ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILM
    AAML
ArXivPDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,498 papers shown
Title
Risk Bounds for Robust Deep Learning
Risk Bounds for Robust Deep Learning
Johannes Lederer
OOD
11
16
0
14 Sep 2020
The Intriguing Relation Between Counterfactual Explanations and
  Adversarial Examples
The Intriguing Relation Between Counterfactual Explanations and Adversarial Examples
Timo Freiesleben
GAN
41
62
0
11 Sep 2020
Fuzzy Unique Image Transformation: Defense Against Adversarial Attacks
  On Deep COVID-19 Models
Fuzzy Unique Image Transformation: Defense Against Adversarial Attacks On Deep COVID-19 Models
A. Tripathi
Ashish Mishra
AAML
MedIm
11
10
0
08 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
33
157
0
08 Sep 2020
Dynamically Computing Adversarial Perturbations for Recurrent Neural
  Networks
Dynamically Computing Adversarial Perturbations for Recurrent Neural Networks
Shankar A. Deka
D. Stipanović
Claire Tomlin
AAML
30
7
0
07 Sep 2020
Detection Defense Against Adversarial Attacks with Saliency Map
Detection Defense Against Adversarial Attacks with Saliency Map
Dengpan Ye
Chuanxi Chen
Changrui Liu
Hao Wang
Shunzhi Jiang
AAML
24
28
0
06 Sep 2020
Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural
  Networks
Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Nilaksh Das
Haekyu Park
Zijie J. Wang
Fred Hohman
Robert Firstman
Emily Rogers
Duen Horng Chau
AAML
28
26
0
05 Sep 2020
Adversarially Robust Neural Architectures
Adversarially Robust Neural Architectures
Minjing Dong
Yanxi Li
Yunhe Wang
Chang Xu
AAML
OOD
42
48
0
02 Sep 2020
Quaternion-Based Self-Attentive Long Short-Term User Preference Encoding
  for Recommendation
Quaternion-Based Self-Attentive Long Short-Term User Preference Encoding for Recommendation
T. Tran
Di You
Kyumin Lee
34
13
0
31 Aug 2020
An Integrated Approach to Produce Robust Models with High Efficiency
An Integrated Approach to Produce Robust Models with High Efficiency
Zhijian Li
Bao Wang
Jack Xin
MQ
AAML
28
3
0
31 Aug 2020
Adversarially Robust Learning via Entropic Regularization
Adversarially Robust Learning via Entropic Regularization
Gauri Jagatap
Ameya Joshi
A. B. Chowdhury
S. Garg
C. Hegde
OOD
35
11
0
27 Aug 2020
Measurement-driven Security Analysis of Imperceptible Impersonation
  Attacks
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Shasha Li
K. Khalil
Yikang Shen
Chengyu Song
S. Krishnamurthy
A. Roy-Chowdhury
A. Swami
AAML
14
2
0
26 Aug 2020
Adversarially Training for Audio Classifiers
Adversarially Training for Audio Classifiers
Raymel Alfonso Sallo
Mohammad Esmaeilpour
P. Cardinal
AAML
12
8
0
26 Aug 2020
An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent
  Generative Adversarial Network
An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network
Chunhui Li
Xingshu Chen
Haizhou Wang
Yu Zhang
Peiming Wang
AAML
11
28
0
26 Aug 2020
Likelihood Landscapes: A Unifying Principle Behind Many Adversarial
  Defenses
Likelihood Landscapes: A Unifying Principle Behind Many Adversarial Defenses
Fu-Huei Lin
Rohit Mittapalli
Prithvijit Chattopadhyay
Daniel Bolya
Judy Hoffman
AAML
46
2
0
25 Aug 2020
An Adversarial Attack Defending System for Securing In-Vehicle Networks
An Adversarial Attack Defending System for Securing In-Vehicle Networks
Yi Li
Jing Lin
Kaiqi Xiong
AAML
33
14
0
25 Aug 2020
Avoiding Negative Side Effects due to Incomplete Knowledge of AI Systems
Avoiding Negative Side Effects due to Incomplete Knowledge of AI Systems
Sandhya Saisubramanian
