Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
v1
v2
v3
v4 (latest)
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,769 papers shown
Title
GCP: Guarded Collaborative Perception with Spatial-Temporal Aware Malicious Agent Detection
Yihang Tao
Senkang Hu
Yue Hu
Haonan An
Hangcheng Cao
Yuguang Fang
AAML
119
1
0
05 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
179
0
0
04 Jan 2025
Boosting Adversarial Transferability with Spatial Adversarial Alignment
Zhaoyu Chen
Haijing Guo
Kaixun Jiang
Jiyuan Fu
Xinyu Zhou
Dingkang Yang
Hao Tang
Yue Liu
Wenqiang Zhang
AAML
69
0
0
03 Jan 2025
Region-Guided Attack on the Segment Anything Model (SAM)
Xiaoliang Liu
Furao Shen
Jian Zhao
AAML
163
0
0
03 Jan 2025
Familiarity-Based Open-Set Recognition Under Adversarial Attacks
Philip Enevoldsen
Christian Gundersen
Nico Lang
Serge Belongie
Christian Igel
138
1
0
03 Jan 2025
AIM: Additional Image Guided Generation of Transferable Adversarial Attacks
Teng Li
Xingjun Ma
Yu-Gang Jiang
AAML
DiffM
135
0
0
03 Jan 2025
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search
Zhaohui Wang
Min Zhang
Jingran Yang
Bojie Shao
Min Zhang
80
5
0
31 Dec 2024
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
160
1
0
31 Dec 2024
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Hui Zeng
Sanshuai Cui
Biwei Chen
Anjie Peng
AAML
121
0
0
31 Dec 2024
Attribution for Enhanced Explanation with Transferable Adversarial eXploration
Zhiyu Zhu
Jiayu Zhang
Zhibo Jin
Huaming Chen
Jianlong Zhou
Fang Chen
AAML
ViT
88
0
0
27 Dec 2024
Central limit theorems for vector-valued composite functionals with smoothing and applications
Huhui Chen
Darinka Dentcheva
Yang Lin
Gregory J. Stock
109
0
0
26 Dec 2024
AdvIRL: Reinforcement Learning-Based Adversarial Attacks on 3D NeRF Models
Tommy Nguyen
Mehmet Ergezer
Christian Green
136
0
0
18 Dec 2024
Targeted View-Invariant Adversarial Perturbations for 3D Object Recognition
Christian Green
Mehmet Ergezer
Abdurrahman Zeybey
AAML
108
0
0
17 Dec 2024
Adversarially robust generalization theory via Jacobian regularization for deep neural networks
Dongya Wu
Xin Li
AAML
107
0
0
17 Dec 2024
Towards Adversarial Robustness of Model-Level Mixture-of-Experts Architectures for Semantic Segmentation
Svetlana Pavlitska
Enrico Eisen
J. Marius Zöllner
AAML
UQCV
MoE
176
1
0
16 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffM
AAML
203
1
0
16 Dec 2024
Are Language Models Agnostic to Linguistically Grounded Perturbations? A Case Study of Indic Languages
Poulami Ghosh
Raj Dabre
Pushpak Bhattacharyya
AAML
120
0
0
14 Dec 2024
Safety Monitoring of Machine Learning Perception Functions: a Survey
Raul Sena Ferreira
Joris Guérin
Kevin Delmas
Jérémie Guiochet
H. Waeselynck
121
0
0
09 Dec 2024
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks
Zijiao Yang
Xiangxi Shi
Eric Slyman
Stefan Lee
AAML
115
1
0
03 Dec 2024
Sustainable Self-evolution Adversarial Training
Wenxuan Wang
Chenglei Wang
Huihui Qi
Menghao Ye
Xuelin Qian
Peng Wang
Yanning Zhang
AAML
137
0
0
03 Dec 2024
The Evolution and Future Perspectives of Artificial Intelligence Generated Content
Chengzhang Zhu
Luobin Cui
Ying Tang
Jiacun Wang
161
1
0
02 Dec 2024
DiffPatch: Generating Customizable Adversarial Patches using Diffusion Models
Zhixiang Wang
Guangnan Ye
Xinyu Wang
Siheng Chen
Ziyi Wang
Xingjun Ma
Yu-Gang Jiang
AAML
DiffM
199
0
0
02 Dec 2024
Lightweight Contenders: Navigating Semi-Supervised Text Mining through Peer Collaboration and Self Transcendence
Qianren Mao
Weifeng Jiang
Qingbin Liu
Chenghua Lin
Qian Li
Xianqing Wen
Jianxin Li
Jinhu Lu
108
0
0
01 Dec 2024
Adversarial Training in Low-Label Regimes with Margin-Based Interpolation
Tian Ye
Rajgopal Kannan
Viktor Prasanna
AAML
88
0
0
27 Nov 2024
RED: Robust Environmental Design
Jinghan Yan
AAML
100
0
0
26 Nov 2024
