ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.00530
  4. Cited By
Early Methods for Detecting Adversarial Images

Early Methods for Detecting Adversarial Images

1 August 2016
Dan Hendrycks
Kevin Gimpel
    AAML
ArXivPDFHTML

Papers citing "Early Methods for Detecting Adversarial Images"

50 / 101 papers shown
Title
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial
  Purification
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial Purification
Hanrui Wang
Ruoxi Sun
Cunjian Chen
Minhui Xue
Lay-Ki Soon
Shuo Wang
Zhe Jin
DiffM
AAML
39
2
0
20 Aug 2024
Panda or not Panda? Understanding Adversarial Attacks with Interactive
  Visualization
Panda or not Panda? Understanding Adversarial Attacks with Interactive Visualization
Yuzhe You
Jarvis Tse
Jian Zhao
AAML
25
3
0
22 Nov 2023
Beyond Labeling Oracles: What does it mean to steal ML models?
Beyond Labeling Oracles: What does it mean to steal ML models?
Avital Shafran
Ilia Shumailov
Murat A. Erdogdu
Nicolas Papernot
AAML
37
4
0
03 Oct 2023
Computational Asymmetries in Robust Classification
Computational Asymmetries in Robust Classification
Samuele Marro
M. Lombardi
AAML
21
0
0
25 Jun 2023
Inference Time Evidences of Adversarial Attacks for Forensic on
  Transformers
Inference Time Evidences of Adversarial Attacks for Forensic on Transformers
Hugo Lemarchant
Liang Li
Yiming Qian
Yuta Nakashima
Hajime Nagahara
ViT
AAML
43
0
0
31 Jan 2023
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for
  Improving Adversarial Training
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Junhao Dong
Seyed-Mohsen Moosavi-Dezfooli
Jianhuang Lai
Xiaohua Xie
AAML
50
28
0
01 Nov 2022
Robust Models are less Over-Confident
Robust Models are less Over-Confident
Julia Grabinski
Paul Gavrikov
J. Keuper
M. Keuper
AAML
36
24
0
12 Oct 2022
An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
Guanxiong Liu
Abdallah Khreishah
Fatima Sharadgah
Issa M. Khalil
AAML
30
8
0
05 Sep 2022
Towards Adversarial Purification using Denoising AutoEncoders
Towards Adversarial Purification using Denoising AutoEncoders
Dvij Kalaria
Aritra Hazra
P. Chakrabarti
DiffM
25
4
0
29 Aug 2022
Resisting Adversarial Attacks in Deep Neural Networks using Diverse
  Decision Boundaries
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Manaar Alam
Shubhajit Datta
Debdeep Mukhopadhyay
Arijit Mondal
P. Chakrabarti
AAML
20
5
0
18 Aug 2022
Sanitization of Visual Multimedia Content: A Survey of Techniques,
  Attacks, and Future Directions
Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions
Hanaa Abbas
Roberto Di Pietro
34
2
0
05 Jul 2022
Mixture GAN For Modulation Classification Resiliency Against Adversarial
  Attacks
Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Eyad Shtaiwi
Ahmed El Ouadrhiri
Majid Moradikia
Salma Sultana
Ahmed M Abdelhadi
Zhu Han
AAML
GAN
30
7
0
29 May 2022
Btech thesis report on adversarial attack detection and purification of
  adverserially attacked images
Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Dvij Kalaria
AAML
10
1
0
09 May 2022
Semantic interpretation for convolutional neural networks: What makes a
  cat a cat?
Semantic interpretation for convolutional neural networks: What makes a cat a cat?
