Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
v1
v2
v3
v4 (latest)
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,769 papers shown
Title
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
79
5
0
06 Apr 2022
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
29
0
0
03 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OOD
AAML
56
18
0
03 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
95
9
0
02 Apr 2022
Scalable Whitebox Attacks on Tree-based Models
Giuseppe Castiglione
G. Ding
Masoud Hashemi
C. Srinivasa
Ga Wu
AAML
28
1
0
31 Mar 2022
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Jianping Zhang
Weibin Wu
Jen-tse Huang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
100
136
0
31 Mar 2022
Investigating Top-
k
k
k
White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
87
44
0
30 Mar 2022
NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models
Simin Chen
Zihe Song
Mirazul Haque
Cong Liu
Wei Yang
72
42
0
29 Mar 2022
Boosting Black-Box Adversarial Attacks with Meta Learning
Junjie Fu
Jian Sun
Chongqing
AAML
34
4
0
28 Mar 2022
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
Zhuang Qian
Kaizhu Huang
Qiufeng Wang
Xu-Yao Zhang
OOD
AAML
ObjD
128
73
0
26 Mar 2022
Enhancing Transferability of Adversarial Examples with Spatial Momentum
Guoqiu Wang
Huanqian Yan
Xingxing Wei
AAML
74
9
0
25 Mar 2022
A Comparative Survey of Deep Active Learning
Xueying Zhan
Qingzhong Wang
Kuan-Hao Huang
Haoyi Xiong
Dejing Dou
Antoni B. Chan
FedML
HAI
138
113
0
25 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
114
5
0
25 Mar 2022
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks
Xiaofei Xie
Tianlin Li
Jian-Xun Wang
Lei Ma
Qing Guo
Felix Juefei Xu
Yang Liu
AAML
87
55
0
24 Mar 2022
Enhancing Classifier Conservativeness and Robustness by Polynomiality
Ziqi Wang
Marco Loog
AAML
46
3
0
23 Mar 2022
Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Inderjeet Singh
Toshinori Araki
Kazuya Kakizaki
AAML
98
13
0
23 Mar 2022
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Chi Liu
Huajie Chen
Tianqing Zhu
Jun Zhang
Wanlei Zhou
AAML
69
24
0
22 Mar 2022
Efficient Neural Network Analysis with Sum-of-Infeasibilities
Haoze Wu
Aleksandar Zeljić
Guy Katz
Clark W. Barrett
AAML
101
31
0
19 Mar 2022
Adversarial Defense via Image Denoising with Chaotic Encryption
Shi Hu
Eric T. Nalisnick
Max Welling
49
2
0
19 Mar 2022
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression
Jung-Woo Chang
Mojan Javaheripi
Seira Hidano
F. Koushanfar
91
8
0
18 Mar 2022
Leveraging Adversarial Examples to Quantify Membership Information Leakage
Ganesh Del Grosso
Hamid Jalalzai
Georg Pichler
C. Palamidessi
Pablo Piantanida
MIACV
77
23
0
17 Mar 2022
Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input
Junyoung Byun
Seungju Cho
Myung-Joon Kwon
Heeseon Kim
Changick Kim
AAML
DiffM
63
70
0
17 Mar 2022
On the Convergence of Certified Robust Training with Interval Bound Propagation
Yihan Wang
Zhouxing Shi
Quanquan Gu
Cho-Jui Hsieh
62
9
0
16 Mar 2022
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing
Onat Gungor
Tajana Simunic
Baris Aksanli
AAML
24
9
0
14 Mar 2022
Defending Against Adversarial Attack in ECG Classification with Adversarial Distillation Training
Jiahao Shao
Shijia Geng
Zhaoji Fu
Wei-Zhao Xu
Tong Liu
linda Qiao
AAML
50
4
0
14 Mar 2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Dayong Ye
Huiqiang Chen
Shuai Zhou
Tianqing Zhu
Wanlei Zhou
S. Ji
MIACV
83
6
0
13 Mar 2022
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Yinpeng Dong
Shuyu Cheng
Tianyu Pang
Hang Su
Jun Zhu
AAML
62
60
0
13 Mar 2022
Enhancing Adversarial Training with Second-Order Statistics of Weights
Gao Jin
Xinping Yi
Wei Huang
S. Schewe
Xiaowei Huang
AAML
89
48
0
11 Mar 2022
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Ye Liu
Yaya Cheng
Lianli Gao
Xianglong Liu
Qilong Zhang
Jingkuan Song
AAML
109
61
0
10 Mar 2022
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Cheng Luo
Qinliang Lin
Weicheng Xie
Bizhu Wu
Jinheng Xie
Linlin Shen
AAML
123
105
0
10 Mar 2022
Defending Black-box Skeleton-based Human Activity Classifiers
He Wang
Yunfeng Diao
Zichang Tan
G. Guo
AAML
133
10
0
09 Mar 2022
Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Xiaohu Yang
Yinpeng Dong
Tianyu Pang
Zihao Xiao
Hang Su
Junyi Zhu
CVBM
AAML
94
11
0
09 Mar 2022
Machine Learning in NextG Networks via Generative Adversarial Networks
E. Ayanoglu
Kemal Davaslioglu
Y. Sagduyu
GAN
67
34
0
09 Mar 2022
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon
Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
AAML
153
152
0
08 Mar 2022
Adversarial Texture for Fooling Person Detectors in the Physical World
Zhan Hu
Siyuan Huang
Xiaopei Zhu
Gang Hua
Bo Zhang
Xiaolin Hu
AAML
77
109
0
07 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
59
2
0
07 Mar 2022
Fidelity of Interpretability Methods and Perturbation Artifacts in Neural Networks
L. Brocki
N. C. Chung
AAML
58
4
0
06 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
109
1
0
04 Mar 2022
Ensemble Methods for Robust Support Vector Machines using Integer Programming
Jannis Kurtz
21
1
0
03 Mar 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Mo Zhou
Vishal M. Patel
AAML
107
18
0
02 Mar 2022
Detecting Adversarial Perturbations in Multi-Task Perception
Marvin Klingner
V. Kumar
S. Yogamani
Andreas Bär
Tim Fingscheidt
AAML
74
15
0
02 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
48
2
0
28 Feb 2022
Evaluating the Adversarial Robustness of Adaptive Test-time Defenses
Francesco Croce
Sven Gowal
T. Brunner
Evan Shelhamer
Matthias Hein
A. Cemgil
TTA
AAML
237
70
0
28 Feb 2022
Did AI get more negative recently?
Dominik Beese
Begüm Altunbaş
Görkem Güzeler
Steffen Eger
AILaw
72
4
0
28 Feb 2022
Adversarial robustness of sparse local Lipschitz predictors
Ramchandran Muthukumar
Jeremias Sulam
AAML
92
13
0
26 Feb 2022
Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Niccolò Piazzesi
Massimo Hong
Andrea Ceccarelli
AAML
46
5
0
25 Feb 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
44
3
0
25 Feb 2022
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
64
5
0
22 Feb 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
90
11
0
21 Feb 2022
Previous
1
2
3
...
20
21
22
...
54
55
56
Next