ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.00853
  4. Cited By
A study of the effect of JPG compression on adversarial images

A study of the effect of JPG compression on adversarial images

2 August 2016
Gintare Karolina Dziugaite
Zoubin Ghahramani
Daniel M. Roy
    AAML
ArXivPDFHTML

Papers citing "A study of the effect of JPG compression on adversarial images"

50 / 103 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
AAML
28
0
0
19 Apr 2025
ArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation Models
ArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation Models
Linkang Du
Zheng Zhu
M. Chen
Zhou Su
S. Ji
Peng Cheng
Jiming Chen
Zhikun Zhang
DiffM
WIGM
MLAU
71
0
0
17 Apr 2025
Human Aligned Compression for Robust Models
Human Aligned Compression for Robust Models
Samuel Räber
Andreas Plesner
Till Aczél
Roger Wattenhofer
AAML
42
0
0
16 Apr 2025
Don't Lag, RAG: Training-Free Adversarial Detection Using RAG
Don't Lag, RAG: Training-Free Adversarial Detection Using RAG
Roie Kazoom
Raz Lapid
Moshe Sipper
Ofer Hadar
VLM
ObjD
AAML
69
0
0
07 Apr 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
52
0
0
16 Feb 2025
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Yixiao Chen
Shikun Sun
Jianshu Li
Ruoyu Li
Zhe Li
Junliang Xing
AAML
109
0
0
04 Feb 2025
OODFace: Benchmarking Robustness of Face Recognition under Common Corruptions and Appearance Variations
OODFace: Benchmarking Robustness of Face Recognition under Common Corruptions and Appearance Variations
Caixin Kang
Yubo Chen
Shouwei Ruan
Shiji Zhao
Ruochen Zhang
Jiayi Wang
Shan Fu
Xingxing Wei
CVBM
79
0
0
03 Dec 2024
Exploring the Adversarial Vulnerabilities of Vision-Language-Action Models in Robotics
Exploring the Adversarial Vulnerabilities of Vision-Language-Action Models in Robotics
Taowen Wang
Dongfang Liu
James Liang
Wenhao Yang
Qifan Wang
Cheng Han
Jiebo Luo
Ruixiang Tang
Ruixiang Tang
AAML
82
3
0
18 Nov 2024
JPEG Inspired Deep Learning
JPEG Inspired Deep Learning
Ahmed H. Salamah
Kaixiang Zheng
Yiwen Liu
En-Hui Yang
37
0
0
09 Oct 2024
A Pattern Language for Machine Learning Tasks
A Pattern Language for Machine Learning Tasks
Benjamin Rodatz
Ian Fan
Tuomas Laakkonen
Neil John Ortega
Thomas Hoffman
Vincent Wang-Ma'scianica
56
3
0
02 Jul 2024
One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models
One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models
Hao Fang
Jiawei Kong
Wenbo Yu
Bin Chen
Jiawei Li
Hao Wu
Ke Xu
Ke Xu
AAML
VLM
40
13
0
08 Jun 2024
From Attack to Defense: Insights into Deep Learning Security Measures in
  Black-Box Settings
From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings
Firuz Juraev
Mohammed Abuhamad
Eric Chan-Tin
George K. Thiruvathukal
Tamer Abuhmed
AAML
41
0
0
03 May 2024
Adversarial purification for no-reference image-quality metrics:
  applicability study and new methods
Adversarial purification for no-reference image-quality metrics: applicability study and new methods
Aleksandr Gushchin
Anna Chistyakova
Vladislav Minashkin
Anastasia Antsiferova
D. Vatolin
42
2
0
10 Apr 2024
StegoGAN: Leveraging Steganography for Non-Bijective Image-to-Image
  Translation
StegoGAN: Leveraging Steganography for Non-Bijective Image-to-Image Translation
Sidi Wu
Yizi Chen
Samuel Mermet
L. Hurni
Konrad Schindler
Nicolas Gonthier
Loic Landrieu
