wang
Lingyun Ying
AAML
49
3
0
08 May 2022
Structural Extensions of Basis Pursuit: Guarantees on Adversarial
  Robustness
Structural Extensions of Basis Pursuit: Guarantees on Adversarial Robustness
Dávid Szeghy
Mahmoud Aslan
Á. Fóthi
Balázs Mészáros
Z. '. Milacski
András Lőrincz
AAML
44
0
0
05 May 2022
Rethinking Classifier and Adversarial Attack
Rethinking Classifier and Adversarial Attack
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
64
0
0
04 May 2022
CE-based white-box adversarial attacks will not work using super-fitting
CE-based white-box adversarial attacks will not work using super-fitting
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
104
0
0
04 May 2022
Understanding CNNs from excitations
Understanding CNNs from excitations
Zijian Ying
Qianmu Li
Zhichao Lian
Jun Hou
Tong Lin
Tao Wang
AAMLFAtt
85
1
0
02 May 2022
Debiased Contrastive Learning of Unsupervised Sentence Representations
Debiased Contrastive Learning of Unsupervised Sentence Representations
Kun Zhou
Beichen Zhang
Wayne Xin Zhao
Ji-Rong Wen
SSL
105
103
0
02 May 2022
Adversarial Plannning
Adversarial Plannning
Valentin Vie
Ryan Sheatsley
Sophia Beyda
S. Shringarputale
Kevin S. Chan
Trent Jaeger
Patrick McDaniel
AAML
33
0
0
01 May 2022
Optimizing One-pixel Black-box Adversarial Attacks
Optimizing One-pixel Black-box Adversarial Attacks
Tianxun Zhou
Shubhanka Agrawal
Prateek Manocha
AAMLMLAU
60
3
0
30 Apr 2022
Adversarial Fine-tune with Dynamically Regulated Adversary
Adversarial Fine-tune with Dynamically Regulated Adversary
Peng-Fei Hou
Ming Zhou
Jie Han
Petr Musílek
Xingyu Li
AAML
58
3
0
28 Apr 2022
Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap
  Clustering
Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering
Lukas Schulth
Christian Berghoff
Matthias Neu
AAML
63
5
0
27 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICVAAML
74
49
0
26 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection
  Mechanism in Social Networks
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
60
28
0
26 Apr 2022
When adversarial examples are excusable
When adversarial examples are excusable
Pieter-Jan Kindermans
Charles Staats
AAML
52
0
0
25 Apr 2022
A Simple Structure For Building A Robust Model
A Simple Structure For Building A Robust Model
Xiao Tan
Jingbo Gao
Ruolin Li
AAMLOOD
84
3
0
25 Apr 2022
Go Wide or Go Deep: Levering Watermarking Performance with Computational
  Cost for Specific Images
Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images
Zhaoyang Jia
Han Fang
Zehua Ma
Weiming Zhang
WIGM
97
0
0
25 Apr 2022
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Xianglong He
Yuezun Li
Haipeng Qu
Junyu Dong
AAML
39
1
0
22 Apr 2022
Adversarial Contrastive Learning by Permuting Cluster Assignments
Adversarial Contrastive Learning by Permuting Cluster Assignments
Muntasir Wahed
Afrina Tabassum
Ismini Lourentzou
SSL
34
5
0
21 Apr 2022
A Mask-Based Adversarial Defense Scheme
A Mask-Based Adversarial Defense Scheme
Weizhen Xu
Chenyi Zhang
Fangzhen Zhao
Liangda Fang
AAML
77
4
0
21 Apr 2022
Testing robustness of predictions of trained classifiers against
  naturally occurring perturbations
Testing robustness of predictions of trained classifiers against naturally occurring perturbations
S. Scher
A. Trugler
OODAAML
90
1
0
21 Apr 2022
Robustness Testing of Data and Knowledge Driven Anomaly Detection in
  Cyber-Physical Systems
Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems
Xugui Zhou
Maxfield Kouzel
H. Alemzadeh
OODAAML
69
13
0
20 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile
  Edge
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
44
2
0
18 Apr 2022
Detect Rumors in Microblog Posts for Low-Resource Domains via
  Adversarial Contrastive Learning
Detect Rumors in Microblog Posts for Low-Resource Domains via Adversarial Contrastive Learning
Hongzhan Lin
Jing Ma
Liangliang Chen
Zhiwei Yang
Mingfei Cheng
Guang Chen
74
59
0
18 Apr 2022
Learning Compositional Representations for Effective Low-Shot
  Generalization
Learning Compositional Representations for Effective Low-Shot Generalization
Samarth Mishra
Pengkai Zhu
Venkatesh Saligrama
OCL
56
3
0
17 Apr 2022
SETTI: A Self-supervised Adversarial Malware Detection Architecture in
  an IoT Environment
SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Marjan Golmaryami
R. Taheri
Zahra Pooranian
Mohammad Shojafar
Pei Xiao
63
15
0
16 Apr 2022
Patch-wise Contrastive Style Learning for Instagram Filter Removal
Patch-wise Contrastive Style Learning for Instagram Filter Removal
Furkan Kinli
B. Özcan
Mustafa Furkan Kıraç
87
7
0
15 Apr 2022
From Environmental Sound Representation to Robustness of 2D CNN Models
  Against Adversarial Attacks
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
108
7
0
14 Apr 2022
Backward Reachability Analysis for Neural Feedback Loops
Backward Reachability Analysis for Neural Feedback Loops
Nicholas Rober
Michael Everett
Jonathan P. How
64
10
0
14 Apr 2022
Liuer Mihou: A Practical Framework for Generating and Evaluating
  Grey-box Adversarial Attacks against NIDS
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS
Ke He
Dan Dongseong Kim
Jing Sun
J. Yoo
Young Hun Lee
H. Kim
AAML
37
5
0
12 Apr 2022
A Simple Approach to Adversarial Robustness in Few-shot Image
  Classification
A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Akshayvarun Subramanya
Hamed Pirsiavash
VLM
66
6
0
11 Apr 2022
Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural
  Networks
Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural Networks
Karthikeyan Nagarajan
Junde Li
Sina Sayyah Ensan
Mohammad Nasim Imtiaz Khan
Sachhidh Kannan
Swaroop Ghosh
AAML
37
7
0
10 Apr 2022
"That Is a Suspicious Reaction!": Interpreting Logits Variation to
  Detect NLP Adversarial Attacks
"That Is a Suspicious Reaction!": Interpreting Logits Variation to Detect NLP Adversarial Attacks
Edoardo Mosca
Shreyash Agarwal
Javier Rando
Georg Groh
AAML
95
31
0
10 Apr 2022
Adaptive-Gravity: A Defense Against Adversarial Samples
Adaptive-Gravity: A Defense Against Adversarial Samples
Ali Mirzaeian
Zhi Tian
Sai Manoj P D
B. S. Latibari
I. Savidis
Houman Homayoun
Avesta Sasan
AAMLOOD
58
1
0
07 Apr 2022
Previous
123...192021...545556
Next