ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Joint Activity Recognition and Indoor Localization with WiFi
  Fingerprints
Joint Activity Recognition and Indoor Localization with WiFi Fingerprints
Fei Wang
Jianwei Feng
Yinliang Zhao
Xiaobin Zhang
Shiyuan Zhang
Jinsong Han
82
142
0
10 Apr 2019
Adversarial Audio: A New Information Hiding Method and Backdoor for
  DNN-based Speech Recognition Models
Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models
Yehao Kong
Jiliang Zhang
52
28
0
08 Apr 2019
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
N. Benjamin Erichson
Z. Yao
Michael W. Mahoney
AAML
69
24
0
07 Apr 2019
Evading Defenses to Transferable Adversarial Examples by
  Translation-Invariant Attacks
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
SILMAAML
96
858
0
05 Apr 2019
Minimum Uncertainty Based Detection of Adversaries in Deep Neural
  Networks
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks
Fatemeh Sheikholeslami
Swayambhoo Jain
G. Giannakis
AAML
67
25
0
05 Apr 2019
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
Yotam Gil
Yoav Chai
O. Gorodissky
Jonathan Berant
MLAUAAML
50
46
0
04 Apr 2019
Improved Inference via Deep Input Transfer
Improved Inference via Deep Input Transfer
Saeid Asgari Taghanaki
Kumar Abhishek
Ghassan Hamarneh
SSeg
66
7
0
04 Apr 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
121
671
0
03 Apr 2019
Interpreting Adversarial Examples by Activation Promotion and
  Suppression
Interpreting Adversarial Examples by Activation Promotion and Suppression
Kaidi Xu
Sijia Liu
Gaoyuan Zhang
Mengshu Sun
Pu Zhao
Quanfu Fan
Chuang Gan
Xinyu Lin
AAMLFAtt
140
43
0
03 Apr 2019
Adversarial Attacks against Deep Saliency Models
Adversarial Attacks against Deep Saliency Models
Zhaohui Che
Ali Borji
Guangtao Zhai
Suiyi Ling
G. Guo
P. Le Callet
AAML
49
4
0
02 Apr 2019
Curls & Whey: Boosting Black-Box Adversarial Attacks
Curls & Whey: Boosting Black-Box Adversarial Attacks
Yucheng Shi
Siyu Wang
Yahong Han
AAML
131
117
0
02 Apr 2019
HYPE: A Benchmark for Human eYe Perceptual Evaluation of Generative
  Models
HYPE: A Benchmark for Human eYe Perceptual Evaluation of Generative Models
Sharon Zhou
Mitchell L. Gordon
Ranjay Krishna
Austin Narcomey
Li Fei-Fei
Michael S. Bernstein
VLMEGVM
82
121
0
01 Apr 2019
Regional Homogeneity: Towards Learning Transferable Universal
  Adversarial Perturbations Against Defenses
Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses
Yingwei Li
S. Bai
Cihang Xie
Zhenyu A. Liao
Xiaohui Shen
Alan Yuille
AAML
150
51
0
01 Apr 2019
Adversarial Defense by Restricting the Hidden Space of Deep Neural
  Networks
Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks
Aamir Mustafa
Salman Khan
Munawar Hayat
Roland Göcke
Jianbing Shen
Ling Shao
AAML
64
152
0
01 Apr 2019
On the Vulnerability of CNN Classifiers in EEG-Based BCIs
On the Vulnerability of CNN Classifiers in EEG-Based BCIs
Xiao Zhang
Dongrui Wu
AAML
73
83
0
31 Mar 2019
BlackMarks: Blackbox Multibit Watermarking for Deep Neural Networks
BlackMarks: Blackbox Multibit Watermarking for Deep Neural Networks
Huili Chen
B. Rouhani
F. Koushanfar
68
52
0
31 Mar 2019
Rallying Adversarial Techniques against Deep Learning for Network
  Security
Rallying Adversarial Techniques against Deep Learning for Network Security
Joseph Clements
Yuzhe Yang
Ankur A Sharma
Hongxin Hu
Yingjie Lao
AAML
80
52
0
27 Mar 2019
Bridging Adversarial Robustness and Gradient Interpretability
Bridging Adversarial Robustness and Gradient Interpretability
Beomsu Kim
Junghoon Seo
Taegyun Jeon
AAML
84
40
0
27 Mar 2019
