ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILM
    AAML
ArXivPDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,480 papers shown
Title
A Black-box Attack on Neural Networks Based on Swarm Evolutionary
  Algorithm
A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm
Xiaolei Liu
Yuheng Luo
Xiaosong Zhang
Qingxin Zhu
AAML
24
16
0
26 Jan 2019
Improving Adversarial Robustness via Promoting Ensemble Diversity
Improving Adversarial Robustness via Promoting Ensemble Diversity
Tianyu Pang
Kun Xu
Chao Du
Ning Chen
Jun Zhu
AAML
41
434
0
25 Jan 2019
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia
  Classification System
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System
Huangxun Chen
Chenyu Huang
Qianyi Huang
Qian Zhang
Wei Wang
AAML
31
26
0
12 Jan 2019
Characterizing and evaluating adversarial examples for Offline
  Handwritten Signature Verification
Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification
L. G. Hafemann
R. Sabourin
Luiz Eduardo Soares de Oliveira
AAML
11
42
0
10 Jan 2019
Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud
  Classifiers
Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers
Daniel Liu
Ronald Yu
Hao Su
3DPC
34
165
0
10 Jan 2019
Contamination Attacks and Mitigation in Multi-Party Machine Learning
Contamination Attacks and Mitigation in Multi-Party Machine Learning
Jamie Hayes
O. Ohrimenko
AAML
FedML
17
74
0
08 Jan 2019
Image Super-Resolution as a Defense Against Adversarial Attacks
Image Super-Resolution as a Defense Against Adversarial Attacks
Aamir Mustafa
Salman H. Khan
Munawar Hayat
Jianbing Shen
Ling Shao
AAML
SupR
24
167
0
07 Jan 2019
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical
  Study
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study
Xurong Li
S. Ji
Men Han
Juntao Ji
Zhenyu Ren
Yushan Liu
Chunming Wu
AAML
21
31
0
04 Jan 2019
Plug-and-Play: Improve Depth Estimation via Sparse Data Propagation
Plug-and-Play: Improve Depth Estimation via Sparse Data Propagation
Tsun-Hsuan Wang
Fu-En Wang
Juan-Ting Lin
Yi-Hsuan Tsai
Wei-Chen Chiu
Min Sun
MDE
30
25
0
20 Dec 2018
Data Fine-tuning
Data Fine-tuning
S. Chhabra
P. Majumdar
Mayank Vatsa
Richa Singh
AAML
20
13
0
10 Dec 2018
Defending Against Universal Perturbations With Shared Adversarial
  Training
Defending Against Universal Perturbations With Shared Adversarial Training
Chaithanya Kumar Mummadi
Thomas Brox
J. H. Metzen
AAML
18
60
0
10 Dec 2018
Learning Transferable Adversarial Examples via Ghost Networks
Learning Transferable Adversarial Examples via Ghost Networks
Yingwei Li
S. Bai
Yuyin Zhou
Cihang Xie
Zhishuai Zhang
Alan Yuille
AAML
39
136
0
09 Dec 2018
Feature Denoising for Improving Adversarial Robustness
Feature Denoising for Improving Adversarial Robustness
Cihang Xie
Yuxin Wu
L. V. D. van der Maaten
Alan Yuille
Kaiming He
44
904
0
09 Dec 2018
Continuous User Authentication by Contactless Wireless Sensing
Continuous User Authentication by Contactless Wireless Sensing
Fei Wang
Zhenjiang Li
Jinsong Han
24
19
0
04 Dec 2018
SentiNet: Detecting Localized Universal Attacks Against Deep Learning
  Systems
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
173
288
0
02 Dec 2018
A randomized gradient-free attack on ReLU networks
A randomized gradient-free attack on ReLU networks
Francesco Croce
Matthias Hein
AAML
37
21
0
28 Nov 2018
Image Reconstruction with Predictive Filter Flow
Image Reconstruction with Predictive Filter Flow
Shu Kong
Charless C. Fowlkes
SupR
24
13
0
28 Nov 2018
Mathematical Analysis of Adversarial Attacks
Mathematical Analysis of Adversarial Attacks
Zehao Dou
Stanley J. Osher
Bao Wang
AAML
24
18
0
15 Nov 2018
Use of Neural Signals to Evaluate the Quality of Generative Adversarial
  Network Performance in Facial Image Generation
Use of Neural Signals to Evaluate the Quality of Generative Adversarial Network Performance in Facial Image Generation
Zhengwei Wang
Graham Healy
Alan F. Smeaton
T. Ward
EGVM
39
37
0
10 Nov 2018
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
K. Makarychev
Pascal Dupré
Yury Makarychev
Giancarlo Pellegrino
Dan Boneh
AAML
29
64
0
08 Nov 2018
CAAD 2018: Iterative Ensemble Adversarial Attack
CAAD 2018: Iterative Ensemble Adversarial Attack
Jiayang Liu
Weiming Zhang
Nenghai Yu
AAML
25
4
0
07 Nov 2018
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural
  Network against Adversarial Attacks
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Faiq Khalid
Hassan Ali
Hammad Tariq
Muhammad Abdullah Hanif
Semeen Rehman
Rehan Ahmed
Muhammad Shafique
AAML
MQ
35
37
0
04 Nov 2018
Efficient Neural Network Robustness Certification with General
  Activation Functions
