ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILM
    AAML
ArXivPDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,498 papers shown
Title
Adversarial Training for Free!
Adversarial Training for Free!
Ali Shafahi
Mahyar Najibi
Amin Ghiasi
Zheng Xu
John P. Dickerson
Christoph Studer
L. Davis
Gavin Taylor
Tom Goldstein
AAML
68
1,231
0
29 Apr 2019
Data Poisoning Attack against Knowledge Graph Embedding
Data Poisoning Attack against Knowledge Graph Embedding
Hengtong Zhang
T. Zheng
Jing Gao
Chenglin Miao
Lu Su
Yaliang Li
K. Ren
KELM
18
81
0
26 Apr 2019
General risk measures for robust machine learning
General risk measures for robust machine learning
Émilie Chouzenoux
Henri Gérard
J. Pesquet
OOD
11
7
0
26 Apr 2019
Physical Adversarial Textures that Fool Visual Object Tracking
Physical Adversarial Textures that Fool Visual Object Tracking
R. Wiyatno
Anqi Xu
AAML
26
73
0
24 Apr 2019
A Robust Approach for Securing Audio Classification Against Adversarial
  Attacks
A Robust Approach for Securing Audio Classification Against Adversarial Attacks
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
6
70
0
24 Apr 2019
Minimizing Perceived Image Quality Loss Through Adversarial Attack
  Scoping
Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping
K. Khabarlak
L. Koriashkina
AAML
8
1
0
23 Apr 2019
Using Videos to Evaluate Image Model Robustness
Using Videos to Evaluate Image Model Robustness
Keren Gu
Brandon Yang
Jiquan Ngiam
Quoc V. Le
Jonathon Shlens
AAML
8
44
0
22 Apr 2019
Can Machine Learning Model with Static Features be Fooled: an
  Adversarial Machine Learning Approach
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
R. Taheri
R. Javidan
Mohammad Shojafar
P. Vinod
Mauro Conti
AAML
17
34
0
20 Apr 2019
Gotta Catch Ém All: Using Honeypots to Catch Adversarial Attacks on
  Neural Networks
Gotta Catch Ém All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan
Emily Wenger
Bolun Wang
Yangqiu Song
Haitao Zheng
Ben Y. Zhao
25
71
0
18 Apr 2019
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep
  Classifiers
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers
Ameya Joshi
Amitangshu Mukherjee
S. Sarkar
C. Hegde
AAML
6
99
0
17 Apr 2019
Interpreting Adversarial Examples with Attributes
Interpreting Adversarial Examples with Attributes
Sadaf Gulshad
J. H. Metzen
A. Smeulders
Zeynep Akata
FAtt
AAML
33
6
0
17 Apr 2019
Adversarial Defense Through Network Profiling Based Path Extraction
Adversarial Defense Through Network Profiling Based Path Extraction
Yuxian Qiu
Jingwen Leng
Cong Guo
Quan Chen
Chong Li
Minyi Guo
Yuhao Zhu
AAML
24
51
0
17 Apr 2019
Reducing Adversarial Example Transferability Using Gradient
  Regularization
Reducing Adversarial Example Transferability Using Gradient Regularization
George Adam
P. Smirnov
B. Haibe-Kains
Anna Goldenberg
AAML
27
4
0
16 Apr 2019
Are Nearby Neighbors Relatives?: Testing Deep Music Embeddings
Are Nearby Neighbors Relatives?: Testing Deep Music Embeddings
Jaehun Kim
Julián Urbano
Cynthia C. S. Liem
Alan Hanjalic
21
0
0
15 Apr 2019
Unrestricted Adversarial Examples via Semantic Manipulation
Unrestricted Adversarial Examples via Semantic Manipulation
Anand Bhattad
Min Jin Chong
Kaizhao Liang
Yangqiu Song
David A. Forsyth
AAML
34
149
0
12 Apr 2019
Generating Minimal Adversarial Perturbations with Integrated Adaptive Gradients
Yatie Xiao
Chi-Man Pun
AAML
GAN
TTA
11
0
0
12 Apr 2019
Cycle-Consistent Adversarial GAN: the integration of adversarial attack
  and defense
Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense
