ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack
PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack
Jie Wang
Z. Yin
Jin Tang
Jing Jiang
Bin Luo
AAML
64
2
0
19 Jan 2021
Attention-Guided Black-box Adversarial Attacks with Large-Scale
  Multiobjective Evolutionary Optimization
Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization
Jie Wang
Z. Yin
Jing Jiang
Yang Du
AAML
101
8
0
19 Jan 2021
Adversarial Interaction Attack: Fooling AI to Misinterpret Human
  Intentions
Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions
Nodens Koren
Qiuhong Ke
Yisen Wang
James Bailey
Xingjun Ma
AAML
46
1
0
17 Jan 2021
Multi-objective Search of Robust Neural Architectures against Multiple
  Types of Adversarial Attacks
Multi-objective Search of Robust Neural Architectures against Multiple Types of Adversarial Attacks
Jia-Wei Liu
Yaochu Jin
AAMLOOD
75
37
0
16 Jan 2021
Context-Aware Image Denoising with Auto-Threshold Canny Edge Detection
  to Suppress Adversarial Perturbation
Context-Aware Image Denoising with Auto-Threshold Canny Edge Detection to Suppress Adversarial Perturbation
Li-Yun Wang
Yeganeh Jalalpour
W. Feng
46
0
0
14 Jan 2021
Image Steganography based on Iteratively Adversarial Samples of A
  Synchronized-directions Sub-image
Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Xinghong Qin
Shunquan Tan
Bin Li
Weixuan Tang
Jiwu Huang
GANAAMLDiffM
16
0
0
13 Jan 2021
Untargeted, Targeted and Universal Adversarial Attacks and Defenses on
  Time Series
Untargeted, Targeted and Universal Adversarial Attacks and Defenses on Time Series
Pradeep Rathore
Arghya Basak
S. Nistala
Venkataramana Runkana
AAML
80
43
0
13 Jan 2021
Unlearnable Examples: Making Personal Data Unexploitable
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
259
195
0
13 Jan 2021
Adversarial Sample Enhanced Domain Adaptation: A Case Study on
  Predictive Modeling with Electronic Health Records
Adversarial Sample Enhanced Domain Adaptation: A Case Study on Predictive Modeling with Electronic Health Records
Yiqin Yu
Pin-Yu Chen
Yuan Zhou
Jing Mei
OOD
32
1
0
13 Jan 2021
Robustness of on-device Models: Adversarial Attack to Deep Learning
  Models on Android Apps
Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps
Yujin Huang
Han Hu
Chunyang Chen
AAMLFedML
115
33
0
12 Jan 2021
Fast Facial Landmark Detection and Applications: A Survey
Fast Facial Landmark Detection and Applications: A Survey
K. Khabarlak
L. Koriashkina
CVBM3DH
100
61
0
12 Jan 2021
Random Transformation of Image Brightness for Adversarial Attack
Random Transformation of Image Brightness for Adversarial Attack
Bo Yang
Kaiyong Xu
Hengjun Wang
Hengwei Zhang
AAML
52
8
0
12 Jan 2021
Adversarial Machine Learning for 5G Communications Security
Adversarial Machine Learning for 5G Communications Security
Y. Sagduyu
T. Erpek
Yi Shi
AAML
85
43
0
07 Jan 2021
Corner case data description and detection
Corner case data description and detection
Tinghui Ouyang
Vicent Sant Marco
Yoshinao Isobe
H. Asoh
Y. Oiwa
Yoshiki Seo
AAML
67
13
0
07 Jan 2021
Adversarial Robustness by Design through Analog Computing and Synthetic
  Gradients
Adversarial Robustness by Design through Analog Computing and Synthetic Gradients
Alessandro Cappelli
Ruben Ohana
Julien Launay
Laurent Meunier
Iacopo Poli
Florent Krzakala
AAML
131
13
0
06 Jan 2021
Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection
  in Neural Networks
Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks
Rachel Sterneck
Abhishek Moitra
Priyadarshini Panda
AAML
32
8
0
05 Jan 2021
Practical Blind Membership Inference Attack via Differential Comparisons
Practical Blind Membership Inference Attack via Differential Comparisons
Bo Hui
Yuchen Yang
Haolin Yuan