Scaling up the randomized gradient-free adversarial attack reveals
  overestimation of robustness using established attacks
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks
Francesco Croce
Jonas Rauber
Matthias Hein
AAML
65
31
0
27 Mar 2019
Small Data Challenges in Big Data Era: A Survey of Recent Progress on
  Unsupervised and Semi-Supervised Methods
Small Data Challenges in Big Data Era: A Survey of Recent Progress on Unsupervised and Semi-Supervised Methods
Guo-Jun Qi
Jiebo Luo
SSL
61
246
0
27 Mar 2019
Failure-Scenario Maker for Rule-Based Agent using Multi-agent
  Adversarial Reinforcement Learning and its Application to Autonomous Driving
Failure-Scenario Maker for Rule-Based Agent using Multi-agent Adversarial Reinforcement Learning and its Application to Autonomous Driving
Akifumi Wachi
AAML
82
70
0
26 Mar 2019
Defending against Whitebox Adversarial Attacks via Randomized
  Discretization
Defending against Whitebox Adversarial Attacks via Randomized Discretization
Yuchen Zhang
Percy Liang
AAML
79
76
0
25 Mar 2019
The LogBarrier adversarial attack: making effective use of decision
  boundary information
The LogBarrier adversarial attack: making effective use of decision boundary information
Chris Finlay
Aram-Alexandre Pooladian
Adam M. Oberman
AAML
79
25
0
25 Mar 2019
Robust Neural Networks using Randomized Adversarial Training
Robust Neural Networks using Randomized Adversarial Training
Alexandre Araujo
Laurent Meunier
Rafael Pinot
Benjamin Négrevergne
AAMLOOD
48
36
0
25 Mar 2019
Variational Inference with Latent Space Quantization for Adversarial
  Resilience
Variational Inference with Latent Space Quantization for Adversarial Resilience
Vinay Kyatham
P. PrathoshA.
Tarun Kumar Yadav
Deepak Mishra
Dheeraj Mundhra
AAML
48
3
0
24 Mar 2019
Scalable Differential Privacy with Certified Robustness in Adversarial
  Learning
Scalable Differential Privacy with Certified Robustness in Adversarial Learning
Nhathai Phan
My T. Thai
Han Hu
R. Jin
Tong Sun
Dejing Dou
91
14
0
23 Mar 2019
Improving Adversarial Robustness via Guided Complement Entropy
Improving Adversarial Robustness via Guided Complement Entropy
Hao-Yun Chen
Jhao-Hong Liang
Shih-Chieh Chang
Jia Pan
Yu-Ting Chen
Wei Wei
Da-Cheng Juan
AAML
67
49
0
23 Mar 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
107
381
0
22 Mar 2019
Fast Bayesian Uncertainty Estimation and Reduction of Batch Normalized
  Single Image Super-Resolution Network
Fast Bayesian Uncertainty Estimation and Reduction of Batch Normalized Single Image Super-Resolution Network
Aupendu Kar
P. Biswas
AAMLUQCVSupROOD
54
12
0
22 Mar 2019
Adversarial camera stickers: A physical camera-based attack on deep
  learning systems
Adversarial camera stickers: A physical camera-based attack on deep learning systems
Juncheng Billy Li
Frank R. Schmidt
J. Zico Kolter
AAML
85
168
0
21 Mar 2019
Robust Image Segmentation Quality Assessment
Robust Image Segmentation Quality Assessment
Leixin Zhou
Wenxiang Deng
Xiaodong Wu
82
8
0
20 Mar 2019
Practical Hidden Voice Attacks against Speech and Speaker Recognition
  Systems
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
H. Abdullah
Washington Garcia
Christian Peeters
Patrick Traynor
Kevin R. B. Butler
Joseph N. Wilson
AAML
72
168
0
18 Mar 2019
Generating Adversarial Examples With Conditional Generative Adversarial
  Net
Generating Adversarial Examples With Conditional Generative Adversarial Net
Ping Yu
Kaitao Song
Jianfeng Lu
AAMLGAN
43
23
0
18 Mar 2019
Adversarial Attacks on Deep Neural Networks for Time Series
  Classification
