ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
GCP: Guarded Collaborative Perception with Spatial-Temporal Aware Malicious Agent Detection
Yihang Tao
Senkang Hu
Yue Hu
Haonan An
Hangcheng Cao
Yuguang Fang
AAML
119
1
0
05 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
179
0
0
04 Jan 2025
Boosting Adversarial Transferability with Spatial Adversarial Alignment
Zhaoyu Chen
Haijing Guo
Kaixun Jiang
Jiyuan Fu
Xinyu Zhou
Dingkang Yang
Hao Tang
Yue Liu
Wenqiang Zhang
AAML
69
0
0
03 Jan 2025
Region-Guided Attack on the Segment Anything Model (SAM)
Region-Guided Attack on the Segment Anything Model (SAM)
Xiaoliang Liu
Furao Shen
Jian Zhao
AAML
163
0
0
03 Jan 2025
Familiarity-Based Open-Set Recognition Under Adversarial Attacks
Familiarity-Based Open-Set Recognition Under Adversarial Attacks
Philip Enevoldsen
Christian Gundersen
Nico Lang
Serge Belongie
Christian Igel
138
1
0
03 Jan 2025
AIM: Additional Image Guided Generation of Transferable Adversarial Attacks
Teng Li
Xingjun Ma
Yu-Gang Jiang
AAMLDiffM
135
0
0
03 Jan 2025
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search
Zhaohui Wang
Min Zhang
Jingran Yang
Bojie Shao
Min Zhang
80
5
0
31 Dec 2024
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
160
1
0
31 Dec 2024
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Hui Zeng
Sanshuai Cui
Biwei Chen
Anjie Peng
AAML
121
0
0
31 Dec 2024
Attribution for Enhanced Explanation with Transferable Adversarial
  eXploration
Attribution for Enhanced Explanation with Transferable Adversarial eXploration
Zhiyu Zhu
Jiayu Zhang
Zhibo Jin
Huaming Chen
Jianlong Zhou
Fang Chen
AAMLViT
88
0
0
27 Dec 2024
Central limit theorems for vector-valued composite functionals with
  smoothing and applications
Central limit theorems for vector-valued composite functionals with smoothing and applications
Huhui Chen
Darinka Dentcheva
Yang Lin
Gregory J. Stock
109
0
0
26 Dec 2024
AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF
  Models
AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF Models
Tommy Nguyen
Mehmet Ergezer
Christian Green
136
0
0
18 Dec 2024
Targeted View-Invariant Adversarial Perturbations for 3D Object
  Recognition
Targeted View-Invariant Adversarial Perturbations for 3D Object Recognition
Christian Green
Mehmet Ergezer
Abdurrahman Zeybey
AAML
108
0
0
17 Dec 2024
Adversarially robust generalization theory via Jacobian regularization
  for deep neural networks
Adversarially robust generalization theory via Jacobian regularization for deep neural networks
Dongya Wu
Xin Li
AAML
107
0
0
17 Dec 2024
Towards Adversarial Robustness of Model-Level Mixture-of-Experts
  Architectures for Semantic Segmentation
Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation
Svetlana Pavlitska
Enrico Eisen
J. Marius Zöllner
AAMLUQCVMoE
176
1
0
16 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffMAAML
203
1
0
16 Dec 2024
Are Language Models Agnostic to Linguistically Grounded Perturbations? A
  Case Study of Indic Languages
Are Language Models Agnostic to Linguistically Grounded Perturbations? A Case Study of Indic Languages
Poulami Ghosh
Raj Dabre
Pushpak Bhattacharyya
AAML
120
0
0
14 Dec 2024
Safety Monitoring of Machine Learning Perception Functions: a Survey
Safety Monitoring of Machine Learning Perception Functions: a Survey
Raul Sena Ferreira
Joris Guérin
Kevin Delmas
Jérémie Guiochet
H. Waeselynck
121
0
0
09 Dec 2024