Efficient Neural Network Robustness Certification with General Activation Functions
Huan Zhang
Tsui-Wei Weng
Pin-Yu Chen
Cho-Jui Hsieh
Luca Daniel
AAML
11
747
0
02 Nov 2018
Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Pang Wei Koh
Jacob Steinhardt
Percy Liang
6
240
0
02 Nov 2018
MeshAdv: Adversarial Meshes for Visual Recognition
MeshAdv: Adversarial Meshes for Visual Recognition
Chaowei Xiao
Dawei Yang
Bo-wen Li
Jia Deng
M. Liu
AAML
30
25
0
11 Oct 2018
Interpretable Convolutional Neural Networks via Feedforward Design
Interpretable Convolutional Neural Networks via Feedforward Design
C.-C. Jay Kuo
Min Zhang
Siyang Li
Jiali Duan
Yueru Chen
33
155
0
05 Oct 2018
Improved robustness to adversarial examples using Lipschitz regularization of the loss
Chris Finlay
Adam M. Oberman
B. Abbasi
24
34
0
01 Oct 2018
Improving the Generalization of Adversarial Training with Domain
  Adaptation
Improving the Generalization of Adversarial Training with Domain Adaptation
Chuanbiao Song
Kun He
Liwei Wang
J. Hopcroft
AAML
OOD
28
131
0
01 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
22
67
0
30 Sep 2018
To compress or not to compress: Understanding the Interactions between
  Adversarial Attacks and Neural Network Compression
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression
Yiren Zhao
Ilia Shumailov
Robert D. Mullins
Ross J. Anderson
AAML
11
43
0
29 Sep 2018
Interpreting Adversarial Robustness: A View from Decision Surface in
  Input Space
Interpreting Adversarial Robustness: A View from Decision Surface in Input Space
Fuxun Yu
Chenchen Liu
Yanzhi Wang
Liang Zhao
Xiang Chen
AAML
OOD
33
27
0
29 Sep 2018
Knowledge-guided Semantic Computing Network
Knowledge-guided Semantic Computing Network
Guangming Shi
Zhongqiang Zhang
Dahua Gao
Xuemei Xie
Yihao Feng
Xinrui Ma
Danhua Liu
18
8
0
29 Sep 2018
Fast Geometrically-Perturbed Adversarial Faces
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBM
AAML
29
65
0
24 Sep 2018
Generating 3D Adversarial Point Clouds
Generating 3D Adversarial Point Clouds
Chong Xiang
C. Qi
Bo-wen Li
3DPC
24
286
0
19 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
14
105
0
16 Sep 2018
Query-Efficient Black-Box Attack by Active Learning
Query-Efficient Black-Box Attack by Active Learning
Pengcheng Li
Jinfeng Yi
Lijun Zhang
AAML
MLAU
21
54
0
13 Sep 2018
Targeted Nonlinear Adversarial Perturbations in Images and Videos
Targeted Nonlinear Adversarial Perturbations in Images and Videos
R. Rey-de-Castro
H. Rabitz
AAML
16
10
0
27 Aug 2018
Maximal Jacobian-based Saliency Map Attack
Maximal Jacobian-based Saliency Map Attack
R. Wiyatno
Anqi Xu
AAML
8
87
0
23 Aug 2018
Controlling Over-generalization and its Effect on Adversarial Examples
  Generation and Detection
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
24
9
0
21 Aug 2018
Distributionally Adversarial Attack
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
21
121
0
16 Aug 2018
Kernel Flows: from learning kernels from data into the abyss
Kernel Flows: from learning kernels from data into the abyss
H. Owhadi
G. Yoo
18
88
0
13 Aug 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
23
241
0
10 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
36
13
0
08 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better
  Interpretability
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
X. Lin
AAML
16
160
0
05 Aug 2018
Motivating the Rules of the Game for Adversarial Example Research
Motivating the Rules of the Game for Adversarial Example Research
Justin Gilmer
Ryan P. Adams
Ian Goodfellow
David G. Andersen
George E. Dahl
AAML
50
226
0
18 Jul 2018
With Friends Like These, Who Needs Adversaries?
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Philip Torr
AAML
21
70
0
11 Jul 2018
A Simple Unified Framework for Detecting Out-of-Distribution Samples and
  Adversarial Attacks
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks
Kimin Lee
Kibok Lee
Honglak Lee
Jinwoo Shin
OODD
23
1,997
0
10 Jul 2018
Vulnerability Analysis of Chest X-Ray Image Classification Against
  Adversarial Attacks
Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks
Saeid Asgari Taghanaki
A. Das
Ghassan Hamarneh
MedIm
35
52
0
09 Jul 2018
Adversarial Examples in Deep Learning: Characterization and Divergence
Adversarial Examples in Deep Learning: Characterization and Divergence
Wenqi Wei
Ling Liu
Margaret Loper
Stacey Truex
Lei Yu
Mehmet Emre Gursoy
Yanzhao Wu
AAML
SILM
33
18
0
29 Jun 2018
Non-Negative Networks Against Adversarial Attacks
Non-Negative Networks Against Adversarial Attacks
William Fleshman
Edward Raff
Jared Sylvester
Steven Forsyth
Mark McLean
AAML
27
41
0
15 Jun 2018
Previous
123...47484950
Next