Lingyun Jiang
Kai Qiao
Ruoxi Qin
Linyuan Wang
Jian Chen
Haibing Bu
Bin Yan
AAML
12
8
0
12 Apr 2019
Deep learning as optimal control problems: models and numerical methods
Deep learning as optimal control problems: models and numerical methods
Martin Benning
E. Celledoni
Matthias Joachim Ehrhardt
B. Owren
Carola-Bibiane Schönlieb
21
81
0
11 Apr 2019
StegaStamp: Invisible Hyperlinks in Physical Photographs
StegaStamp: Invisible Hyperlinks in Physical Photographs
Matthew Tancik
B. Mildenhall
Ren Ng
WIGM
40
360
0
10 Apr 2019
Black-box Adversarial Attacks on Video Recognition Models
Black-box Adversarial Attacks on Video Recognition Models
Linxi Jiang
Xingjun Ma
Shaoxiang Chen
James Bailey
Yu-Gang Jiang
AAML
MLAU
11
143
0
10 Apr 2019
Joint Activity Recognition and Indoor Localization with WiFi
  Fingerprints
Joint Activity Recognition and Indoor Localization with WiFi Fingerprints
Fei Wang
Jianwei Feng
Yinliang Zhao
Xiaobin Zhang
Shiyuan Zhang
Jinsong Han
20
138
0
10 Apr 2019
Adversarial Audio: A New Information Hiding Method and Backdoor for
  DNN-based Speech Recognition Models
Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models
Yehao Kong
Jiliang Zhang
16
26
0
08 Apr 2019
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
N. Benjamin Erichson
Z. Yao
Michael W. Mahoney
AAML
27
21
0
07 Apr 2019
Evading Defenses to Transferable Adversarial Examples by
  Translation-Invariant Attacks
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
SILM
AAML
49
829
0
05 Apr 2019
Minimum Uncertainty Based Detection of Adversaries in Deep Neural
  Networks
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks
Fatemeh Sheikholeslami
Swayambhoo Jain
G. Giannakis
AAML
22
25
0
05 Apr 2019
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
Yotam Gil
Yoav Chai
O. Gorodissky
Jonathan Berant
MLAU
AAML
27
44
0
04 Apr 2019
Improved Inference via Deep Input Transfer
Improved Inference via Deep Input Transfer
Saeid Asgari Taghanaki
Kumar Abhishek
Ghassan Hamarneh
SSeg
21
7
0
04 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
27
654
0
03 Apr 2019
Interpreting Adversarial Examples by Activation Promotion and
  Suppression
Interpreting Adversarial Examples by Activation Promotion and Suppression
Kaidi Xu
Sijia Liu
Gaoyuan Zhang
Mengshu Sun
Pu Zhao
Quanfu Fan
Chuang Gan
X. Lin
AAML
FAtt
24
43
0
03 Apr 2019
Adversarial Attacks against Deep Saliency Models
Adversarial Attacks against Deep Saliency Models
Zhaohui Che
Ali Borji
Guangtao Zhai
Suiyi Ling
G. Guo
P. Le Callet
AAML
19
4
0
02 Apr 2019
Curls & Whey: Boosting Black-Box Adversarial Attacks
Curls & Whey: Boosting Black-Box Adversarial Attacks
Yucheng Shi
Siyu Wang
Yahong Han
AAML
18
116
0
02 Apr 2019
HYPE: A Benchmark for Human eYe Perceptual Evaluation of Generative
  Models
HYPE: A Benchmark for Human eYe Perceptual Evaluation of Generative Models
Sharon Zhou
Mitchell L. Gordon
Ranjay Krishna
Austin Narcomey
Li Fei-Fei
Michael S. Bernstein
VLM
EGVM
6
118
0
01 Apr 2019
Regional Homogeneity: Towards Learning Transferable Universal
  Adversarial Perturbations Against Defenses
Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses
Yingwei Li
S. Bai
Cihang Xie
Zhenyu A. Liao
Xiaohui Shen
Alan Yuille
AAML
47
50
0
01 Apr 2019
Adversarial Defense by Restricting the Hidden Space of Deep Neural
  Networks
Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks
Aamir Mustafa
Salman Khan
Munawar Hayat
Roland Göcke
Jianbing Shen
Ling Shao
AAML
17
151
0
01 Apr 2019
On the Vulnerability of CNN Classifiers in EEG-Based BCIs
On the Vulnerability of CNN Classifiers in EEG-Based BCIs