Philippe Burlina
Neil Zhenqiang Gong
Yinzhi Cao
MIACV
194
124
0
05 Jan 2021
Robust Machine Learning Systems: Challenges, Current Trends,
  Perspectives, and the Road Ahead
Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead
Mohamed Bennai
Mahum Naseer
T. Theocharides
C. Kyrkou
O. Mutlu
Lois Orosa
Jungwook Choi
OOD
139
101
0
04 Jan 2021
Local Competition and Stochasticity for Adversarial Robustness in Deep
  Learning
Local Competition and Stochasticity for Adversarial Robustness in Deep Learning
Konstantinos P. Panousis
S. Chatzis
Antonios Alexos
Sergios Theodoridis
BDLAAMLOOD
112
19
0
04 Jan 2021
Local Black-box Adversarial Attacks: A Query Efficient Approach
Local Black-box Adversarial Attacks: A Query Efficient Approach
Tao Xiang
Hangcheng Liu
Shangwei Guo
Tianwei Zhang
X. Liao
AAMLMLAU
46
15
0
04 Jan 2021
Patch-wise++ Perturbation for Adversarial Targeted Attacks
Patch-wise++ Perturbation for Adversarial Targeted Attacks
Lianli Gao
Qilong Zhang
Jingkuan Song
Heng Tao Shen
AAML
124
19
0
31 Dec 2020
Beating Attackers At Their Own Games: Adversarial Example Detection
  Using Adversarial Gradient Directions
Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions
Yuhang Wu
Sunpreet S. Arora
Yanhong Wu
Hao Yang
AAML
53
9
0
31 Dec 2020
Temporally-Transferable Perturbations: Efficient, One-Shot Adversarial
  Attacks for Online Visual Object Trackers
Temporally-Transferable Perturbations: Efficient, One-Shot Adversarial Attacks for Online Visual Object Trackers
Krishna Kanth Nakka
Mathieu Salzmann
AAML
33
5
0
30 Dec 2020
Generating Adversarial Examples in Chinese Texts Using Sentence-Pieces
Generating Adversarial Examples in Chinese Texts Using Sentence-Pieces
Linyang Li
Yunfan Shao
Demin Song
Xipeng Qiu
Xuanjing Huang
AAMLGAN
40
7
0
29 Dec 2020
With False Friends Like These, Who Can Notice Mistakes?
With False Friends Like These, Who Can Notice Mistakes?
Lue Tao
Lei Feng
Jinfeng Yi
Songcan Chen
AAML
70
6
0
29 Dec 2020
Enhanced Regularizers for Attributional Robustness
Enhanced Regularizers for Attributional Robustness
A. Sarkar
Anirban Sarkar
V. Balasubramanian
65
16
0
28 Dec 2020
A Simple Fine-tuning Is All You Need: Towards Robust Deep Learning Via
  Adversarial Fine-tuning
A Simple Fine-tuning Is All You Need: Towards Robust Deep Learning Via Adversarial Fine-tuning
Ahmadreza Jeddi
M. Shafiee
A. Wong
AAML
84
40
0
25 Dec 2020
Robustness, Privacy, and Generalization of Adversarial Training
Robustness, Privacy, and Generalization of Adversarial Training
Fengxiang He
Shaopeng Fu
Bohan Wang
Dacheng Tao
125
10
0
25 Dec 2020
Exploring Adversarial Examples via Invertible Neural Networks
Exploring Adversarial Examples via Invertible Neural Networks
Ruqi Bai
S. Bagchi
David I. Inouye
AAML
55
2
0
24 Dec 2020
Improving the Certified Robustness of Neural Networks via Consistency
  Regularization
Improving the Certified Robustness of Neural Networks via Consistency Regularization
Mengting Xu
Tao Zhang
Zhongnian Li
Daoqiang Zhang
AAML
26
0
0
24 Dec 2020
The Translucent Patch: A Physical and Universal Attack on Object
  Detectors
The Translucent Patch: A Physical and Universal Attack on Object Detectors
Alon Zolfi
Moshe Kravchik
Yuval Elovici
A. Shabtai
AAML
67
90
0
23 Dec 2020
Discovering Robust Convolutional Architecture at Targeted Capacity: A
  Multi-Shot Approach
Discovering Robust Convolutional Architecture at Targeted Capacity: A Multi-Shot Approach
Xuefei Ning
Jiaqi Zhao
Wenshuo Li
Tianchen Zhao
Yin Zheng
Huazhong Yang
Yu Wang
AAML
95
5
0
22 Dec 2020
Blurring Fools the Network -- Adversarial Attacks by Feature Peak
  Suppression and Gaussian Blurring
Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Chenchen Zhao
Hao Li