Adversarial Attacks on Deep Neural Networks for Time Series Classification
Hassan Ismail Fawaz
Germain Forestier
J. Weber
L. Idoumghar
Pierre-Alain Muller
AAML
90
135
0
17 Mar 2019
A Research Agenda: Dynamic Models to Defend Against Correlated Attacks
A Research Agenda: Dynamic Models to Defend Against Correlated Attacks
Ian Goodfellow
AAMLOOD
85
31
0
14 Mar 2019
Neural Network Model Extraction Attacks in Edge Devices by Hearing
  Architectural Hints
Neural Network Model Extraction Attacks in Edge Devices by Hearing Architectural Hints
Xing Hu
Ling Liang
Lei Deng
Shuangchen Li
Xinfeng Xie
Yu Ji
Yufei Ding
Chang Liu
T. Sherwood
Yuan Xie
AAMLMLAU
68
36
0
10 Mar 2019
Semantics Preserving Adversarial Learning
Semantics Preserving Adversarial Learning
Ousmane Amadou Dia
Elnaz Barshan
Reza Babanezhad
AAMLGAN
113
2
0
10 Mar 2019
Safety Verification and Robustness Analysis of Neural Networks via
  Quadratic Constraints and Semidefinite Programming
Safety Verification and Robustness Analysis of Neural Networks via Quadratic Constraints and Semidefinite Programming
Mahyar Fazlyab
M. Morari
George J. Pappas
AAML
92
233
0
04 Mar 2019
Complement Objective Training
Complement Objective Training
Hao-Yun Chen
Pei-Hsin Wang
Chun-Hao Liu
Shih-Chieh Chang
Jia Pan
Yutian Chen
Wei Wei
Da-Cheng Juan
AAML
71
49
0
04 Mar 2019
A Kernelized Manifold Mapping to Diminish the Effect of Adversarial
  Perturbations
A Kernelized Manifold Mapping to Diminish the Effect of Adversarial Perturbations
Saeid Asgari Taghanaki
Kumar Abhishek
Shekoofeh Azizi
Ghassan Hamarneh
AAML
89
41
0
03 Mar 2019
PuVAE: A Variational Autoencoder to Purify Adversarial Examples
PuVAE: A Variational Autoencoder to Purify Adversarial Examples
Uiwon Hwang
Jaewoo Park
Hyemi Jang
Sungroh Yoon
N. Cho
AAML
75
77
0
02 Mar 2019
TamperNN: Efficient Tampering Detection of Deployed Neural Nets
TamperNN: Efficient Tampering Detection of Deployed Neural Nets
Erwan Le Merrer
Gilles Tredan
MLAUAAML
21
9
0
01 Mar 2019
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents
Panagiota Kiourti
Kacper Wardega
Susmit Jha
Wenchao Li
AAML
66
53
0
01 Mar 2019
On the Effectiveness of Low Frequency Perturbations
On the Effectiveness of Low Frequency Perturbations
Yash Sharma
G. Ding
Marcus A. Brubaker
AAML
92
126
0
28 Feb 2019
Adversarial Attack and Defense on Point Sets
Adversarial Attack and Defense on Point Sets
Jiancheng Yang
Qiang Zhang
Rongyao Fang
Bingbing Ni
Jinxian Liu
Qi Tian
3DPC
112
125
0
28 Feb 2019
Tensor Dropout for Robust Learning
Tensor Dropout for Robust Learning
Arinbjorn Kolbeinsson
Jean Kossaifi
Yannis Panagakis
Adrian Bulat
Anima Anandkumar
I. Tzoulaki
Paul Matthews
OOD
147
2
0
27 Feb 2019
Single-frame Regularization for Temporally Stable CNNs
Single-frame Regularization for Temporally Stable CNNs
Gabriel Eilertsen
Rafał K. Mantiuk
Jonas Unger
88
43
0
27 Feb 2019
Disentangled Deep Autoencoding Regularization for Robust Image
  Classification
Disentangled Deep Autoencoding Regularization for Robust Image Classification
Zhenyu Duan
Martin Renqiang Min
Erran L. Li
Mingbo Cai
Yi Tian Xu
Bingbing Ni
29
2
0
27 Feb 2019
Intelligent Autonomous Things on the Battlefield
Intelligent Autonomous Things on the Battlefield
Alexander Kott
Ethan Stump
28
11
0
26 Feb 2019
Verification of Non-Linear Specifications for Neural Networks
Verification of Non-Linear Specifications for Neural Networks
Chongli Qin
Krishnamurthy Dvijotham
Dvijotham
Brendan O'Donoghue
Rudy Bunel
Robert Stanforth
Sven Gowal
J. Uesato
G. Swirszcz
Pushmeet Kohli
AAML
68
44
0
25 Feb 2019
Previous
123...464748...545556
Next