Xiao Zhang
Dongrui Wu
AAML
24
82
0
31 Mar 2019
Rallying Adversarial Techniques against Deep Learning for Network
  Security
Rallying Adversarial Techniques against Deep Learning for Network Security
Joseph Clements
Yuzhe Yang
Ankur A Sharma
Hongxin Hu
Yingjie Lao
AAML
25
51
0
27 Mar 2019
Bridging Adversarial Robustness and Gradient Interpretability
Bridging Adversarial Robustness and Gradient Interpretability
Beomsu Kim
Junghoon Seo
Taegyun Jeon
AAML
19
39
0
27 Mar 2019
Scaling up the randomized gradient-free adversarial attack reveals
  overestimation of robustness using established attacks
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks
Francesco Croce
Jonas Rauber
Matthias Hein
AAML
20
30
0
27 Mar 2019
Small Data Challenges in Big Data Era: A Survey of Recent Progress on
  Unsupervised and Semi-Supervised Methods
Small Data Challenges in Big Data Era: A Survey of Recent Progress on Unsupervised and Semi-Supervised Methods
Guo-Jun Qi
Jiebo Luo
SSL
14
238
0
27 Mar 2019
Failure-Scenario Maker for Rule-Based Agent using Multi-agent
  Adversarial Reinforcement Learning and its Application to Autonomous Driving
Failure-Scenario Maker for Rule-Based Agent using Multi-agent Adversarial Reinforcement Learning and its Application to Autonomous Driving
Akifumi Wachi
AAML
14
68
0
26 Mar 2019
Defending against Whitebox Adversarial Attacks via Randomized
  Discretization
Defending against Whitebox Adversarial Attacks via Randomized Discretization
Yuchen Zhang
Percy Liang
AAML
32
75
0
25 Mar 2019
The LogBarrier adversarial attack: making effective use of decision
  boundary information
The LogBarrier adversarial attack: making effective use of decision boundary information
Chris Finlay
Aram-Alexandre Pooladian
Adam M. Oberman
AAML
26
25
0
25 Mar 2019
Robust Neural Networks using Randomized Adversarial Training
Robust Neural Networks using Randomized Adversarial Training
Alexandre Araujo
Laurent Meunier
Rafael Pinot
Benjamin Négrevergne
AAML
OOD
24
36
0
25 Mar 2019
Variational Inference with Latent Space Quantization for Adversarial
  Resilience
Variational Inference with Latent Space Quantization for Adversarial Resilience
Vinay Kyatham
P. PrathoshA.
Tarun Kumar Yadav
Deepak Mishra
Dheeraj Mundhra
AAML
19
3
0
24 Mar 2019
Scalable Differential Privacy with Certified Robustness in Adversarial
  Learning
Scalable Differential Privacy with Certified Robustness in Adversarial Learning
Nhathai Phan
My T. Thai
Han Hu
R. Jin
Tong Sun
Dejing Dou
32
14
0
23 Mar 2019
Improving Adversarial Robustness via Guided Complement Entropy
Improving Adversarial Robustness via Guided Complement Entropy
Hao-Yun Chen
Jhao-Hong Liang
Shih-Chieh Chang
Jia Pan
Yu-Ting Chen
Wei Wei
Da-Cheng Juan
AAML
6
47
0
23 Mar 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
38
377
0
22 Mar 2019
Fast Bayesian Uncertainty Estimation and Reduction of Batch Normalized
  Single Image Super-Resolution Network
Fast Bayesian Uncertainty Estimation and Reduction of Batch Normalized Single Image Super-Resolution Network
Aupendu Kar
P. Biswas
AAML
UQCV
SupR
OOD
30
11
0
22 Mar 2019
Adversarial camera stickers: A physical camera-based attack on deep
  learning systems
Adversarial camera stickers: A physical camera-based attack on deep learning systems
Juncheng Billy Li
Frank R. Schmidt
J. Zico Kolter
AAML
11
164
0
21 Mar 2019
Robust Image Segmentation Quality Assessment
Robust Image Segmentation Quality Assessment
Leixin Zhou
Wenxiang Deng
Xiaodong Wu
15
8
0
20 Mar 2019
Previous
123...454647484950
Next