ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
79
5
0
06 Apr 2022
Adversarially robust segmentation models learn perceptually-aligned
  gradients
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
29
0
0
03 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
DST: Dynamic Substitute Training for Data-free Black-box Attack
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OODAAML
56
18
0
03 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
95
9
0
02 Apr 2022
Scalable Whitebox Attacks on Tree-based Models
Scalable Whitebox Attacks on Tree-based Models
Giuseppe Castiglione
G. Ding
Masoud Hashemi
C. Srinivasa
Ga Wu
AAML
28
1
0
31 Mar 2022
Improving Adversarial Transferability via Neuron Attribution-Based
  Attacks
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Jianping Zhang
Weibin Wu
Jen-tse Huang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
100
136
0
31 Mar 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
87
44
0
30 Mar 2022
NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image
  Caption Generation Models
NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models
Simin Chen
Zihe Song
Mirazul Haque
Cong Liu
Wei Yang
72
42
0
29 Mar 2022
Boosting Black-Box Adversarial Attacks with Meta Learning
Boosting Black-Box Adversarial Attacks with Meta Learning
Junjie Fu
Jian Sun
Chongqing
AAML
34
4
0
28 Mar 2022
A Survey of Robust Adversarial Training in Pattern Recognition:
  Fundamental, Theory, and Methodologies
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
Zhuang Qian
Kaizhu Huang
Qiufeng Wang
Xu-Yao Zhang
OODAAMLObjD
128
73
0
26 Mar 2022
Enhancing Transferability of Adversarial Examples with Spatial Momentum
Enhancing Transferability of Adversarial Examples with Spatial Momentum
Guoqiu Wang
Huanqian Yan
Xingxing Wei
AAML
74
9
0
25 Mar 2022
A Comparative Survey of Deep Active Learning
A Comparative Survey of Deep Active Learning
Xueying Zhan
Qingzhong Wang
Kuan-Hao Huang
Haoyi Xiong
Dejing Dou
Antoni B. Chan
FedMLHAI
138
113
0
25 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
114
5
0
25 Mar 2022
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep
  Neural Networks
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks
Xiaofei Xie
Tianlin Li
Jian-Xun Wang
Lei Ma
Qing Guo
Felix Juefei Xu
Yang Liu
AAML
87
55
0
24 Mar 2022
Enhancing Classifier Conservativeness and Robustness by Polynomiality
Enhancing Classifier Conservativeness and Robustness by Polynomiality
Ziqi Wang
Marco Loog
AAML
46
3
0
23 Mar 2022
Powerful Physical Adversarial Examples Against Practical Face
  Recognition Systems
Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Inderjeet Singh
Toshinori Araki
Kazuya Kakizaki
AAML
98
13
0
23 Mar 2022
Making DeepFakes more spurious: evading deep face forgery detection via
  trace removal attack
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Chi Liu
Huajie Chen
Tianqing Zhu
Jun Zhang
Wanlei Zhou
AAML
69
24
0
22 Mar 2022
Efficient Neural Network Analysis with Sum-of-Infeasibilities
Efficient Neural Network Analysis with Sum-of-Infeasibilities
Haoze Wu
Aleksandar Zeljić
Guy Katz
Clark W. Barrett
AAML
101
31
0
19 Mar 2022
Adversarial Defense via Image Denoising with Chaotic Encryption
Adversarial Defense via Image Denoising with Chaotic Encryption
Shi Hu
Eric T. Nalisnick
Max Welling
49
2
0
19 Mar 2022
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on
  Deep Learning-based Video Compression
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression
Jung-Woo Chang
Mojan Javaheripi
Seira Hidano
F. Koushanfar
91
8
0
18 Mar 2022
Leveraging Adversarial Examples to Quantify Membership Information
  Leakage
Leveraging Adversarial Examples to Quantify Membership Information Leakage
Ganesh Del Grosso
Hamid Jalalzai
Georg Pichler
C. Palamidessi
Pablo Piantanida
MIACV
77
23
0
17 Mar 2022
Improving the Transferability of Targeted Adversarial Examples through
  Object-Based Diverse Input
Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input
Junyoung Byun
Seungju Cho
Myung-Joon Kwon
Heeseon Kim
Changick Kim
AAMLDiffM
63
70
0
17 Mar 2022
On the Convergence of Certified Robust Training with Interval Bound
  Propagation
On the Convergence of Certified Robust Training with Interval Bound Propagation
Yihan Wang
Zhouxing Shi
Quanquan Gu
Cho-Jui Hsieh
62
9
0
16 Mar 2022
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial
  Attacks Using Hyper-Dimensional Computing
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing
Onat Gungor
Tajana Simunic
Baris Aksanli
AAML
24
9
