Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,498 papers shown
Title
Audio Adversarial Examples for Robust Hybrid CTC/Attention Speech Recognition
Ludwig Kurzinger
Edgar Ricardo Chavez Rosas
Lujun Li
Tobias Watzel
Gerhard Rigoll
AAML
19
4
0
21 Jul 2020
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
Yuzhen Ding
Nupur Thakur
Baoxin Li
AAML
24
3
0
20 Jul 2020
DiffRNN: Differential Verification of Recurrent Neural Networks
Sara Mohammadinejad
Brandon Paulsen
Chao Wang
Jyotirmoy V. Deshmukh
30
12
0
20 Jul 2020
Robust Tracking against Adversarial Attacks
Shuai Jia
Chao Ma
Yibing Song
Xiaokang Yang
AAML
28
48
0
20 Jul 2020
Exploiting vulnerabilities of deep neural networks for privacy protection
Ricardo Sánchez-Matilla
C. Li
Ali Shahin Shamsabadi
Riccardo Mazzon
Andrea Cavallaro
AAML
PICV
13
24
0
19 Jul 2020
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
Shasha Li
Shitong Zhu
Sudipta Paul
Amit K. Roy-Chowdhury
Chengyu Song
S. Krishnamurthy
A. Swami
Kevin S. Chan
AAML
8
34
0
19 Jul 2020
Semantic Equivalent Adversarial Data Augmentation for Visual Question Answering
Ruixue Tang
Chao Ma
W. Zhang
Qi Wu
Xiaokang Yang
OOD
31
48
0
19 Jul 2020
Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense
Sayeed Shafayet Chowdhury
Kaji Mejbaul Islam
Rouhan Noor
AAML
26
3
0
17 Jul 2020
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context
Ehsan Toreini
Mhairi Aitken
Kovila P. L. Coopamootoo
Karen Elliott
Vladimiro González-Zelaya
P. Missier
Magdalene Ng
Aad van Moorsel
39
17
0
17 Jul 2020
On Adversarial Robustness: A Neural Architecture Search perspective
Chaitanya Devaguptapu
Devansh Agarwal
Gaurav Mittal
Pulkit Gopalani
V. Balasubramanian
OOD
AAML
12
33
0
16 Jul 2020
Odyssey: Creation, Analysis and Detection of Trojan Models
Marzieh Edraki
Nazmul Karim
Nazanin Rahnavard
Ajmal Mian
M. Shah
AAML
28
13
0
16 Jul 2020
Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Wenjie Wan
Zhaodi Zhang
Yiwei Zhu
Min Zhang
Fu Song
AAML
13
8
0
16 Jul 2020
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Yupeng Cheng
Qing Guo
Felix Juefei Xu
Wei Feng
Shang-Wei Lin
Weisi Lin
Yang Liu
AAML
38
46
0
14 Jul 2020
Bounding The Number of Linear Regions in Local Area for Neural Networks with ReLU Activations
Rui Zhu
Bo Lin
Haixu Tang
MLT
18
4
0
14 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
32
137
0
14 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
32
128
0
13 Jul 2020
CheXphoto: 10,000+ Photos and Transformations of Chest X-rays for Benchmarking Deep Learning Robustness
Nick A. Phillips
Pranav Rajpurkar
Mark Sabini
R. Krishnan
Sharon Zhou
...
Mudit Jain
Nguyen Duong Du
Steven QH Truong
A. Ng
M. Lungren
MedIm
33
13
0
13 Jul 2020
Probabilistic Jacobian-based Saliency Maps Attacks
Théo Combey
António Loison
Maxime Faucher
H. Hajri
AAML
21
19
0
12 Jul 2020
Improved Detection of Adversarial Images Using Deep Neural Networks
Yutong Gao
Yi-Lun Pan
AAML
10
3
0
10 Jul 2020
Generating Adversarial Inputs Using A Black-box Differential Technique
J. Matos
Lucas C. Cordeiro
Marcelo d’Amorim
Xiaowei Huang
AAML
8
0
0
10 Jul 2020
Improving Adversarial Robustness by Enforcing Local and Global Compactness
Anh-Vu Bui
Trung Le
He Zhao
Paul Montague
O. deVel
Tamas Abraham
Dinh Q. Phung
AAML
20
24
0
10 Jul 2020
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs
Rana Abou-Khamis
Ashraf Matrawy
AAML
41
46
0
08 Jul 2020
On the relationship between class selectivity, dimensionality, and robustness
Matthew L. Leavitt
Ari S. Morcos
18
6
0
08 Jul 2020
Quaternion Capsule Networks
B. Özcan
Furkan Kinli
Mustafa Furkan Kıraç
3DPC
20
6
0
08 Jul 2020
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Giulio Lovisotto
H.C.M. Turner
Ivo Sluganovic
Martin Strohmeier
Ivan Martinovic
AAML
19
101
0
08 Jul 2020
RobFR: Benchmarking Adversarial Robustness on Face Recognition
Xiao Yang
Dingcheng Yang
Yinpeng Dong
Hang Su
Wenjian Yu
Jun Zhu
AAML
82
14
0
08 Jul 2020
How benign is benign overfitting?
