ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILM
    AAML
ArXivPDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,710 papers shown
Title
White-Box Adversarial Defense via Self-Supervised Data Estimation
White-Box Adversarial Defense via Self-Supervised Data Estimation
Zudi Lin
Hanspeter Pfister
Ziming Zhang
AAML
16
2
0
13 Sep 2019
Defending Against Adversarial Attacks by Suppressing the Largest
  Eigenvalue of Fisher Information Matrix
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix
Yaxin Peng
Chaomin Shen
Guixu Zhang
Jinsong Fan
AAML
6
13
0
13 Sep 2019
Towards Model-Agnostic Adversarial Defenses using Adversarially Trained
  Autoencoders
Towards Model-Agnostic Adversarial Defenses using Adversarially Trained Autoencoders
Pratik Vaishnavi
Kevin Eykholt
A. Prakash
Amir Rahmati
AAML
28
2
0
12 Sep 2019
An Empirical Investigation of Randomized Defenses against Adversarial
  Attacks
An Empirical Investigation of Randomized Defenses against Adversarial Attacks
Yannik Potdevin
Dirk Nowotka
Vijay Ganesh
AAML
29
4
0
12 Sep 2019
Inspecting adversarial examples using the Fisher information
Inspecting adversarial examples using the Fisher information
Jörg Martin
Clemens Elster
AAML
23
15
0
12 Sep 2019
Sparse and Imperceivable Adversarial Attacks
Sparse and Imperceivable Adversarial Attacks
Francesco Croce
Matthias Hein
AAML
39
199
0
11 Sep 2019
PDA: Progressive Data Augmentation for General Robustness of Deep Neural
  Networks
PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks
Hang Yu
Aishan Liu
Xianglong Liu
Gen Li
Ping Luo
R. Cheng
Jichen Yang
Chongzhi Zhang
AAML
34
10
0
11 Sep 2019
Localized Adversarial Training for Increased Accuracy and Robustness in
  Image Classification
Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification
Eitan Rothberg
Tingting Chen
Luo Jie
Hao Ji
AAML
8
0
0
10 Sep 2019
Effectiveness of Adversarial Examples and Defenses for Malware
  Classification
Effectiveness of Adversarial Examples and Defenses for Malware Classification
Robert Podschwadt
Hassan Takabi
AAML
11
11
0
10 Sep 2019
FDA: Feature Disruptive Attack
FDA: Feature Disruptive Attack
Aditya Ganeshan
S. VivekB.
R. Venkatesh Babu
AAML
34
100
0
10 Sep 2019
Universal Physical Camouflage Attacks on Object Detectors
Universal Physical Camouflage Attacks on Object Detectors
Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
C. Zou
Ning Liu
AAML
143
162
0
10 Sep 2019
Adversarial Robustness Against the Union of Multiple Perturbation Models
Adversarial Robustness Against the Union of Multiple Perturbation Models
Pratyush Maini
Eric Wong
J. Zico Kolter
OOD
AAML
18
150
0
09 Sep 2019
STA: Adversarial Attacks on Siamese Trackers
STA: Adversarial Attacks on Siamese Trackers
Xugang Wu
Xiaoping Wang
Xu Zhou
Songlei Jian
GAN
AAML
32
6
0
08 Sep 2019
On the Need for Topology-Aware Generative Models for Manifold-Based
  Defenses
On the Need for Topology-Aware Generative Models for Manifold-Based Defenses
Uyeong Jang
Susmit Jha
S. Jha
AAML
33
13
0
07 Sep 2019
Blackbox Attacks on Reinforcement Learning Agents Using Approximated
  Temporal Information
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Yiren Zhao
Ilia Shumailov
Han Cui
Xitong Gao
Robert D. Mullins
Ross J. Anderson
AAML
9
28
0
06 Sep 2019
Are Adversarial Robustness and Common Perturbation Robustness
  Independent Attributes ?
Are Adversarial Robustness and Common Perturbation Robustness Independent Attributes ?
