ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for
  Deep Neural Networks
A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for Deep Neural Networks
Long Zhang
Xuechao Sun
Yong Li
Zhenyu Zhang
AAML
53
22
0
01 Jan 2019
Training with the Invisibles: Obfuscating Images to Share Safely for Learning Visual Recognition Models
Tae-Hoon Kim
Dongmin Kang
K. Pulli
Jonghyun Choi
79
14
0
01 Jan 2019
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving
  Systems
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems
Husheng Zhou
Wei Li
Yuankun Zhu
Yuqun Zhang
Bei Yu
Lingming Zhang
Cong Liu
AAML
85
179
0
27 Dec 2018
Seeing isn't Believing: Practical Adversarial Attack Against Object
  Detectors
Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors
Yue Zhao
Hong Zhu
Ruigang Liang
Qintao Shen
Shengzhi Zhang
Kai Chen
AAML
65
15
0
26 Dec 2018
A Data-driven Adversarial Examples Recognition Framework via Adversarial
  Feature Genome
A Data-driven Adversarial Examples Recognition Framework via Adversarial Feature Genome
Li Chen
Qi Li
Jiawei Zhu
Jian Peng
Haifeng Li
AAML
59
3
0
25 Dec 2018
PPD: Permutation Phase Defense Against Adversarial Examples in Deep
  Learning
PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning
Mehdi Jafarnia-Jahromi
Tasmin Chowdhury
Hsin-Tai Wu
S. Mukherjee
AAML
47
4
0
25 Dec 2018
Exploiting the Inherent Limitation of L0 Adversarial Examples
Exploiting the Inherent Limitation of L0 Adversarial Examples
F. Zuo
Bokai Yang
Xiaopeng Li
Lannan Luo
Qiang Zeng
AAML
47
1
0
23 Dec 2018
Towards resilient machine learning for ransomware detection
Towards resilient machine learning for ransomware detection
Li-Wei Chen
Chih-Yuan Yang
Anindya Paul
R. Sahita
AAML
36
22
0
21 Dec 2018
Plug-and-Play: Improve Depth Estimation via Sparse Data Propagation
Plug-and-Play: Improve Depth Estimation via Sparse Data Propagation
Tsun-Hsuan Wang
Fu-En Wang
Juan-Ting Lin
Yi-Hsuan Tsai
Wei-Chen Chiu
Min Sun
MDE
87
25
0
20 Dec 2018
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware
  Samples: Principles, Framework, and AICS'2019 Challenge
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge
Deqiang Li
Qianmu Li
Yanfang Ye
Shouhuai Xu
AAML
64
15
0
19 Dec 2018
A Survey of Safety and Trustworthiness of Deep Neural Networks:
  Verification, Testing, Adversarial Attack and Defence, and Interpretability
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability
Xiaowei Huang
Daniel Kroening
Wenjie Ruan
Marta Kwiatkowska
Youcheng Sun
Emese Thamo
Min Wu
Xinping Yi
AAML
132
51
0
18 Dec 2018
Designing Adversarially Resilient Classifiers using Resilient Feature
  Engineering
Designing Adversarially Resilient Classifiers using Resilient Feature Engineering
Kevin Eykholt
A. Prakash
AAML
60
4
0
17 Dec 2018
Trust Region Based Adversarial Attack on Neural Networks
Trust Region Based Adversarial Attack on Neural Networks
Z. Yao
A. Gholami
Peng Xu
Kurt Keutzer
Michael W. Mahoney
AAML
64
54
0
16 Dec 2018
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on
  Generation of Adversarial Examples
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples
E. Balda
Arash Behboodi
R. Mathar
AAML
30
5
0
15 Dec 2018
On the Security of Randomized Defenses Against Adversarial Samples
On the Security of Randomized Defenses Against Adversarial Samples
K. Sharad
G. Marson
H. Truong
Ghassan O. Karame
AAML
47
1
0
11 Dec 2018
Data Fine-tuning
Data Fine-tuning
S. Chhabra
P. Majumdar
Mayank Vatsa
Richa Singh
AAML
108
13
0
10 Dec 2018
Defending Against Universal Perturbations With Shared Adversarial
  Training
Defending Against Universal Perturbations With Shared Adversarial Training
Chaithanya Kumar Mummadi
Thomas Brox
J. H. Metzen
AAML
84
60
0
10 Dec 2018
Learning Transferable Adversarial Examples via Ghost Networks
Learning Transferable Adversarial Examples via Ghost Networks
Yingwei Li
S. Bai
Yuyin Zhou
Cihang Xie