Hijacking Vision-and-Language Navigation Agents with Adversarial
  Environmental Attacks
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks
Zijiao Yang
Xiangxi Shi
Eric Slyman
Stefan Lee
AAML
115
1
0
03 Dec 2024
Sustainable Self-evolution Adversarial Training
Sustainable Self-evolution Adversarial Training
Wenxuan Wang
Chenglei Wang
Huihui Qi
Menghao Ye
Xuelin Qian
Peng Wang
Yanning Zhang
AAML
137
0
0
03 Dec 2024
The Evolution and Future Perspectives of Artificial Intelligence Generated Content
The Evolution and Future Perspectives of Artificial Intelligence Generated Content
Chengzhang Zhu
Luobin Cui
Ying Tang
Jiacun Wang
161
1
0
02 Dec 2024
DiffPatch: Generating Customizable Adversarial Patches using Diffusion Models
DiffPatch: Generating Customizable Adversarial Patches using Diffusion Models
Zhixiang Wang
Guangnan Ye
Xinyu Wang
Siheng Chen
Ziyi Wang
Xingjun Ma
Yu-Gang Jiang
AAMLDiffM
199
0
0
02 Dec 2024
Lightweight Contenders: Navigating Semi-Supervised Text Mining through
  Peer Collaboration and Self Transcendence
Lightweight Contenders: Navigating Semi-Supervised Text Mining through Peer Collaboration and Self Transcendence
Qianren Mao
Weifeng Jiang
Qingbin Liu
Chenghua Lin
Qian Li
Xianqing Wen
Jianxin Li
Jinhu Lu
108
0
0
01 Dec 2024
Adversarial Training in Low-Label Regimes with Margin-Based
  Interpolation
Adversarial Training in Low-Label Regimes with Margin-Based Interpolation
Tian Ye
Rajgopal Kannan
Viktor Prasanna
AAML
88
0
0
27 Nov 2024
RED: Robust Environmental Design
RED: Robust Environmental Design
Jinghan Yan
AAML
100
0
0
26 Nov 2024
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning
Zhen Sun
Tianshuo Cong
Yule Liu
Chenhao Lin
Xinlei He
Rongmao Chen
Xingshuo Han
Xinyi Huang
AAML
172
6
0
26 Nov 2024
A Tunable Despeckling Neural Network Stabilized via Diffusion Equation
A Tunable Despeckling Neural Network Stabilized via Diffusion Equation
Yi Ran
Zhichang Guo
Jia Li
Yao Li
Martin Burger
Boying Wu
DiffM
103
0
0
24 Nov 2024
Improving Transferable Targeted Attacks with Feature Tuning Mixup
Improving Transferable Targeted Attacks with Feature Tuning Mixup
K. Liang
Xuelong Dai
Yanjie Li
Dong Wang
Bin Xiao
AAML
525
0
0
23 Nov 2024
Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Yong Xie
Weijie Zheng
Hanxun Huang
Guangnan Ye
Xingjun Ma
AAML
170
1
0
20 Nov 2024
Exploring adversarial robustness of JPEG AI: methodology, comparison and new methods
Egor Kovalev
Georgii Bychkov
Khaled Abud
A. Gushchin
Anna Chistyakova
Sergey Lavrushkin
D. Vatolin
Anastasia Antsiferova
AAML
175
2
0
18 Nov 2024
Face De-identification: State-of-the-art Methods and Comparative Studies
Face De-identification: State-of-the-art Methods and Comparative Studies
Jingyi Cao
Xiangyi Chen
Bo Liu
Ming Ding
Rong Xie
Li Song
Zhu Li
Wenjun Zhang
PICV
91
2
0
15 Nov 2024
Transferable Adversarial Attacks against ASR
Transferable Adversarial Attacks against ASR
Xiaoxue Gao
Zexin Li
Yiming Chen
Cong Liu
Haoyang Li
AAML
57
1
0
14 Nov 2024
Adversarial Detection with a Dynamically Stable System
Adversarial Detection with a Dynamically Stable System
Xiaowei Long
Jie Lin
Xiangyuan Yang
AAML
74
0
0
11 Nov 2024
Trustworthy Federated Learning: Privacy, Security, and Beyond
Trustworthy Federated Learning: Privacy, Security, and Beyond
Chunlu Chen
Ji Liu
Haowen Tan
Xingjian Li
Kevin I-Kai Wang
Peng Li
Kouichi Sakurai
Dejing Dou
FedML
105
11
0