Alfred Laugros
A. Caplier
Matthieu Ospici
AAML
22
40
0
04 Sep 2019
Achieving Verified Robustness to Symbol Substitutions via Interval Bound
  Propagation
Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation
Po-Sen Huang
Robert Stanforth
Johannes Welbl
Chris Dyer
Dani Yogatama
Sven Gowal
Krishnamurthy Dvijotham
Pushmeet Kohli
AAML
22
164
0
03 Sep 2019
Metric Learning for Adversarial Robustness
Metric Learning for Adversarial Robustness
Chengzhi Mao
Ziyuan Zhong
Junfeng Yang
Carl Vondrick
Baishakhi Ray
OOD
27
184
0
03 Sep 2019
Deep Neural Network Ensembles against Deception: Ensemble Diversity,
  Accuracy and Robustness
Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness
Ling Liu
Wenqi Wei
Ka-Ho Chow
Margaret Loper
Emre Gursoy
Stacey Truex
Yanzhao Wu
UQCV
AAML
FedML
15
59
0
29 Aug 2019
A Statistical Defense Approach for Detecting Adversarial Examples
A Statistical Defense Approach for Detecting Adversarial Examples
Alessandro Cennamo
Ido Freeman
A. Kummert
AAML
15
4
0
26 Aug 2019
advPattern: Physical-World Attacks on Deep Person Re-Identification via
  Adversarially Transformable Patterns
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns
Peng Kuang
Siyan Zheng
Mengkai Song
Qian Wang
Alireza Rahimpour
Hairong Qi
AAML
OOD
19
59
0
25 Aug 2019
Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve
  the Tower
Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower
Giorgos Tolias
Filip Radenovic
Ondřej Chum
AAML
12
70
0
24 Aug 2019
AdvHat: Real-world adversarial attack on ArcFace Face ID system
AdvHat: Real-world adversarial attack on ArcFace Face ID system
Stepan Alekseevich Komkov
Aleksandr Petiushko
AAML
CVBM
16
283
0
23 Aug 2019
Saliency Methods for Explaining Adversarial Attacks
Saliency Methods for Explaining Adversarial Attacks
Jindong Gu
Volker Tresp
FAtt
AAML
13
30
0
22 Aug 2019
Denoising and Verification Cross-Layer Ensemble Against Black-box
  Adversarial Attacks
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks
Ka-Ho Chow
Wenqi Wei
Yanzhao Wu
Ling Liu
AAML
25
15
0
21 Aug 2019
Human uncertainty makes classification more robust
Human uncertainty makes classification more robust
Joshua C. Peterson
Ruairidh M. Battleday
Thomas Griffiths
Olga Russakovsky
OOD
6
295
0
19 Aug 2019
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with
  Limited Queries
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
AAML
22
85
0
19 Aug 2019
A Kings Ransom for Encryption: Ransomware Classification using Augmented
  One-Shot Learning and Bayesian Approximation
A Kings Ransom for Encryption: Ransomware Classification using Augmented One-Shot Learning and Bayesian Approximation
Amir Atapour-Abarghouei
Stephen Bonner
A. Mcgough
29
7
0
19 Aug 2019
On the Robustness of Human Pose Estimation
On the Robustness of Human Pose Estimation
Sahil Shah
Naman Jain
Abhishek Sharma
Arjun Jain
AAML
OOD
36
20
0
18 Aug 2019
Implicit Deep Learning
Implicit Deep Learning
L. Ghaoui
Fangda Gu
Bertrand Travacca
Armin Askari
Alicia Y. Tsai
AI4CE
34
176
0
17 Aug 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial
  Attacks
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
J. Hopcroft
AAML
38
555
0
17 Aug 2019
Adversarial shape perturbations on 3D point clouds
Adversarial shape perturbations on 3D point clouds
Daniel Liu
Ronald Yu
Hao Su
3DPC
33
12
0
16 Aug 2019
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target
  Adversarial Network Once
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once
Jiangfan Han
Xiaoyi Dong
Ruimao Zhang
Dongdong Chen
Weiming Zhang
Nenghai Yu
Ping Luo
Xiaogang Wang
AAML
24
28
0
14 Aug 2019