S. Zilberstein
Ece Kamar
17
21
0
24 Aug 2020
Sampling-based Reachability Analysis: A Random Set Theory Approach with
  Adversarial Sampling
Sampling-based Reachability Analysis: A Random Set Theory Approach with Adversarial Sampling
T. Lew
Marco Pavone
AAML
30
53
0
24 Aug 2020
Delving Deeper into Anti-aliasing in ConvNets
Delving Deeper into Anti-aliasing in ConvNets
Xueyan Zou
Fanyi Xiao
Zhiding Yu
Yong Jae Lee
SupR
30
103
0
21 Aug 2020
A Survey on Assessing the Generalization Envelope of Deep Neural
  Networks: Predictive Uncertainty, Out-of-distribution and Adversarial Samples
A Survey on Assessing the Generalization Envelope of Deep Neural Networks: Predictive Uncertainty, Out-of-distribution and Adversarial Samples
Julia Lust
A. P. Condurache
UQCV
AAML
AI4CE
29
7
0
21 Aug 2020
Addressing Neural Network Robustness with Mixup and Targeted Labeling
  Adversarial Training
Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training
Alfred Laugros
A. Caplier
Matthieu Ospici
AAML
24
19
0
19 Aug 2020
CCA: Exploring the Possibility of Contextual Camouflage Attack on Object
  Detection
CCA: Exploring the Possibility of Contextual Camouflage Attack on Object Detection
Shengnan Hu
Yang Zhang
Sumit Laha
A. Sharma
H. Foroosh
AAML
12
8
0
19 Aug 2020
Improving adversarial robustness of deep neural networks by using
  semantic information
Improving adversarial robustness of deep neural networks by using semantic information
Lina Wang
Rui Tang
Yawei Yue
Xingshu Chen
Wei Wang
Yi Zhu
Xuemei Zeng
AAML
22
14
0
18 Aug 2020
A Deep Dive into Adversarial Robustness in Zero-Shot Learning
A Deep Dive into Adversarial Robustness in Zero-Shot Learning
M. K. Yucel
R. G. Cinbis
P. D. Sahin
VLM
21
7
0
17 Aug 2020
Adversarial Concurrent Training: Optimizing Robustness and Accuracy
  Trade-off of Deep Neural Networks
Adversarial Concurrent Training: Optimizing Robustness and Accuracy Trade-off of Deep Neural Networks
Elahe Arani
F. Sarfraz
Bahram Zonooz
AAML
22
9
0
16 Aug 2020
Semantically Adversarial Learnable Filters
Semantically Adversarial Learnable Filters
Ali Shahin Shamsabadi
Changjae Oh
Andrea Cavallaro
GAN
22
5
0
13 Aug 2020
Trust-Based Cloud Machine Learning Model Selection For Industrial IoT
  and Smart City Services
Trust-Based Cloud Machine Learning Model Selection For Industrial IoT and Smart City Services
Basheer Qolomany
Ihab Mohammed
Ala I. Al-Fuqaha
Mohsen Guizani
Junaid Qadir
15
34
0
11 Aug 2020
Revisiting Adversarially Learned Injection Attacks Against Recommender
  Systems
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems
Jiaxi Tang
Hongyi Wen
Ke Wang
AAML
12
82
0
11 Aug 2020
Enhance CNN Robustness Against Noises for Classification of 12-Lead ECG
  with Variable Length
Enhance CNN Robustness Against Noises for Classification of 12-Lead ECG with Variable Length
Linhai Ma
Liang Liang
21
8
0
08 Aug 2020
Optimizing Information Loss Towards Robust Neural Networks
Optimizing Information Loss Towards Robust Neural Networks
Philip Sperl
Konstantin Böttinger
AAML
21
3
0
07 Aug 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
27
73
0
07 Aug 2020
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
Xiaoguang Han
AAML
12
85
0
05 Aug 2020
Stabilizing Deep Tomographic Reconstruction
Stabilizing Deep Tomographic Reconstruction
Weiwen Wu
Dianlin Hu
W. Cong
Hongming Shan
Shaoyu Wang
Chuang Niu
Pingkun Yan
Hengyong Yu
V. Vardhanabhuti
Ge Wang
OOD
20
10
0
04 Aug 2020
TREND: Transferability based Robust ENsemble Design
TREND: Transferability based Robust ENsemble Design