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning
Zhen Sun
Tianshuo Cong
Yule Liu
Chenhao Lin
Xinlei He
Rongmao Chen
Xingshuo Han
Xinyi Huang
AAML
172
6
0
26 Nov 2024
A Tunable Despeckling Neural Network Stabilized via Diffusion Equation
Yi Ran
Zhichang Guo
Jia Li
Yao Li
Martin Burger
Boying Wu
DiffM
103
0
0
24 Nov 2024
Improving Transferable Targeted Attacks with Feature Tuning Mixup
K. Liang
Xuelong Dai
Yanjie Li
Dong Wang
Bin Xiao
AAML
525
0
0
23 Nov 2024
Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Yong Xie
Weijie Zheng
Hanxun Huang
Guangnan Ye
Xingjun Ma
AAML
170
1
0
20 Nov 2024
Exploring adversarial robustness of JPEG AI: methodology, comparison and new methods
Egor Kovalev
Georgii Bychkov
Khaled Abud
A. Gushchin
Anna Chistyakova
Sergey Lavrushkin
D. Vatolin
Anastasia Antsiferova
AAML
175
2
0
18 Nov 2024
Face De-identification: State-of-the-art Methods and Comparative Studies
Jingyi Cao
Xiangyi Chen
Bo Liu
Ming Ding
Rong Xie
Li Song
Zhu Li
Wenjun Zhang
PICV
91
2
0
15 Nov 2024
Transferable Adversarial Attacks against ASR
Xiaoxue Gao
Zexin Li
Yiming Chen
Cong Liu
Haoyang Li
AAML
57
1
0
14 Nov 2024
Adversarial Detection with a Dynamically Stable System
Xiaowei Long
Jie Lin
Xiangyuan Yang
AAML
74
0
0
11 Nov 2024
Trustworthy Federated Learning: Privacy, Security, and Beyond
Chunlu Chen
Ji Liu
Haowen Tan
Xingjian Li
Kevin I-Kai Wang
Peng Li
Kouichi Sakurai
Dejing Dou
FedML
105
11
0
03 Nov 2024
A Coverage-Guided Testing Framework for Quantum Neural Networks
Minqi Shao
Jianjun Zhao
AAML
108
1
0
03 Nov 2024
Protecting Feed-Forward Networks from Adversarial Attacks Using Predictive Coding
Ehsan Ganjidoost
Jeff Orchard
AAML
47
0
0
31 Oct 2024
Longitudinal Mammogram Exam-based Breast Cancer Diagnosis Models: Vulnerability to Adversarial Attacks
Zhengbo Zhou
Degan Hao
Dooman Arefan
M. Zuley
J. Sumkin
Shandong Wu
AAML
110
0
0
29 Oct 2024
Deep Learning Based Dense Retrieval: A Comparative Study
Ming Zhong
Zhizhi Wu
Nanako Honda
AAML
24
0
0
27 Oct 2024
Attacks against Abstractive Text Summarization Models through Lead Bias and Influence Functions
Poojitha Thota
Shirin Nilizadeh
69
2
0
26 Oct 2024
Transferable Adversarial Attacks on SAM and Its Downstream Models
Song Xia
Wenhan Yang
Yi Yu
Xun Lin
Henghui Ding
Lingyu Duan
Xudong Jiang
AAML
SILM
121
6
0
26 Oct 2024
Detecting Adversarial Examples
Furkan Mumcu
Yasin Yilmaz
AAML
60
2
0
22 Oct 2024
SLIC: Secure Learned Image Codec through Compressed Domain Watermarking to Defend Image Manipulation
Chen-Hsiu Huang
Ja-Ling Wu
45
1
0
19 Oct 2024
Adversarial Training: A Survey
Mengnan Zhao
Lihe Zhang
Jingwen Ye
Huchuan Lu
Baocai Yin
Xinchao Wang
AAML
84
1
0
19 Oct 2024
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency Domain
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
101
1
0
16 Oct 2024
Investigation of Speaker Representation for Target-Speaker Speech Processing
Takanori Ashihara
Takafumi Moriya
Shota Horiguchi
Junyi Peng
Tsubasa Ochiai
Marc Delcroix
Kohei Matsuura
Hiroshi Sato
66
1
0
15 Oct 2024
Automatically Generating Visual Hallucination Test Cases for Multimodal Large Language Models
Zhongye Liu
Hongbin Liu
Yuepeng Hu
Zedian Shao
Neil Zhenqiang Gong
VLM
MLLM
51
0
0
15 Oct 2024
Out-of-Bounding-Box Triggers: A Stealthy Approach to Cheat Object Detectors
Tao Lin
Lijia Yu
Gaojie Jin
Renjue Li
Peng Wu
Lijun Zhang
AAML
105
1
0
14 Oct 2024
UnSeg: One Universal Unlearnable Example Generator is Enough against All Image Segmentation
Ye Sun
Hao Zhang
Tiehua Zhang
Xingjun Ma
Yu-Gang Jiang
VLM
87
4
0
13 Oct 2024
Robust 3D Point Clouds Classification based on Declarative Defenders
Kaidong Li
Tianxiao Zhang
Cuncong Zhong
Zizhuo Zhang
G. Wang
3DPC
74
1
0
13 Oct 2024
S
4
^4
4
ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
381
0
0
13 Oct 2024
Previous
1
2
3
4
5
6
...
54
55
56
Next