Haonan Xu
Yuntian Chen
Dongxiao Zhang
FAtt
33
3
0
16 Apr 2022
"That Is a Suspicious Reaction!": Interpreting Logits Variation to
  Detect NLP Adversarial Attacks
"That Is a Suspicious Reaction!": Interpreting Logits Variation to Detect NLP Adversarial Attacks
Edoardo Mosca
Shreyash Agarwal
Javier Rando
Georg Groh
AAML
32
30
0
10 Apr 2022
Adversarial Robustness of Deep Reinforcement Learning based Dynamic
  Recommender Systems
Adversarial Robustness of Deep Reinforcement Learning based Dynamic Recommender Systems
Siyu Wang
Yuanjiang Cao
Xiaocong Chen
L. Yao
Xianzhi Wang
Quan.Z Sheng
AAML
23
3
0
02 Dec 2021
Detecting Adversaries, yet Faltering to Noise? Leveraging Conditional
  Variational AutoEncoders for Adversary Detection in the Presence of Noisy
  Images
Detecting Adversaries, yet Faltering to Noise? Leveraging Conditional Variational AutoEncoders for Adversary Detection in the Presence of Noisy Images
Dvij Kalaria
Aritra Hazra
P. Chakrabarti
AAML
28
0
0
28 Nov 2021
Unity is strength: Improving the Detection of Adversarial Examples with
  Ensemble Approaches
Unity is strength: Improving the Detection of Adversarial Examples with Ensemble Approaches
Francesco Craighero
Fabrizio Angaroni
Fabio Stella
Chiara Damiani
M. Antoniotti
Alex Graudenzi
AAML
13
8
0
24 Nov 2021
Detecting AutoAttack Perturbations in the Frequency Domain
Detecting AutoAttack Perturbations in the Frequency Domain
P. Lorenz
P. Harder
Dominik Strassel
M. Keuper
J. Keuper
AAML
19
13
0
16 Nov 2021
Two Souls in an Adversarial Image: Towards Universal Adversarial Example
  Detection using Multi-view Inconsistency
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency
Sohaib Kiani
S. Awan
Chao Lan
Fengjun Li
Bo Luo
GAN
AAML
28
7
0
25 Sep 2021
SoK: Machine Learning Governance
SoK: Machine Learning Governance
Varun Chandrasekaran
Hengrui Jia
Anvith Thudi
Adelin Travers
Mohammad Yaghini
Nicolas Papernot
38
16
0
20 Sep 2021
Adversarially Robust One-class Novelty Detection
Adversarially Robust One-class Novelty Detection
Shao-Yuan Lo
Poojan Oza
Vishal M. Patel
AAML
25
29
0
25 Aug 2021
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks
  in Complex Scenes
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Mingjun Yin
Shasha Li
Zikui Cai
Chengyu Song
Ulugbek S. Kamilov
A. Roy-Chowdhury
S. Krishnamurthy
AAML
19
18
0
19 Aug 2021
Models of Computational Profiles to Study the Likelihood of DNN
  Metamorphic Test Cases
Models of Computational Profiles to Study the Likelihood of DNN Metamorphic Test Cases
E. Merlo
Mira Marhaba
Foutse Khomh
Houssem Ben Braiek
G. Antoniol
12
0
0
28 Jul 2021
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them
Florian Tramèr
AAML
30
65
0
24 Jul 2021
Detect and Defense Against Adversarial Examples in Deep Learning using
  Natural Scene Statistics and Adaptive Denoising
Detect and Defense Against Adversarial Examples in Deep Learning using Natural Scene Statistics and Adaptive Denoising
Anouar Kherchouche
Sid Ahmed Fezza
W. Hamidouche
AAML
27
9
0
12 Jul 2021
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of
  Outlier Adversarial Examples
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples
Nelson Manohar-Alers
Ryan Feng
Sahib Singh
Jiguo Song
Atul Prakash
AAML
27
1
0
01 Jul 2021
Long-term Cross Adversarial Training: A Robust Meta-learning Method for
  Few-shot Classification Tasks
Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks
F. Liu
Shuyu Zhao
Xuelong Dai
Bin Xiao
VLM
24
8
0
22 Jun 2021
Taxonomy of Machine Learning Safety: A Survey and Primer
Taxonomy of Machine Learning Safety: A Survey and Primer
Sina Mohseni
Haotao Wang
Zhiding Yu
Chaowei Xiao
Zhangyang Wang
J. Yadawa
26
31
0
09 Jun 2021
Biometrics: Trust, but Verify
Biometrics: Trust, but Verify
Anil K. Jain
Debayan Deb
Joshua J. Engelsma
FaML
28
80
0
14 May 2021
Self-Supervised Adversarial Example Detection by Disentangled
  Representation