AAML
32
3
0
21 Dec 2020
Exploiting Vulnerability of Pooling in Convolutional Neural Networks by
  Strict Layer-Output Manipulation for Adversarial Attacks
Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Chenchen Zhao
Hao Li
AAML
41
0
0
21 Dec 2020
Hardware and Software Optimizations for Accelerating Deep Neural
  Networks: Survey of Current Trends, Challenges, and the Road Ahead
Hardware and Software Optimizations for Accelerating Deep Neural Networks: Survey of Current Trends, Challenges, and the Road Ahead
Maurizio Capra
Beatrice Bussolino
Alberto Marchisio
Guido Masera
Maurizio Martina
Mohamed Bennai
BDL
134
147
0
21 Dec 2020
On Success and Simplicity: A Second Look at Transferable Targeted
  Attacks
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
167
126
0
21 Dec 2020
ROBY: Evaluating the Robustness of a Deep Model by its Decision
  Boundaries
ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Jinyin Chen
Zhen Wang
Haibin Zheng
Jun Xiao
Zhaoyan Ming
AAML
85
5
0
18 Dec 2020
Semantics and explanation: why counterfactual explanations produce
  adversarial examples in deep neural networks
Semantics and explanation: why counterfactual explanations produce adversarial examples in deep neural networks
Kieran Browne
Ben Swift
AAMLGAN
58
30
0
18 Dec 2020
AdjointBackMap: Reconstructing Effective Decision Hypersurfaces from CNN
  Layers Using Adjoint Operators
AdjointBackMap: Reconstructing Effective Decision Hypersurfaces from CNN Layers Using Adjoint Operators
Qing Wan
Yoonsuck Choe
44
1
0
16 Dec 2020
Exploring Vicinal Risk Minimization for Lightweight Out-of-Distribution
  Detection
Exploring Vicinal Risk Minimization for Lightweight Out-of-Distribution Detection
Deepak Ravikumar
Sangamesh Kodge
Isha Garg
Kaushik Roy
OODD
41
5
0
15 Dec 2020
Adaptive Verifiable Training Using Pairwise Class Similarity
Adaptive Verifiable Training Using Pairwise Class Similarity
Shiqi Wang
Kevin Eykholt
Taesung Lee
Jiyong Jang
Ian Molloy
OOD
33
1
0
14 Dec 2020
Robustness Threats of Differential Privacy
Robustness Threats of Differential Privacy
Nurislam Tursynbek
Aleksandr Petiushko
Ivan Oseledets
AAML
97
14
0
14 Dec 2020
Sparse Multi-Family Deep Scattering Network
Sparse Multi-Family Deep Scattering Network
Romain Cosentino
Randall Balestriero
46
0
0
14 Dec 2020
Achieving Adversarial Robustness Requires An Active Teacher
Achieving Adversarial Robustness Requires An Active Teacher
Chao Ma
Lexing Ying
71
1
0
14 Dec 2020
Dependency Decomposition and a Reject Option for Explainable Models
Dependency Decomposition and a Reject Option for Explainable Models
Jan Kronenberger
Anselm Haselhoff
FAttAAML
67
8
0
11 Dec 2020
Closeness and Uncertainty Aware Adversarial Examples Detection in
  Adversarial Machine Learning
Closeness and Uncertainty Aware Adversarial Examples Detection in Adversarial Machine Learning
Ömer Faruk Tuna
Ferhat Ozgur Catak
M. T. Eskil
AAML
83
11
0
11 Dec 2020
SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image
  Classifiers
SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers
Bingyao Huang
Haibin Ling
AAML
79
20
0
10 Dec 2020
An Empirical Review of Adversarial Defenses
An Empirical Review of Adversarial Defenses
Ayush Goel
AAML
37
0
0
10 Dec 2020
Generating Out of Distribution Adversarial Attack using Latent Space
  Poisoning
Generating Out of Distribution Adversarial Attack using Latent Space Poisoning
Ujjwal Upadhyay
Prerana Mukherjee
78
7
0
09 Dec 2020
Mitigating the Impact of Adversarial Attacks in Very Deep Networks
Mitigating the Impact of Adversarial Attacks in Very Deep Networks
Mohammed Hassanin
Ibrahim Radwan
Nour Moustafa
M. Tahtali
Neeraj Kumar
AAML
35
6
0
08 Dec 2020
Previous
123...303132...545556
Next