ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Adversarial Attacks and Mitigation for Anomaly Detectors of
  Cyber-Physical Systems
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems
Yifan Jia
Jingyi Wang
Christopher M. Poskitt
Sudipta Chattopadhyay
Jun Sun
Yuqi Chen
AAML
75
29
0
22 May 2021
Adversarially robust change point detection
Adversarially robust change point detection
Mengchu Li
Yi Yu
AAML
62
10
0
21 May 2021
Local Aggressive Adversarial Attacks on 3D Point Cloud
Local Aggressive Adversarial Attacks on 3D Point Cloud
Yiming Sun
F. Chen
Zhiyu Chen
Mingjie Wang
3DPCAAML
61
16
0
19 May 2021
Adversarial Examples Detection with Bayesian Neural Network
Adversarial Examples Detection with Bayesian Neural Network
Yao Li
Tongyi Tang
Cho-Jui Hsieh
T. C. Lee
GANAAML
69
3
0
18 May 2021
On the Robustness of Domain Constraints
On the Robustness of Domain Constraints
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Yohan Beugin
Mike Weisman
Patrick McDaniel
AAMLOOD
88
26
0
18 May 2021
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Siyue Wang
Xiao Wang
Pin-Yu Chen
Pu Zhao
Xue Lin
AAML
69
2
0
14 May 2021
Salient Feature Extractor for Adversarial Defense on Deep Neural
  Networks
Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Jinyin Chen
Ruoxi Chen
Haibin Zheng
Zhaoyan Ming
Wenrong Jiang
Chen Cui
AAML
44
11
0
14 May 2021
AVA: Adversarial Vignetting Attack against Visual Recognition
AVA: Adversarial Vignetting Attack against Visual Recognition
Binyu Tian
Felix Juefei Xu
Qing Guo
Xiaofei Xie
Xiaohong Li
Yang Liu
AAML
73
33
0
12 May 2021
Improving Adversarial Transferability with Gradient Refining
Improving Adversarial Transferability with Gradient Refining
Guoqiu Wang
Huanqian Yan
Yingjie Guo
Xingxing Wei
AAML
60
8
0
11 May 2021
Adversarial examples attack based on random warm restart mechanism and
  improved Nesterov momentum
Adversarial examples attack based on random warm restart mechanism and improved Nesterov momentum
Tian-zhou Li
AAML
35
1
0
10 May 2021
Learning Image Attacks toward Vision Guided Autonomous Vehicles
Learning Image Attacks toward Vision Guided Autonomous Vehicles
Hyung-Jin Yoon
H. Jafarnejadsani
P. Voulgaris
AAML
34
3
0
09 May 2021
Incompatibility Clustering as a Defense Against Backdoor Poisoning
  Attacks
Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks
Charles Jin
Melinda Sun
Martin Rinard
AAML
16
6
0
08 May 2021
Chameleon: A Semi-AutoML framework targeting quick and scalable
  development and deployment of production-ready ML systems for SMEs
Chameleon: A Semi-AutoML framework targeting quick and scalable development and deployment of production-ready ML systems for SMEs
Johannes Otterbach
Thomas Wollmann
37
1
0
08 May 2021
The future of human-AI collaboration: a taxonomy of design knowledge for
  hybrid intelligence systems
The future of human-AI collaboration: a taxonomy of design knowledge for hybrid intelligence systems
Dominik Dellermann
A. Calma
Nikolaus Lipusch
Thorsten Weber
Sascha Weigel
P. Ebel
HAI
81
186
0
07 May 2021
Understanding Catastrophic Overfitting in Adversarial Training
Understanding Catastrophic Overfitting in Adversarial Training
Peilin Kang
Seyed-Mohsen Moosavi-Dezfooli
AAML
63
16
0
06 May 2021
Dynamic Defense Approach for Adversarial Robustness in Deep Neural
  Networks via Stochastic Ensemble Smoothed Model
Dynamic Defense Approach for Adversarial Robustness in Deep Neural Networks via Stochastic Ensemble Smoothed Model
Ruoxi Qin
Linyuan Wang
Xing-yuan Chen
Xuehui Du
Bin Yan
AAML
64
5
0
06 May 2021
A Simple and Strong Baseline for Universal Targeted Attacks on Siamese
  Visual Tracking
A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking
Zhenbang Li
Yaya Shi
Jin Gao
Shaoru Wang
Bing Li
Pengpeng Liang
Weiming Hu
AAML
93
27
0
06 May 2021
Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and
  Fault-Injection Attacks
Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Faiq Khalid
Muhammad Abdullah Hanif
Mohamed Bennai
AAMLSILM
76
9
0