Amartya Sanyal
P. Dokania
Varun Kanade
Philip Torr
NoLa
AAML
23
57
0
08 Jul 2020
Making Adversarial Examples More Transferable and Indistinguishable
Junhua Zou
Yexin Duan
Xin Liu
Junyang Qiu
Yu Pan
Zhisong Pan
AAML
22
32
0
08 Jul 2020
Regional Image Perturbation Reduces
L
p
L_p
L
p
Norms of Adversarial Examples While Maintaining Model-to-model Transferability
Utku Ozbulak
Jonathan Peck
W. D. Neve
Bart Goossens
Yvan Saeys
Arnout Van Messem
AAML
17
2
0
07 Jul 2020
On Data Augmentation and Adversarial Risk: An Empirical Analysis
Hamid Eghbalzadeh
Khaled Koutini
Paul Primus
Verena Haunschmid
Michal Lewandowski
Werner Zellinger
Bernhard A. Moser
Gerhard Widmer
AAML
20
9
0
06 Jul 2020
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Ishai Rosenberg
A. Shabtai
Yuval Elovici
Lior Rokach
AAML
34
12
0
05 Jul 2020
Towards Robust Deep Learning with Ensemble Networks and Noisy Layers
Yuting Liang
Reza Samavi
AAML
12
2
0
03 Jul 2020
Generating Adversarial Examples with Controllable Non-transferability
Renzhi Wang
Tianwei Zhang
Xiaofei Xie
Lei Ma
Cong Tian
Felix Juefei Xu
Yang Liu
SILM
AAML
17
3
0
02 Jul 2020
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment
Xabier Echeberria-Barrio
Amaia Gil-Lerchundi
Ines Goicoechea-Telleria
Raul Orduna Urrutia
AAML
22
5
0
02 Jul 2020
Query-Free Adversarial Transfer via Undertrained Surrogates
Chris Miller
Soroush Vosoughi
AAML
14
0
0
01 Jul 2020
ConFoc: Content-Focus Protection Against Trojan Attacks on Neural Networks
Miguel Villarreal-Vasquez
B. Bhargava
AAML
19
38
0
01 Jul 2020
Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Kishor Datta Gupta
Zahid Akhtar
D. Dasgupta
AAML
27
9
0
01 Jul 2020
Neural Network Virtual Sensors for Fuel Injection Quantities with Provable Performance Specifications
Eric Wong
Tim Schneider
Joerg Schmitt
Frank R. Schmidt
J. Zico Kolter
AAML
40
8
0
30 Jun 2020
Generating Adversarial Examples with an Optimized Quality
Aminollah Khormali
Daehun Nyang
David A. Mohaisen
AAML
8
1
0
30 Jun 2020
Biologically Inspired Mechanisms for Adversarial Robustness
M. V. Reddy
Andrzej Banburski
Nishka Pant
T. Poggio
AAML
26
46
0
29 Jun 2020
Geometry-Inspired Top-k Adversarial Perturbations
Nurislam Tursynbek
Aleksandr Petiushko
Ivan Oseledets
AAML
17
10
0
28 Jun 2020
Learning Goals from Failure
Dave Epstein
Carl Vondrick
10
3
0
28 Jun 2020
FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications
Yunfei Song
Tian Liu
Tongquan Wei
Xiangfeng Wang
Zhe Tao
Mingsong Chen
14
48
0
28 Jun 2020
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Kaidi Jin
Tianwei Zhang
Chao Shen
Yufei Chen
Ming Fan
Chenhao Lin
Ting Liu
AAML
14
14
0
26 Jun 2020
Orthogonal Deep Models As Defense Against Black-Box Attacks
M. Jalwana
Naveed Akhtar
Bennamoun
Ajmal Mian
AAML
22
11
0
26 Jun 2020
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Huiying Li
Shawn Shan
Emily Wenger
Jiayun Zhang
Haitao Zheng
Ben Y. Zhao
AAML
23
42
0
24 Jun 2020
Bit Error Robustness for Energy-Efficient DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
MQ
28
1
0
24 Jun 2020
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks
Francesco Croce
Maksym Andriushchenko
Naman D. Singh
Nicolas Flammarion
Matthias Hein
26
99
0
23 Jun 2020
RayS: A Ray Searching Method for Hard-label Adversarial Attack
Jinghui Chen
Quanquan Gu
AAML
18
137
0
23 Jun 2020
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Yuankun Zhu
Yueqiang Cheng
Husheng Zhou
Yantao Lu
MIACV
AAML
39
99
0
23 Jun 2020
Previous
1
2
3
...
34
35
36
...
48
49
50
Next