03 Nov 2024
A Coverage-Guided Testing Framework for Quantum Neural Networks
A Coverage-Guided Testing Framework for Quantum Neural Networks
Minqi Shao
Jianjun Zhao
AAML
108
1
0
03 Nov 2024
Protecting Feed-Forward Networks from Adversarial Attacks Using
  Predictive Coding
Protecting Feed-Forward Networks from Adversarial Attacks Using Predictive Coding
Ehsan Ganjidoost
Jeff Orchard
AAML
47
0
0
31 Oct 2024
Longitudinal Mammogram Exam-based Breast Cancer Diagnosis Models:
  Vulnerability to Adversarial Attacks
Longitudinal Mammogram Exam-based Breast Cancer Diagnosis Models: Vulnerability to Adversarial Attacks
Zhengbo Zhou
Degan Hao
Dooman Arefan
M. Zuley
J. Sumkin
Shandong Wu
AAML
110
0
0
29 Oct 2024
Deep Learning Based Dense Retrieval: A Comparative Study
Deep Learning Based Dense Retrieval: A Comparative Study
Ming Zhong
Zhizhi Wu
Nanako Honda
AAML
24
0
0
27 Oct 2024
Attacks against Abstractive Text Summarization Models through Lead Bias
  and Influence Functions
Attacks against Abstractive Text Summarization Models through Lead Bias and Influence Functions
Poojitha Thota
Shirin Nilizadeh
69
2
0
26 Oct 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAMLSILM
121
6
0
26 Oct 2024
Detecting Adversarial Examples
Detecting Adversarial Examples
Furkan Mumcu
Yasin Yilmaz
AAML
60
2
0
22 Oct 2024
SLIC: Secure Learned Image Codec through Compressed Domain Watermarking
  to Defend Image Manipulation
SLIC: Secure Learned Image Codec through Compressed Domain Watermarking to Defend Image Manipulation
Chen-Hsiu Huang
Ja-Ling Wu
45
1
0
19 Oct 2024
Adversarial Training: A Survey
Adversarial Training: A Survey
Mengnan Zhao
Lihe Zhang
Jingwen Ye
Huchuan Lu
Baocai Yin
Xinchao Wang
AAML
84
1
0
19 Oct 2024
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in
  Frequency Domain
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency Domain
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
101
1
0
16 Oct 2024
Investigation of Speaker Representation for Target-Speaker Speech
  Processing
Investigation of Speaker Representation for Target-Speaker Speech Processing
Takanori Ashihara
Takafumi Moriya
Shota Horiguchi
Junyi Peng
Tsubasa Ochiai
Marc Delcroix
Kohei Matsuura
Hiroshi Sato
66
1
0
15 Oct 2024
Automatically Generating Visual Hallucination Test Cases for Multimodal
  Large Language Models
Automatically Generating Visual Hallucination Test Cases for Multimodal Large Language Models
Zhongye Liu
Hongbin Liu
Yuepeng Hu
Zedian Shao
Neil Zhenqiang Gong
VLMMLLM
51
0
0
15 Oct 2024
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object
  Detectors
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object Detectors
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
AAML
105
1
0
14 Oct 2024
UnSeg: One Universal Unlearnable Example Generator is Enough against All
  Image Segmentation
UnSeg: One Universal Unlearnable Example Generator is Enough against All Image Segmentation
Ye Sun
Hao Zhang
Tiehua Zhang
Xingjun Ma
Yu-Gang Jiang
VLM
87
4
0
13 Oct 2024
Robust 3D Point Clouds Classification based on Declarative Defenders
Robust 3D Point Clouds Classification based on Declarative Defenders
Kaidong Li
Tianxiao Zhang
Cuncong Zhong
Zizhuo Zhang
G. Wang
3DPC
74
1
0
13 Oct 2024
S$^4$ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
S4^44ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
381
0
0
13 Oct 2024
Previous
123456...545556
Next