05 May 2021
Physical world assistive signals for deep neural network classifiers --
  neither defense nor attack
Physical world assistive signals for deep neural network classifiers -- neither defense nor attack
Camilo Pestana
Wei Liu
D. Glance
R. Owens
Ajmal Mian
AAML
21
0
0
03 May 2021
A survey on VQA_Datasets and Approaches
A survey on VQA_Datasets and Approaches
Yeyun Zou
Qiyu Xie
81
18
0
02 May 2021
Multi-Robot Coordination and Planning in Uncertain and Adversarial
  Environments
Multi-Robot Coordination and Planning in Uncertain and Adversarial Environments
Lifeng Zhou
Pratap Tokekar
107
44
0
02 May 2021
A Perceptual Distortion Reduction Framework: Towards Generating
  Adversarial Examples with High Perceptual Quality and Attack Success Rate
A Perceptual Distortion Reduction Framework: Towards Generating Adversarial Examples with High Perceptual Quality and Attack Success Rate
Ruijie Yang
Yunhong Wang
Ruikui Wang
Yuanfang Guo
AAMLDiffM
38
1
0
01 May 2021
Adversarial Example Detection for DNN Models: A Review and Experimental
  Comparison
Adversarial Example Detection for DNN Models: A Review and Experimental Comparison
Ahmed Aldahdooh
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
239
128
0
01 May 2021
Black-box adversarial attacks using Evolution Strategies
Black-box adversarial attacks using Evolution Strategies
Hao Qiu
Leonardo Lucio Custode
Giovanni Iacca
AAML
78
18
0
30 Apr 2021
GasHis-Transformer: A Multi-scale Visual Transformer Approach for
  Gastric Histopathological Image Detection
GasHis-Transformer: A Multi-scale Visual Transformer Approach for Gastric Histopathological Image Detection
Hao Chen
Chen Li
Ge Wang
Xirong Li
M. Rahaman
...
Yixin Li
Wanli Liu
Changhao Sun
Shiliang Ai
M. Grzegorzek
ViTMedIm
102
193
0
29 Apr 2021
Inspect, Understand, Overcome: A Survey of Practical Methods for AI
  Safety
Inspect, Understand, Overcome: A Survey of Practical Methods for AI Safety
Sebastian Houben
Stephanie Abrecht
Maram Akila
Andreas Bär
Felix Brockherde
...
Serin Varghese
Michael Weber
Sebastian J. Wirkert
Tim Wirtz
Matthias Woehrle
AAML
130
58
0
29 Apr 2021
AdvHaze: Adversarial Haze Attack
AdvHaze: Adversarial Haze Attack
Ruijun Gao
Qing Guo
Felix Juefei Xu
Hongkai Yu
Wei Feng
AAML
100
30
0
28 Apr 2021
Delving into Data: Effectively Substitute Training for Black-box Attack
Delving into Data: Effectively Substitute Training for Black-box Attack
Wenxuan Wang
Bangjie Yin
Taiping Yao
Li Zhang
Yanwei Fu
Shouhong Ding
Jilin Li
Feiyue Huang
Xiangyang Xue
AAML
110
65
0
26 Apr 2021
3D Adversarial Attacks Beyond Point Cloud
3D Adversarial Attacks Beyond Point Cloud
Jinlai Zhang
Lyujie Chen
Binbin Liu
Bojun Ouyang
Qizhi Xie
Jihong Zhu
Weiming Li
Yanmei Meng
3DPC
79
41
0
25 Apr 2021
Making Generated Images Hard To Spot: A Transferable Attack On Synthetic
  Image Detectors
Making Generated Images Hard To Spot: A Transferable Attack On Synthetic Image Detectors
Xinwei Zhao
Matthew C. Stamm
AAML
103
4
0
25 Apr 2021
Random Noise Defense Against Query-Based Black-Box Attacks
Random Noise Defense Against Query-Based Black-Box Attacks
Zeyu Qin
Yanbo Fan
H. Zha
Baoyuan Wu
AAML
137
60
0
23 Apr 2021
Performance Evaluation of Adversarial Attacks: Discrepancies and
  Solutions
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Jing Wu
Mingyi Zhou
Ce Zhu
Yipeng Liu
Mehrtash Harandi
Li Li
AAML
107
11
0
22 Apr 2021
MixDefense: A Defense-in-Depth Framework for Adversarial Example
  Detection Based on Statistical and Semantic Analysis
MixDefense: A Defense-in-Depth Framework for Adversarial Example Detection Based on Statistical and Semantic Analysis
Yijun Yang
Ruiyuan Gao
Yu Li
Qiuxia Lai
Qiang Xu
AAML
39
1
0
20 Apr 2021
Adversarial Training for Deep Learning-based Intrusion Detection Systems
Adversarial Training for Deep Learning-based Intrusion Detection Systems
Islam Debicha
Thibault Debatty
Jean-Michel Dricot
Wim Mees
AAML
31
19
0
20 Apr 2021
Does enhanced shape bias improve neural network robustness to common
  corruptions?
