ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1607.02533
  4. Cited By
Adversarial examples in the physical world
v1v2v3v4 (latest)

Adversarial examples in the physical world

8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial examples in the physical world"

50 / 2,769 papers shown
Title
Knowledge-guided Semantic Computing Network
Knowledge-guided Semantic Computing Network
Guangming Shi
Zhongqiang Zhang
Dahua Gao
Xuemei Xie
Yihao Feng
Xinrui Ma
Danhua Liu
39
10
0
29 Sep 2018
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge
  and the Way Forward
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward
Muhammad Usama
Junaid Qadir
Ala I. Al-Fuqaha
AAML
53
20
0
26 Sep 2018
Neural Networks with Structural Resistance to Adversarial Attacks
Neural Networks with Structural Resistance to Adversarial Attacks
Luca de Alfaro
AAML
45
5
0
25 Sep 2018
Fast Geometrically-Perturbed Adversarial Faces
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBMAAML
64
65
0
24 Sep 2018
Adversarial Defense via Data Dependent Activation Function and Total
  Variation Minimization
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Bao Wang
A. Lin
Weizhi Zhu
Penghang Yin
Andrea L. Bertozzi
Stanley J. Osher
AAML
41
20
0
23 Sep 2018
Playing the Game of Universal Adversarial Perturbations
Playing the Game of Universal Adversarial Perturbations
Julien Perolat
Mateusz Malinowski
Bilal Piot
Olivier Pietquin
AAML
69
25
0
20 Sep 2018
Generating 3D Adversarial Point Clouds
Generating 3D Adversarial Point Clouds
Chong Xiang
C. Qi
Yue Liu
3DPC
117
294
0
19 Sep 2018
Model-Protected Multi-Task Learning
Model-Protected Multi-Task Learning
Jian Liang
Ziqi Liu
Jiayu Zhou
Xiaoqian Jiang
Changshui Zhang
Fei Wang
75
13
0
18 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors
  via Imperceptible Background Patches
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAMLObjD
78
31
0
16 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
72
106
0
16 Sep 2018
Defensive Dropout for Hardening Deep Neural Networks under Adversarial
  Attacks
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks
Siyue Wang
Tianlin Li
Pu Zhao
Wujie Wen
David Kaeli
S. Chin
Xinyu Lin
AAML
76
70
0
13 Sep 2018
Query-Efficient Black-Box Attack by Active Learning
Query-Efficient Black-Box Attack by Active Learning
Pengcheng Li
Jinfeng Yi
Lijun Zhang
AAMLMLAU
73
55
0
13 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
57
234
0
13 Sep 2018
Query Attack via Opposite-Direction Feature:Towards Robust Image
  Retrieval
Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval
Zhedong Zheng
Liang Zheng
Yi Yang
Zhilan Hu
AAML
75
24
0
07 Sep 2018
A Deeper Look at 3D Shape Classifiers
A Deeper Look at 3D Shape Classifiers
Jong-Chyi Su
Matheus Gadelha
Rui Wang
Subhransu Maji
3DPC3DV
77
103
0
07 Sep 2018
Are adversarial examples inevitable?
Are adversarial examples inevitable?
Ali Shafahi
Wenjie Huang
Christoph Studer
Soheil Feizi
Tom Goldstein
SILM
88
283
0
06 Sep 2018
Bridging machine learning and cryptography in defence against
  adversarial attacks
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Svyatoslav Voloshynovskiy
AAML
57
22
0
05 Sep 2018
Adversarial Attack Type I: Cheat Classifiers by Significant Changes
Adversarial Attack Type I: Cheat Classifiers by Significant Changes
Sanli Tang
Xiaolin Huang
Mingjian Chen
Chengjin Sun
J. Yang
AAML
69
2
0
03 Sep 2018
Targeted Nonlinear Adversarial Perturbations in Images and Videos
Targeted Nonlinear Adversarial Perturbations in Images and Videos
R. Rey-de-Castro
H. Rabitz
AAML
81
10
0
27 Aug 2018
Guiding Deep Learning System Testing using Surprise Adequacy
Guiding Deep Learning System Testing using Surprise Adequacy
Jinhan Kim
R. Feldt
S. Yoo
AAMLELM
76
433
0
25 Aug 2018
Maximal Jacobian-based Saliency Map Attack
Maximal Jacobian-based Saliency Map Attack
R. Wiyatno
Anqi Xu
AAML
42
88
0
23 Aug 2018
zoNNscan : a boundary-entropy index for zone inspection of neural models
zoNNscan : a boundary-entropy index for zone inspection of neural models
Adel Jaouen
Erwan Le Merrer
UQCV
62
3
0
21 Aug 2018
Controlling Over-generalization and its Effect on Adversarial Examples
  Generation and Detection
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
74
9
0
21 Aug 2018
Stochastic Combinatorial Ensembles for Defending Against Adversarial
  Examples
Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples
George Adam
P. Smirnov
David Duvenaud
B. Haibe-Kains
Anna Goldenberg
AAML
49
10
0
20 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
44
1
0
16 Aug 2018
Deep Convolutional Networks as shallow Gaussian Processes
Deep Convolutional Networks as shallow Gaussian Processes
Adrià Garriga-Alonso
C. Rasmussen
Laurence Aitchison
BDLUQCV
116
271
0
16 Aug 2018
Distributionally Adversarial Attack
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
101
123
0
16 Aug 2018
Kernel Flows: from learning kernels from data into the abyss
Kernel Flows: from learning kernels from data into the abyss
H. Owhadi
G. Yoo
110
90
0
13 Aug 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
80
246
0
10 Aug 2018
VerIDeep: Verifying Integrity of Deep Neural Networks through
  Sensitive-Sample Fingerprinting
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Zecheng He
Tianwei Zhang
R. Lee
FedMLAAMLMLAU
62
19
0
09 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
84
13
0
08 Aug 2018
Adversarial Vision Challenge
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
79
58
0
06 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
69
24
0
06 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better
  Interpretability
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
126
162
0
05 Aug 2018
Traits & Transferability of Adversarial Examples against Instance
  Segmentation & Object Detection
Traits & Transferability of Adversarial Examples against Instance Segmentation & Object Detection
Raghav Gurbaxani
Shivank Mishra
AAML
41
4
0
04 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class
  Impressions
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
83
85
0
03 Aug 2018
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILMMIACV
145
79
0
31 Jul 2018
One-Shot Generation of Near-Optimal Topology through Theory-Driven
  Machine Learning
One-Shot Generation of Near-Optimal Topology through Theory-Driven Machine Learning
Ruijin Cang
Hope Yao
Yi Ren
42
0
0
27 Jul 2018
A general metric for identifying adversarial images
A general metric for identifying adversarial images
S. Kumar
AAML
26
0
0
26 Jul 2018
Effects of Degradations on Deep Neural Network Architectures
Effects of Degradations on Deep Neural Network Architectures
Prasun Roy
Subhankar Ghosh
Saumik Bhattacharya
Umapada Pal
84
137
0
26 Jul 2018
HiDDeN: Hiding Data With Deep Networks
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
79
757
0
26 Jul 2018
Simultaneous Adversarial Training - Learn from Others Mistakes
Simultaneous Adversarial Training - Learn from Others Mistakes
Zukang Liao
AAMLGAN
53
4
0
21 Jul 2018
Physical Adversarial Examples for Object Detectors
Physical Adversarial Examples for Object Detectors
Kevin Eykholt
Ivan Evtimov
Earlence Fernandes
Yue Liu
Amir Rahmati
Florian Tramèr
Atul Prakash
Tadayoshi Kohno
Basel Alomair
AAML
107
473
0
20 Jul 2018
Harmonic Adversarial Attack Method
Harmonic Adversarial Attack Method
Wen Heng
Shuchang Zhou
Tingting Jiang
AAML
54
6
0
18 Jul 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity
  of A3C Path Finding
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Tong Chen
Wenjia Niu
Yingxiao Xiang
XiaoXuan Bai
Jiqiang Liu
Zhen Han
Gang Li
AAML
62
23
0
18 Jul 2018
Motivating the Rules of the Game for Adversarial Example Research
Motivating the Rules of the Game for Adversarial Example Research
Justin Gilmer
Ryan P. Adams
Ian Goodfellow
David G. Andersen
George E. Dahl
AAML
107
229
0
18 Jul 2018
Defend Deep Neural Networks Against Adversarial Examples via Fixed and
  Dynamic Quantized Activation Functions
Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions
Adnan Siraj Rakin
Jinfeng Yi
Boqing Gong
Deliang Fan
AAMLMQ
80
50
0
18 Jul 2018
With Friends Like These, Who Needs Adversaries?
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Philip Torr
AAML
116
70
0
11 Jul 2018
A Simple Unified Framework for Detecting Out-of-Distribution Samples and
  Adversarial Attacks
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks
Kimin Lee
Kibok Lee
Honglak Lee
Jinwoo Shin
OODD
201
2,074
0
10 Jul 2018
Adaptive Adversarial Attack on Scene Text Recognition
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan
Pan He
Xiaolin Li
Dapeng Oliver Wu
AAML
73
23
0
09 Jul 2018
Previous
123...505152...545556
Next