GAN
35
8
0
29 Mar 2024
Counter-Samples: A Stateless Strategy to Neutralize Black Box
  Adversarial Attacks
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Roey Bokobza
Yisroel Mirsky
AAML
38
0
0
14 Mar 2024
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural
  Networks
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural Networks
Peng Zhao
Jiehua Zhang
Bowen Peng
Longguang Wang
Yingmei Wei
Yu Liu
Li Liu
AAML
32
0
0
21 Dec 2023
EditShield: Protecting Unauthorized Image Editing by Instruction-guided
  Diffusion Models
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models
Ruoxi Chen
Haibo Jin
Yixin Liu
Jinyin Chen
Haohan Wang
Lichao Sun
31
10
0
19 Nov 2023
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake
  Detection
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Weijie Wang
Zhengyu Zhao
N. Sebe
Bruno Lepri
AAML
41
2
0
03 Sep 2023
Test-Time Poisoning Attacks Against Test-Time Adaptation Models
Test-Time Poisoning Attacks Against Test-Time Adaptation Models
Tianshuo Cong
Xinlei He
Yun Shen
Yang Zhang
AAML
TTA
32
5
0
16 Aug 2023
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
Amira Guesmi
Muhammad Abdullah Hanif
B. Ouni
Muhammad Shafique
MDE
40
12
0
06 Aug 2023
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems
Xugui Zhou
Anqi Chen
Maxfield Kouzel
Haotian Ren
Morgan McCarty
Cristina Nita-Rotaru
H. Alemzadeh
AAML
31
2
0
18 Jul 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
52
50
0
18 May 2023
Adversarial Amendment is the Only Force Capable of Transforming an Enemy
  into a Friend
Adversarial Amendment is the Only Force Capable of Transforming an Enemy into a Friend
Chong Yu
Tao Chen
Zhongxue Gan
AAML
23
1
0
18 May 2023
AdvART: Adversarial Art for Camouflaged Object Detection Attacks
AdvART: Adversarial Art for Camouflaged Object Detection Attacks
Amira Guesmi
Ioan Marius Bilasco
Muhammad Shafique
Ihsen Alouani
GAN
AAML
34
20
0
03 Mar 2023
Attacking Important Pixels for Anchor-free Detectors
Attacking Important Pixels for Anchor-free Detectors
Yunxu Xie
Shu Hu
Xin Wang
Quanyu Liao
Bin Zhu
Xi Wu
Siwei Lyu
ObjD
AAML
38
2
0
26 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based
  Systems: A Survey and Taxonomy
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
24
4
0
18 Jan 2023
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Han-Ching Wu
Sareh Rowlands
Johan Wahlstrom
MLAU
AAML
37
0
0
28 Oct 2022
Distributionally Robust Multiclass Classification and Applications in Deep Image Classifiers
Ruidi Chen
Boran Hao
I. Paschalidis
19
5
0
15 Oct 2022
Explainable Artificial Intelligence Applications in Cyber Security:
  State-of-the-Art in Research
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
Zhibo Zhang
H. A. Hamadi
Ernesto Damiani
C. Yeun
Fatma Taher
AAML
32
148
0
31 Aug 2022
Robust Real-World Image Super-Resolution against Adversarial Attacks
Robust Real-World Image Super-Resolution against Adversarial Attacks
N. Babaguchi
John R. Smith
Pengxu Wei
T. Plagemann
Rong Yan
AAML
26
25
0
31 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
32
155
0
12 Jul 2022
PatchZero: Defending against Adversarial Patch Attacks by Detecting and
  Zeroing the Patch
PatchZero: Defending against Adversarial Patch Attacks by Detecting and Zeroing the Patch
Ke Xu
Yao Xiao
Zhao-Heng Zheng
Kaijie Cai
Ramkant Nevatia