Does enhanced shape bias improve neural network robustness to common corruptions?
Chaithanya Kumar Mummadi
Ranjitha Subramaniam
Robin Hutmacher
Julien Vitay
Volker Fischer
J. H. Metzen
107
40
0
20 Apr 2021
Staircase Sign Method for Boosting Adversarial Attacks
Staircase Sign Method for Boosting Adversarial Attacks
Qilong Zhang
Xiaosu Zhu
Jingkuan Song
Lianli Gao
Heng Tao Shen
AAML
94
13
0
20 Apr 2021
LAFEAT: Piercing Through Adversarial Defenses with Latent Features
LAFEAT: Piercing Through Adversarial Defenses with Latent Features
Yunrui Yu
Xitong Gao
Chengzhong Xu
AAMLFedML
91
46
0
19 Apr 2021
Direction-Aggregated Attack for Transferable Adversarial Examples
Direction-Aggregated Attack for Transferable Adversarial Examples
Tianjin Huang
Vlado Menkovski
Yulong Pei
Yuhao Wang
Mykola Pechenizkiy
AAML
78
15
0
19 Apr 2021
UPB at SemEval-2021 Task 5: Virtual Adversarial Training for Toxic Spans
  Detection
UPB at SemEval-2021 Task 5: Virtual Adversarial Training for Toxic Spans Detection
Andrei Paraschiv
Dumitru-Clementin Cercel
M. Dascalu
63
1
0
17 Apr 2021
Fashion-Guided Adversarial Attack on Person Segmentation
Fashion-Guided Adversarial Attack on Person Segmentation
Marc Treu
Trung-Nghia Le
H. Nguyen
Junichi Yamagishi
Isao Echizen
AAML
61
13
0
17 Apr 2021
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure
  DNN Accelerators
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
AAMLMQ
68
18
0
16 Apr 2021
Towards Variable-Length Textual Adversarial Attacks
Towards Variable-Length Textual Adversarial Attacks
Junliang Guo
Zhirui Zhang
Linlin Zhang
Linli Xu
Boxing Chen
Enhong Chen
Weihua Luo
AAML
145
6
0
16 Apr 2021
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Xingxing Wei
Yingjie Guo
Jie Yu
AAML
85
124
0
14 Apr 2021
Thief, Beware of What Get You There: Towards Understanding Model
  Extraction Attack
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Xinyi Zhang
Chengfang Fang
Jie Shi
MIACVMLAUSILM
98
16
0
13 Apr 2021
Instagram Filter Removal on Fashionable Images
Instagram Filter Removal on Fashionable Images
Furkan Kinli
B. Özcan
Mustafa Furkan Kıraç
128
11
0
11 Apr 2021
Relating Adversarially Robust Generalization to Flat Minima
Relating Adversarially Robust Generalization to Flat Minima
David Stutz
Matthias Hein
Bernt Schiele
OOD
105
67
0
09 Apr 2021
Beyond Categorical Label Representations for Image Classification
Beyond Categorical Label Representations for Image Classification
Boyuan Chen
Yu Li
Sunand Raghupathi
Hod Lipson
SSL
76
2
0
06 Apr 2021
Adaptive Clustering of Robust Semantic Representations for Adversarial
  Image Purification
Adaptive Clustering of Robust Semantic Representations for Adversarial Image Purification
S. Silva
Arun Das
I. Scarff
Peyman Najafirad
AAML
54
1
0
05 Apr 2021
Reliably fast adversarial training via latent adversarial perturbation
Reliably fast adversarial training via latent adversarial perturbation
Geon Yeong Park
Sang Wan Lee
AAML
73
28
0
04 Apr 2021
Defending Against Image Corruptions Through Adversarial Augmentations
Defending Against Image Corruptions Through Adversarial Augmentations
D. A. Calian
Florian Stimberg
Olivia Wiles
Sylvestre-Alvise Rebuffi
András Gyorgy
Timothy A. Mann
Sven Gowal
AAML
84
41
0
02 Apr 2021
Previous
123...272829...545556
Next