Self-Supervised Adversarial Example Detection by Disentangled Representation
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Jinyu Tian
Jiantao Zhou
AAML
DRL
24
8
0
08 May 2021
Adversarial Example Detection for DNN Models: A Review and Experimental
  Comparison
Adversarial Example Detection for DNN Models: A Review and Experimental Comparison
Ahmed Aldahdooh
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
19
122
0
01 May 2021
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection
R. Vardhan
Ninghao Liu
Phakpoom Chinprutthiwong
Weijie Fu
Zhen Hu
Xia Hu
G. Gu
AAML
31
4
0
22 Mar 2021
Attribution of Gradient Based Adversarial Attacks for Reverse
  Engineering of Deceptions
Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions
Michael Goebel
Jason Bunk
Srinjoy Chattopadhyay
L. Nataraj
S. Chandrasekaran
B. S. Manjunath
AAML
19
4
0
19 Mar 2021
SpectralDefense: Detecting Adversarial Attacks on CNNs in the Fourier
  Domain
SpectralDefense: Detecting Adversarial Attacks on CNNs in the Fourier Domain
P. Harder
Franz-Josef Pfreundt
M. Keuper
J. Keuper
AAML
27
48
0
04 Mar 2021
Improving Adversarial Robustness via Probabilistically Compact Loss with
  Logit Constraints
Improving Adversarial Robustness via Probabilistically Compact Loss with Logit Constraints
X. Li
Xiangrui Li
Deng Pan
D. Zhu
AAML
21
17
0
14 Dec 2020
Effect of backdoor attacks over the complexity of the latent space
  distribution
Effect of backdoor attacks over the complexity of the latent space distribution
Henry Chacón
P. Rad
AAML
11
1
0
29 Nov 2020
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
Debayan Deb
Xiaoming Liu
Anil K. Jain
CVBM
AAML
PICV
19
27
0
28 Nov 2020
Adversarial Attack Based Countermeasures against Deep Learning
  Side-Channel Attacks
Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks
Ruizhe Gu
Ping Wang
Mengce Zheng
Honggang Hu
Nenghai Yu
AAML
8
3
0
22 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
33
157
0
08 Sep 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
27
73
0
07 Aug 2020
Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Xiaoyu Zhang
Ajmal Mian
Rohit Gupta
Nazanin Rahnavard
M. Shah
AAML
32
26
0
28 Jul 2020
Connecting the Dots: Detecting Adversarial Perturbations Using Context
  Inconsistency
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
Shasha Li
Shitong Zhu
Sudipta Paul
A. Roy-Chowdhury
Chengyu Song
S. Krishnamurthy
A. Swami
Kevin S. Chan
AAML
6
34
0
19 Jul 2020
Efficient detection of adversarial images
Efficient detection of adversarial images
Darpan Kumar Yadav
Kartik Mundra
Rahul Modpur
Arpan Chattopadhyay
I. Kar
AAML
22
1
0
09 Jul 2020
Defensive Approximation: Securing CNNs using Approximate Computing
Defensive Approximation: Securing CNNs using Approximate Computing
Amira Guesmi
Ihsen Alouani
Khaled N. Khasawneh
M. Baklouti
T. Frikha
Mohamed Abid
Nael B. Abu-Ghazaleh
AAML
19
37
0
13 Jun 2020
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label
  Classifiers
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
S. Melacci
Gabriele Ciravegna
Angelo Sotgiu
Ambra Demontis
Battista Biggio
Marco Gori
Fabio Roli
13
14
0
06 Jun 2020
Effective and Robust Detection of Adversarial Examples via
  Benford-Fourier Coefficients
Effective and Robust Detection of Adversarial Examples via Benford-Fourier Coefficients
Chengcheng Ma
Baoyuan Wu
Shibiao Xu
Yanbo Fan
Yong Zhang
Xiaopeng Zhang
Zhifeng Li
AAML
21
9
0
12 May 2020
Adversarial Imitation Attack
Adversarial Imitation Attack
Mingyi Zhou
Jing Wu
Yipeng Liu
Xiaolin Huang
Shuaicheng Liu
Xiang Zhang
Ce Zhu
AAML
16
0
0
28 Mar 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial Attacks
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
25
142
0
28 Mar 2020
Are L2 adversarial examples intrinsically different?
Are L2 adversarial examples intrinsically different?
Mingxuan Li
Jingyuan Wang
Yufan Wu
AAML
6
0
0
28 Feb 2020
123
Next