AAML
26
28
0
05 Jul 2022
Exploring Adversarial Attacks and Defenses in Vision Transformers
  trained with DINO
Exploring Adversarial Attacks and Defenses in Vision Transformers trained with DINO
Javier Rando
Nasib Naimi
Thomas Baumann
Max Mathys
AAML
20
5
0
14 Jun 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
38
21
0
09 Mar 2022
Sparsity Winning Twice: Better Robust Generalization from More Efficient
  Training
Sparsity Winning Twice: Better Robust Generalization from More Efficient Training
Tianlong Chen
Zhenyu Zhang
Pengju Wang
Santosh Balachandra
Haoyu Ma
Zehao Wang
Zhangyang Wang
OOD
AAML
98
47
0
20 Feb 2022
Boundary Defense Against Black-box Adversarial Attacks
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
21
6
0
31 Jan 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera
  Image Pipelines
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
Towards Robust Neural Image Compression: Adversarial Attack and Model
  Finetuning
Towards Robust Neural Image Compression: Adversarial Attack and Model Finetuning
Tong Chen
Zhan Ma
AAML
28
29
0
16 Dec 2021
Temporal Shuffling for Defending Deep Action Recognition Models against
  Adversarial Attacks
Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks
Jaehui Hwang
Huan Zhang
Jun-Ho Choi
Cho-Jui Hsieh
Jong-Seok Lee
AAML
19
5
0
15 Dec 2021
Segment and Complete: Defending Object Detectors against Adversarial
  Patch Attacks with Robust Patch Detection
Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection
Jiangjiang Liu
Alexander Levine
Chun Pong Lau
Ramalingam Chellappa
S. Feizi
AAML
32
76
0
08 Dec 2021
Human Imperceptible Attacks and Applications to Improve Fairness
Human Imperceptible Attacks and Applications to Improve Fairness
Xinru Hua
Huanzhong Xu
Jose H. Blanchet
V. Nguyen
AAML
27
3
0
30 Nov 2021
Adaptive Perturbation for Adversarial Attack
Adaptive Perturbation for Adversarial Attack
Zheng Yuan
Jie Zhang
Zhaoyan Jiang
Liangliang Li
Shiguang Shan
AAML
27
3
0
27 Nov 2021
Medical Aegis: Robust adversarial protectors for medical images
Medical Aegis: Robust adversarial protectors for medical images
Qingsong Yao
Zecheng He
S. Kevin Zhou
AAML
MedIm
30
2
0
22 Nov 2021
Generative Dynamic Patch Attack
Generative Dynamic Patch Attack
Xiang Li
Shihao Ji
AAML
30
22
0
08 Nov 2021
Fast Gradient Non-sign Methods
Fast Gradient Non-sign Methods
Yaya Cheng
Jingkuan Song
Xiaosu Zhu
Qilong Zhang
Lianli Gao
Heng Tao Shen
AAML
29
11
0
25 Oct 2021
On Brightness Agnostic Adversarial Examples Against Face Recognition
  Systems
On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Inderjeet Singh
Satoru Momiyama
Kazuya Kakizaki
Toshinori Araki
AAML
37
12
0
29 Sep 2021
Simple Post-Training Robustness Using Test Time Augmentations and Random
  Forest
Simple Post-Training Robustness Using Test Time Augmentations and Random Forest
Gilad Cohen
Raja Giryes
AAML
40
4
0
16 Sep 2021
Improving the Robustness of Adversarial Attacks Using an
  Affine-Invariant Gradient Estimator
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator
Wenzhao Xiang
Hang Su
Chang-rui Liu
Yandong Guo
Shibao Zheng
AAML
29
5
0
13 Sep 2021
Multi-granularity Textual Adversarial Attack with Behavior Cloning
Multi-granularity Textual Adversarial Attack with Behavior Cloning
Yangyi Chen
Jingtong Su
Wei Wei
AAML
17
32
0
09 Sep 2021
123
Next