Zhishuai Zhang
Alan Yuille
AAML
132
137
0
09 Dec 2018
Feature Denoising for Improving Adversarial Robustness
Feature Denoising for Improving Adversarial Robustness
Cihang Xie
Yuxin Wu
Laurens van der Maaten
Alan Yuille
Kaiming He
172
916
0
09 Dec 2018
Detecting Adversarial Examples in Convolutional Neural Networks
Detecting Adversarial Examples in Convolutional Neural Networks
Stefanos Pertigkiozoglou
Petros Maragos
GANAAML
75
16
0
08 Dec 2018
Fooling Network Interpretation in Image Classification
Fooling Network Interpretation in Image Classification
Akshayvarun Subramanya
Vipin Pillai
Hamed Pirsiavash
AAMLFAtt
49
7
0
06 Dec 2018
Prior Networks for Detection of Adversarial Attacks
Prior Networks for Detection of Adversarial Attacks
A. Malinin
Mark Gales
AAML
69
5
0
06 Dec 2018
Towards Leveraging the Information of Gradients in Optimization-based
  Adversarial Attack
Towards Leveraging the Information of Gradients in Optimization-based Adversarial Attack
Jingyang Zhang
Hsin-Pai Cheng
Chunpeng Wu
Hai Helen Li
Yiran Chen
AAML
41
0
0
06 Dec 2018
SADA: Semantic Adversarial Diagnostic Attacks for Autonomous
  Applications
SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications
Abdullah Hamdi
Matthias Muller
Guohao Li
AAML
84
26
0
05 Dec 2018
Continuous User Authentication by Contactless Wireless Sensing
Continuous User Authentication by Contactless Wireless Sensing
Fei Wang
Zhenjiang Li
Jinsong Han
43
19
0
04 Dec 2018
Adversarial Example Decomposition
Adversarial Example Decomposition
Horace He
Aaron Lou
Qingxuan Jiang
Isay Katsman
Serge J. Belongie
Ser-Nam Lim
AAML
28
0
0
04 Dec 2018
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAMLOOD
311
285
0
03 Dec 2018
Universal Perturbation Attack Against Image Retrieval
Universal Perturbation Attack Against Image Retrieval
Jie Li
Rongrong Ji
Hong Liu
Xiaopeng Hong
Yue Gao
Q. Tian
AAML
98
100
0
03 Dec 2018
SentiNet: Detecting Localized Universal Attacks Against Deep Learning
  Systems
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
240
294
0
02 Dec 2018
FineFool: Fine Object Contour Attack via Attention
FineFool: Fine Object Contour Attack via Attention
Jinyin Chen
Haibin Zheng
Hui Xiong
Mengmeng Su
AAML
60
3
0
01 Dec 2018
Effects of Loss Functions And Target Representations on Adversarial
  Robustness
Effects of Loss Functions And Target Representations on Adversarial Robustness
Sean Saito
S. Roy
AAML
72
7
0
01 Dec 2018
Adversarial Defense by Stratified Convolutional Sparse Coding
Adversarial Defense by Stratified Convolutional Sparse Coding
Bo Sun
Nian-hsuan Tsai
Fangchen Liu
Ronald Yu
Hao Su
AAML
83
76
0
30 Nov 2018
An Adversarial Approach for Explainable AI in Intrusion Detection
  Systems
An Adversarial Approach for Explainable AI in Intrusion Detection Systems
Daniel L. Marino
Chathurika S. Wickramasinghe
Milos Manic
AAML
53
110
0
28 Nov 2018
A randomized gradient-free attack on ReLU networks
A randomized gradient-free attack on ReLU networks
Francesco Croce
Matthias Hein
AAML
74
21
0
28 Nov 2018
Image Reconstruction with Predictive Filter Flow
Image Reconstruction with Predictive Filter Flow
Shu Kong
Charless C. Fowlkes
SupR
117
13
0
28 Nov 2018
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Jinghui Chen
Dongruo Zhou
Jinfeng Yi
Quanquan Gu
AAML
93
68
0
27 Nov 2018
ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and
  Robust Accuracies
ResNets Ensemble via the Feynman-Kac Formalism to Improve Natural and Robust Accuracies
Bao Wang
Binjie Yuan
Zuoqiang Shi
Stanley J. Osher
AAMLOOD
78
15
0
26 Nov 2018
Bilateral Adversarial Training: Towards Fast Training of More Robust
  Models Against Adversarial Attacks
Bilateral Adversarial Training: Towards Fast Training of More Robust Models Against Adversarial Attacks
Jianyu Wang
Haichao Zhang
OODAAML
87
119
0
26 Nov 2018
Noisy Computations during Inference: Harmful or Helpful?
