Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,710 papers shown
Title
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
26
243
0
10 Aug 2018
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Zecheng He
Tianwei Zhang
R. Lee
FedML
AAML
MLAU
22
18
0
09 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
42
13
0
08 Aug 2018
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
33
58
0
06 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-man Cheung
C.-C. Jay Kuo
20
24
0
06 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
29
160
0
05 Aug 2018
Traits & Transferability of Adversarial Examples against Instance Segmentation & Object Detection
Raghav Gurbaxani
Shivank Mishra
AAML
11
4
0
04 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
21
85
0
03 Aug 2018
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILM
MIACV
48
77
0
31 Jul 2018
One-Shot Generation of Near-Optimal Topology through Theory-Driven Machine Learning
Ruijin Cang
Hope Yao
Yi Ren
24
0
0
27 Jul 2018
A general metric for identifying adversarial images
S. Kumar
AAML
24
0
0
26 Jul 2018
Effects of Degradations on Deep Neural Network Architectures
Prasun Roy
Subhankar Ghosh
Saumik Bhattacharya
Umapada Pal
25
133
0
26 Jul 2018
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
17
736
0
26 Jul 2018
Simultaneous Adversarial Training - Learn from Others Mistakes
Zukang Liao
AAML
GAN
22
4
0
21 Jul 2018
Physical Adversarial Examples for Object Detectors
Kevin Eykholt
Ivan Evtimov
Earlence Fernandes
Bo Li
Amir Rahmati
Florian Tramèr
Atul Prakash
Tadayoshi Kohno
D. Song
AAML
24
466
0
20 Jul 2018
Harmonic Adversarial Attack Method
Wen Heng
Shuchang Zhou
Tingting Jiang
AAML
22
6
0
18 Jul 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Tong Chen
Wenjia Niu
Yingxiao Xiang
XiaoXuan Bai
Jiqiang Liu
Zhen Han
Gang Li
AAML
25
22
0
18 Jul 2018
Motivating the Rules of the Game for Adversarial Example Research
Justin Gilmer
Ryan P. Adams
Ian Goodfellow
David G. Andersen
George E. Dahl
AAML
50
226
0
18 Jul 2018
Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions
Adnan Siraj Rakin
Jinfeng Yi
Boqing Gong
Deliang Fan
AAML
MQ
24
50
0
18 Jul 2018
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Philip Torr
AAML
21
70
0
11 Jul 2018
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks
Kimin Lee
Kibok Lee
Honglak Lee
Jinwoo Shin
OODD
23
2,008
0
10 Jul 2018
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan
Pan He
Xiaolin Li
Dapeng Oliver Wu
AAML
20
23
0
09 Jul 2018
Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks
Saeid Asgari Taghanaki
A. Das
Ghassan Hamarneh
MedIm
43
52
0
09 Jul 2018
Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness
Priyadarshini Panda
Kaushik Roy
AAML
22
4
0
05 Jul 2018
Deep Learning for Launching and Mitigating Wireless Jamming Attacks
T. Erpek
Y. Sagduyu
Yi Shi
AAML
14
190
0
03 Jul 2018
How To Backdoor Federated Learning
Eugene Bagdasaryan
Andreas Veit
Yiqing Hua
D. Estrin
Vitaly Shmatikov
SILM
FedML
18
1,879
0
02 Jul 2018
Adversarial Examples in Deep Learning: Characterization and Divergence
Wenqi Wei
Ling Liu
Margaret Loper
Stacey Truex
Lei Yu
Mehmet Emre Gursoy
Yanzhao Wu
AAML
SILM
36
18
0
29 Jun 2018
A New Angle on L2 Regularization