0
14 Mar 2022
Defending Against Adversarial Attack in ECG Classification with
  Adversarial Distillation Training
Defending Against Adversarial Attack in ECG Classification with Adversarial Distillation Training
Jiahao Shao
Shijia Geng
Zhaoji Fu
Wei-Zhao Xu
Tong Liu
linda Qiao
AAML
50
4
0
14 Mar 2022
Model Inversion Attack against Transfer Learning: Inverting a Model
  without Accessing It
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Dayong Ye
Huiqiang Chen
Shuai Zhou
Tianqing Zhu
Wanlei Zhou
S. Ji
MIACV
83
6
0
13 Mar 2022
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based
  Prior
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Yinpeng Dong
Shuyu Cheng
Tianyu Pang
Hang Su
Jun Zhu
AAML
62
60
0
13 Mar 2022
Enhancing Adversarial Training with Second-Order Statistics of Weights
Enhancing Adversarial Training with Second-Order Statistics of Weights
Gao Jin
Xinping Yi
Wei Huang
S. Schewe
Xiaowei Huang
AAML
89
48
0
11 Mar 2022
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Ye Liu
Yaya Cheng
Lianli Gao
Xianglong Liu
Qilong Zhang
Jingkuan Song
AAML
109
61
0
10 Mar 2022
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Cheng Luo
Qinliang Lin
Weicheng Xie
Bizhu Wu
Jinheng Xie
Linlin Shen
AAML
123
105
0
10 Mar 2022
Defending Black-box Skeleton-based Human Activity Classifiers
Defending Black-box Skeleton-based Human Activity Classifiers
He Wang
Yunfeng Diao
Zichang Tan
G. Guo
AAML
133
10
0
09 Mar 2022
Controllable Evaluation and Generation of Physical Adversarial Patch on
  Face Recognition
Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Xiaohu Yang
Yinpeng Dong
Tianyu Pang
Zihao Xiao
Hang Su
Junyi Zhu
CVBMAAML
94
11
0
09 Mar 2022
Machine Learning in NextG Networks via Generative Adversarial Networks
Machine Learning in NextG Networks via Generative Adversarial Networks
E. Ayanoglu
Kemal Davaslioglu
Y. Sagduyu
GAN
67
34
0
09 Mar 2022
Shadows can be Dangerous: Stealthy and Effective Physical-world
  Adversarial Attack by Natural Phenomenon
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon
Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
AAML
153
152
0
08 Mar 2022
Adversarial Texture for Fooling Person Detectors in the Physical World
Adversarial Texture for Fooling Person Detectors in the Physical World
Zhan Hu
Siyuan Huang
Xiaopei Zhu
Gang Hua
Bo Zhang
Xiaolin Hu
AAML
77
109
0
07 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
59
2
0
07 Mar 2022
Fidelity of Interpretability Methods and Perturbation Artifacts in
  Neural Networks
Fidelity of Interpretability Methods and Perturbation Artifacts in Neural Networks
L. Brocki
N. C. Chung
AAML
58
4
0
06 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
109
1
0
04 Mar 2022
Ensemble Methods for Robust Support Vector Machines using Integer
  Programming
Ensemble Methods for Robust Support Vector Machines using Integer Programming
Jannis Kurtz
21
1
0
03 Mar 2022
Enhancing Adversarial Robustness for Deep Metric Learning
Enhancing Adversarial Robustness for Deep Metric Learning
Mo Zhou
Vishal M. Patel
AAML
107
18
0
02 Mar 2022
Detecting Adversarial Perturbations in Multi-Task Perception
Detecting Adversarial Perturbations in Multi-Task Perception
Marvin Klingner
V. Kumar
S. Yogamani
Andreas Bär
Tim Fingscheidt
AAML
74
15
0
02 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial
  Training
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
48
2
0
28 Feb 2022
Evaluating the Adversarial Robustness of Adaptive Test-time Defenses
Evaluating the Adversarial Robustness of Adaptive Test-time Defenses
Francesco Croce
Sven Gowal
T. Brunner
Evan Shelhamer
Matthias Hein
A. Cemgil
TTAAAML
237
70
0
28 Feb 2022
Did AI get more negative recently?
Did AI get more negative recently?
Dominik Beese
Begüm Altunbaş
Görkem Güzeler
Steffen Eger
AILaw
72
4
0
28 Feb 2022
Adversarial robustness of sparse local Lipschitz predictors
Adversarial robustness of sparse local Lipschitz predictors
Ramchandran Muthukumar
Jeremias Sulam
AAML
92
13
0
26 Feb 2022
Attacks and Faults Injection in Self-Driving Agents on the Carla
  Simulator -- Experience Report
Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Niccolò Piazzesi
Massimo Hong
Andrea Ceccarelli
AAML
46
5
0
25 Feb 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
44
3
0
25 Feb 2022
Universal adversarial perturbation for remote sensing images
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
64
5
0
22 Feb 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
90
11
0
21 Feb 2022
Previous
123...202122...545556
Next