Noisy Computations during Inference: Harmful or Helpful?
Minghai Qin
D. Vučinić
AAML
31
5
0
26 Nov 2018
Attention, Please! Adversarial Defense via Activation Rectification and
  Preservation
Attention, Please! Adversarial Defense via Activation Rectification and Preservation
Shangxi Wu
Jitao Sang
Kaiyuan Xu
Jiaming Zhang
Jian Yu
AAML
52
7
0
24 Nov 2018
Decoupling Direction and Norm for Efficient Gradient-Based L2
  Adversarial Attacks and Defenses
Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses
Jérôme Rony
L. G. Hafemann
Luiz Eduardo Soares de Oliveira
Ismail Ben Ayed
R. Sabourin
Eric Granger
AAML
78
299
0
23 Nov 2018
Parametric Noise Injection: Trainable Randomness to Improve Deep Neural
  Network Robustness against Adversarial Attack
Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness against Adversarial Attack
Adnan Siraj Rakin
Zhezhi He
Deliang Fan
AAML
67
292
0
22 Nov 2018
Detecting Adversarial Perturbations Through Spatial Behavior in
  Activation Spaces
Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Ziv Katzir
Yuval Elovici
AAML
60
26
0
22 Nov 2018
Task-generalizable Adversarial Attack based on Perceptual Metric
Task-generalizable Adversarial Attack based on Perceptual Metric
Muzammal Naseer
Salman H. Khan
Shafin Rahman
Fatih Porikli
AAML
73
40
0
22 Nov 2018
How the Softmax Output is Misleading for Evaluating the Strength of
  Adversarial Examples
How the Softmax Output is Misleading for Evaluating the Strength of Adversarial Examples
Utku Ozbulak
W. D. Neve
Arnout Van Messem
AAML
39
7
0
21 Nov 2018
MimicGAN: Corruption-Mimicking for Blind Image Recovery & Adversarial
  Defense
MimicGAN: Corruption-Mimicking for Blind Image Recovery & Adversarial Defense
Rushil Anirudh
Jayaraman J. Thiagarajan
B. Kailkhura
T. Bremer
GAN
53
2
0
20 Nov 2018
Intermediate Level Adversarial Attack for Enhanced Transferability
Intermediate Level Adversarial Attack for Enhanced Transferability
Qian Huang
Zeqi Gu
Isay Katsman
Horace He
Pian Pawakapan
Zhiqiu Lin
Serge J. Belongie
Ser-Nam Lim
AAMLSILM
54
4
0
20 Nov 2018
Convolutional Neural Networks with Transformed Input based on Robust
  Tensor Network Decomposition
Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Jenn-Bing Ong
W. Ng
C.-C. Jay Kuo
AAML
53
0
0
20 Nov 2018
Optimal Transport Classifier: Defending Against Adversarial Attacks by
  Regularized Deep Embedding
Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Yao Li
Martin Renqiang Min
Wenchao Yu
Cho-Jui Hsieh
T. C. Lee
E. Kruus
OT
60
7
0
19 Nov 2018
The Taboo Trap: Behavioural Detection of Adversarial Samples
The Taboo Trap: Behavioural Detection of Adversarial Samples
Ilia Shumailov
Yiren Zhao
Robert D. Mullins
Ross J. Anderson
AAML
59
14
0
18 Nov 2018
Previous
123...484950...545556
Next