T. Tanay
Lewis D. Griffin
LLMSV
19
5
0
28 Jun 2018
Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
J. Dhaliwal
S. Shintre
AAML
31
15
0
27 Jun 2018
Customizing an Adversarial Example Generator with Class-Conditional GANs
Shih-hong Tsai
GAN
AAML
28
4
0
27 Jun 2018
Adversarial Distillation of Bayesian Neural Network Posteriors
Kuan-Chieh Wang
Paul Vicol
James Lucas
Li Gu
Roger C. Grosse
R. Zemel
UQCV
GAN
AAML
BDL
24
56
0
27 Jun 2018
Stroke-based Character Reconstruction
Zhewei Huang
Wen Heng
Yuanzheng Tao
Shuchang Zhou
16
4
0
23 Jun 2018
Evaluation of Momentum Diverse Input Iterative Fast Gradient Sign Method (M-DI2-FGSM) Based Attack Method on MCS 2018 Adversarial Attacks on Black Box Face Recognition System
Md Ashraful Alam Milton
AAML
11
16
0
23 Jun 2018
Detection based Defense against Adversarial Examples from the Steganalysis Point of View
Jiayang Liu
Weiming Zhang
Yiwei Zhang
Dongdong Hou
Yujia Liu
Hongyue Zha
Nenghai Yu
AAML
25
99
0
21 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
20
7
0
19 Jun 2018
Non-Negative Networks Against Adversarial Attacks
William Fleshman
Edward Raff
Jared Sylvester
Steven Forsyth
Mark McLean
AAML
27
41
0
15 Jun 2018
Adversarial Attacks on Variational Autoencoders
George Gondim-Ribeiro
Pedro Tabacof
Eduardo Valle
AAML
DRL
19
43
0
12 Jun 2018
An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks
Chirag Agarwal
Bo Dong
Dan Schonfeld
A. Hoogs
21
2
0
05 Jun 2018
PAC-learning in the presence of evasion adversaries
Daniel Cullina
A. Bhagoji
Prateek Mittal
AAML
37
53
0
05 Jun 2018
Sequential Attacks on Agents for Long-Term Adversarial Goals
E. Tretschk
Seong Joon Oh
Mario Fritz
OnRL
329
47
1
31 May 2018
Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Puyudi Yang
Jianbo Chen
Cho-Jui Hsieh
Jane-ling Wang
Michael I. Jordan
AAML
SILM
22
115
0
31 May 2018
Why do deep convolutional networks generalize so poorly to small image transformations?
Aharon Azulay
Yair Weiss
37
557
0
30 May 2018
Robustness May Be at Odds with Accuracy
Dimitris Tsipras
Shibani Santurkar
Logan Engstrom
Alexander Turner
Aleksander Madry
AAML
39
1,757
0
30 May 2018
Towards Adversarial Configurations for Software Product Lines
Paul Temple
M. Acher
Battista Biggio
J. Jézéquel
Fabio Roli
AAML
8
6
0
30 May 2018
Adversarial Noise Attacks of Deep Learning Architectures -- Stability Analysis via Sparse Modeled Signals
Yaniv Romano
Aviad Aberdam
Jeremias Sulam
Michael Elad
AAML
22
22
0
29 May 2018
Virtuously Safe Reinforcement Learning
Henrik Aslund
El-Mahdi El-Mhamdi
R. Guerraoui
Alexandre Maurer
22
5
0
29 May 2018
Adversarial Examples in Remote Sensing
W. Czaja
Neil Fendley
M. Pekala
Christopher R. Ratto
I-J. Wang
AAML
22
68
0
28 May 2018
Dirichlet-based Gaussian Processes for Large-scale Calibrated Classification
Dimitrios Milios
Raffaello Camoriano
Pietro Michiardi
Lorenzo Rosasco
Maurizio Filippone
UQCV
35
74
0
28 May 2018
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
M. Alzantot
Yash Sharma
Supriyo Chakraborty
Huan Zhang
Cho-Jui Hsieh
Mani B. Srivastava
AAML
24
257
0
28 May 2018
Defending Against Adversarial Attacks by Leveraging an Entire GAN
G. Santhanam
Paulina Grnarova
AAML
16
40
0
27 May 2018
Previous
1
2
3
...
50
51
52
53
54
55
Next