Uncheatable Machine Learning Inference
Uncheatable Machine Learning Inference
Mustafa Canim
A. Kundu
Josh Payne
15
1
0
08 Aug 2019
Defending Against Adversarial Iris Examples Using Wavelet Decomposition
Defending Against Adversarial Iris Examples Using Wavelet Decomposition
Sobhan Soleymani
Ali Dabouei
J. Dawson
Nasser M. Nasrabadi
AAML
27
9
0
08 Aug 2019
Universal Adversarial Audio Perturbations
Universal Adversarial Audio Perturbations
Sajjad Abdoli
L. G. Hafemann
Jérôme Rony
Ismail Ben Ayed
P. Cardinal
Alessandro Lameiras Koerich
AAML
25
51
0
08 Aug 2019
Robust Learning with Jacobian Regularization
Robust Learning with Jacobian Regularization
Judy Hoffman
Daniel A. Roberts
Sho Yaida
OOD
AAML
17
165
0
07 Aug 2019
Interpretable and Fine-Grained Visual Explanations for Convolutional
  Neural Networks
Interpretable and Fine-Grained Visual Explanations for Convolutional Neural Networks
Jörg Wagner
Jan M. Köhler
Tobias Gindele
Leon Hetzel
Thaddäus Wiedemer
Sven Behnke
AAML
FAtt
31
121
0
07 Aug 2019
BlurNet: Defense by Filtering the Feature Maps
BlurNet: Defense by Filtering the Feature Maps
Ravi Raju
Mikko H. Lipasti
AAML
42
15
0
06 Aug 2019
MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks
MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks
Chen Ma
Chenxu Zhao
Hailin Shi
Li Chen
Junhai Yong
Dan Zeng
AAML
28
17
0
06 Aug 2019
Random Directional Attack for Fooling Deep Neural Networks
Random Directional Attack for Fooling Deep Neural Networks
Wenjian Luo
Chenwang Wu
Nan Zhou
Li Ni
AAML
6
4
0
06 Aug 2019
A principled approach for generating adversarial images under non-smooth
  dissimilarity metrics
A principled approach for generating adversarial images under non-smooth dissimilarity metrics
Aram-Alexandre Pooladian
Chris Finlay
Tim Hoheisel
Adam M. Oberman
AAML
20
3
0
05 Aug 2019
Adversarial Self-Defense for Cycle-Consistent GANs
Adversarial Self-Defense for Cycle-Consistent GANs
D. Bashkirova
Ben Usman
Kate Saenko
GAN
17
43
0
05 Aug 2019
Exploring the Robustness of NMT Systems to Nonsensical Inputs
Exploring the Robustness of NMT Systems to Nonsensical Inputs
Akshay Chaturvedi
K. Abijith
Utpal Garain
AAML
24
12
0
03 Aug 2019
Sound source detection, localization and classification using
  consecutive ensemble of CRNN models
Sound source detection, localization and classification using consecutive ensemble of CRNN models
Slawomir Kapka
M. Lewandowski
16
66
0
02 Aug 2019
AdvGAN++ : Harnessing latent layers for adversary generation
AdvGAN++ : Harnessing latent layers for adversary generation
Puneet Mangla
Surgan Jandial
Sakshi Varshney
V. Balasubramanian
GAN
8
68
0
02 Aug 2019
Adversarial Robustness Curves
Adversarial Robustness Curves
Christina Göpfert
Jan Philip Göpfert
Barbara Hammer
AAML
17
6
0
31 Jul 2019
Impact of Adversarial Examples on Deep Learning Models for Biomedical
  Image Segmentation
Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation
Utku Ozbulak
Arnout Van Messem
W. D. Neve
MedIm
AAML
20
60
0
30 Jul 2019
Not All Adversarial Examples Require a Complex Defense: Identifying
  Over-optimized Adversarial Examples with IQR-based Logit Thresholding
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding
Utku Ozbulak
Arnout Van Messem
W. D. Neve
AAML
11
1
0
30 Jul 2019
Is BERT Really Robust? A Strong Baseline for Natural Language Attack on
  Text Classification and Entailment
Is BERT Really Robust? A Strong Baseline for Natural Language Attack on Text Classification and Entailment
Di Jin
Zhijing Jin
Qiufeng Wang
Peter Szolovits
SILM
AAML
29
1,053
0
27 Jul 2019
Previous
123...424344...535455
Next