Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1607.02533
Cited By
v1
v2
v3
v4 (latest)
Adversarial examples in the physical world
8 July 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Adversarial examples in the physical world"
50 / 2,769 papers shown
Title
Knowledge-guided Semantic Computing Network
Guangming Shi
Zhongqiang Zhang
Dahua Gao
Xuemei Xie
Yihao Feng
Xinrui Ma
Danhua Liu
39
10
0
29 Sep 2018
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward
Muhammad Usama
Junaid Qadir
Ala I. Al-Fuqaha
AAML
53
20
0
26 Sep 2018
Neural Networks with Structural Resistance to Adversarial Attacks
Luca de Alfaro
AAML
45
5
0
25 Sep 2018
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBM
AAML
64
65
0
24 Sep 2018
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Bao Wang
A. Lin
Weizhi Zhu
Penghang Yin
Andrea L. Bertozzi
Stanley J. Osher
AAML
41
20
0
23 Sep 2018
Playing the Game of Universal Adversarial Perturbations
Julien Perolat
Mateusz Malinowski
Bilal Piot
Olivier Pietquin
AAML
69
25
0
20 Sep 2018
Generating 3D Adversarial Point Clouds
Chong Xiang
C. Qi
Yue Liu
3DPC
117
294
0
19 Sep 2018
Model-Protected Multi-Task Learning
Jian Liang
Ziqi Liu
Jiayu Zhou
Xiaoqian Jiang
Changshui Zhang
Fei Wang
75
13
0
18 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAML
ObjD
78
31
0
16 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
72
106
0
16 Sep 2018
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks
Siyue Wang
Tianlin Li
Pu Zhao
Wujie Wen
David Kaeli
S. Chin
Xinyu Lin
AAML
76
70
0
13 Sep 2018
Query-Efficient Black-Box Attack by Active Learning
Pengcheng Li
Jinfeng Yi
Lijun Zhang
AAML
MLAU
73
55
0
13 Sep 2018
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
57
234
0
13 Sep 2018
Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval
Zhedong Zheng
Liang Zheng
Yi Yang
Zhilan Hu
AAML
75
24
0
07 Sep 2018
A Deeper Look at 3D Shape Classifiers
Jong-Chyi Su
Matheus Gadelha
Rui Wang
Subhransu Maji
3DPC
3DV
77
103
0
07 Sep 2018
Are adversarial examples inevitable?
Ali Shafahi
Wenjie Huang
Christoph Studer
Soheil Feizi
Tom Goldstein
SILM
88
283
0
06 Sep 2018
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Svyatoslav Voloshynovskiy
AAML
57
22
0
05 Sep 2018
Adversarial Attack Type I: Cheat Classifiers by Significant Changes
Sanli Tang
Xiaolin Huang
Mingjian Chen
Chengjin Sun
J. Yang
AAML
69
2
0
03 Sep 2018
Targeted Nonlinear Adversarial Perturbations in Images and Videos
R. Rey-de-Castro
H. Rabitz
AAML
81
10
0
27 Aug 2018
Guiding Deep Learning System Testing using Surprise Adequacy
Jinhan Kim
R. Feldt
S. Yoo
AAML
ELM
76
433
0
25 Aug 2018
Maximal Jacobian-based Saliency Map Attack
R. Wiyatno
Anqi Xu
AAML
42
88
0
23 Aug 2018
zoNNscan : a boundary-entropy index for zone inspection of neural models
Adel Jaouen
Erwan Le Merrer
UQCV
62
3
0
21 Aug 2018
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
74
9
0
21 Aug 2018
Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples
George Adam
P. Smirnov
David Duvenaud
B. Haibe-Kains
Anna Goldenberg
AAML
49
10
0
20 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
44
1
0
16 Aug 2018
Deep Convolutional Networks as shallow Gaussian Processes
Adrià Garriga-Alonso
C. Rasmussen
Laurence Aitchison
BDL
UQCV
116
271
0
16 Aug 2018
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
101
123
0
16 Aug 2018
Kernel Flows: from learning kernels from data into the abyss
H. Owhadi
G. Yoo
110
90
0
13 Aug 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
80
246
0
10 Aug 2018
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Zecheng He
Tianwei Zhang
R. Lee
FedML
AAML
MLAU
62
19
0
09 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
84
13
0
08 Aug 2018
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
79
58
0
06 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
69
24
0
06 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
126
162
0
05 Aug 2018
Traits & Transferability of Adversarial Examples against Instance Segmentation & Object Detection
Raghav Gurbaxani
Shivank Mishra
AAML
41
4
0
04 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
83
85
0
03 Aug 2018
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILM
MIACV
145
79
0
31 Jul 2018
One-Shot Generation of Near-Optimal Topology through Theory-Driven Machine Learning
Ruijin Cang
Hope Yao
Yi Ren
42
0
0
27 Jul 2018
A general metric for identifying adversarial images
S. Kumar
AAML
26
0
0
26 Jul 2018
Effects of Degradations on Deep Neural Network Architectures
Prasun Roy
Subhankar Ghosh
Saumik Bhattacharya
Umapada Pal
84
137
0
26 Jul 2018
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
79
757
0
26 Jul 2018
Simultaneous Adversarial Training - Learn from Others Mistakes
Zukang Liao
AAML
GAN
53
4
0
21 Jul 2018
Physical Adversarial Examples for Object Detectors
Kevin Eykholt
Ivan Evtimov
Earlence Fernandes
Yue Liu
Amir Rahmati
Florian Tramèr
Atul Prakash
Tadayoshi Kohno
Basel Alomair
AAML
107
473
0
20 Jul 2018
Harmonic Adversarial Attack Method
Wen Heng
Shuchang Zhou
Tingting Jiang
AAML
54
6
0
18 Jul 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Tong Chen
Wenjia Niu
Yingxiao Xiang
XiaoXuan Bai
Jiqiang Liu
Zhen Han
Gang Li
AAML
62
23
0
18 Jul 2018
Motivating the Rules of the Game for Adversarial Example Research
Justin Gilmer
Ryan P. Adams
Ian Goodfellow
David G. Andersen
George E. Dahl
AAML
107
229
0
18 Jul 2018
Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions
Adnan Siraj Rakin
Jinfeng Yi
Boqing Gong
Deliang Fan
AAML
MQ
80
50
0
18 Jul 2018
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Philip Torr
AAML
116
70
0
11 Jul 2018
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks
Kimin Lee
Kibok Lee
Honglak Lee
Jinwoo Shin
OODD
201
2,074
0
10 Jul 2018
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan
Pan He
Xiaolin Li
Dapeng Oliver Wu
AAML
73
23
0
09 Jul 2018
Previous
1
2
3
...
50
51
52
...
54
55
56
Next