Deepak Ravikumar
Sangamesh Kodge
Isha Garg
Kaushik Roy
OOD
AAML
21
4
0
04 Aug 2020
Anti-Bandit Neural Architecture Search for Model Defense
Anti-Bandit Neural Architecture Search for Model Defense
Hanlin Chen
Baochang Zhang
Shenjun Xue
Xuan Gong
Hong Liu
Rongrong Ji
David Doermann
AAML
22
33
0
03 Aug 2020
Efficient Adversarial Attacks for Visual Object Tracking
Efficient Adversarial Attacks for Visual Object Tracking
Siyuan Liang
Xingxing Wei
Siyuan Yao
Xiaochun Cao
AAML
8
74
0
01 Aug 2020
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based
  Modulation Classifiers
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers
Brian Kim
Y. Sagduyu
T. Erpek
Kemal Davaslioglu
S. Ulukus
AAML
12
29
0
31 Jul 2020
Physical Adversarial Attack on Vehicle Detector in the Carla Simulator
Physical Adversarial Attack on Vehicle Detector in the Carla Simulator
Tong Wu
Xuefei Ning
Wenshuo Li
Ranran Huang
Huazhong Yang
Yu Wang
AAML
33
49
0
31 Jul 2020
TEAM: We Need More Powerful Adversarial Examples for DNNs
TEAM: We Need More Powerful Adversarial Examples for DNNs
Yaguan Qian
Xi-Ming Zhang
Bin Wang
Wei Li
Zhaoquan Gu
Haijiang Wang
Wassim Swaileh
AAML
33
0
0
31 Jul 2020
vWitness: Certifying Web Page Interactions with Computer Vision
vWitness: Certifying Web Page Interactions with Computer Vision
Shuang He
Lianying Zhao
David Lie
16
1
0
31 Jul 2020
Practical Detection of Trojan Neural Networks: Data-Limited and
  Data-Free Cases
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases
Ren Wang
Gaoyuan Zhang
Sijia Liu
Pin-Yu Chen
Jinjun Xiong
Meng Wang
AAML
33
148
0
31 Jul 2020
Black-box Adversarial Sample Generation Based on Differential Evolution
Black-box Adversarial Sample Generation Based on Differential Evolution
Junyu Lin
Lei Xu
Yingqi Liu
Xinming Zhang
AAML
12
35
0
30 Jul 2020
A Data Augmentation-based Defense Method Against Adversarial Attacks in
  Neural Networks
A Data Augmentation-based Defense Method Against Adversarial Attacks in Neural Networks
Yi Zeng
Han Qiu
G. Memmi
Meikang Qiu
AAML
29
50
0
30 Jul 2020
Derivation of Information-Theoretically Optimal Adversarial Attacks with
  Applications to Robust Machine Learning
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning
Jirong Yi
R. Mudumbai
Weiyu Xu
AAML
32
2
0
28 Jul 2020
From Sound Representation to Model Robustness
From Sound Representation to Model Robustness
Mohamad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
20
6
0
27 Jul 2020
Towards Accuracy-Fairness Paradox: Adversarial Example-based Data
  Augmentation for Visual Debiasing
Towards Accuracy-Fairness Paradox: Adversarial Example-based Data Augmentation for Visual Debiasing
Yi Zhang
Jitao Sang
20
55
0
27 Jul 2020
MirrorNet: Bio-Inspired Camouflaged Object Segmentation
MirrorNet: Bio-Inspired Camouflaged Object Segmentation
Jinnan Yan
Trung-Nghia Le
Khanh-Duy Nguyen
M. Tran
Thanh-Toan Do
Tam V. Nguyen
24
24
0
25 Jul 2020
Adversarial Privacy-preserving Filter
Adversarial Privacy-preserving Filter
Jiaming Zhang
Jitao Sang
Xian Zhao
Xiaowen Huang
Yanfeng Sun
Yongli Hu
PICV
39
41
0
25 Jul 2020
Adversarial Attacks against Face Recognition: A Comprehensive Study
Adversarial Attacks against Face Recognition: A Comprehensive Study
Fatemeh Vakhshiteh
A. Nickabadi
Raghavendra Ramachandra
AAML
15
16
0
22 Jul 2020
Robust Machine Learning via Privacy/Rate-Distortion Theory
Robust Machine Learning via Privacy/Rate-Distortion Theory
Ye Wang
Shuchin Aeron
Adnan Siraj Rakin
T. Koike-Akino
P. Moulin
OOD
22
6
0
22 Jul 2020
Previous
123...333435...484950
Next