Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1608.00853
Cited By
A study of the effect of JPG compression on adversarial images
2 August 2016
Gintare Karolina Dziugaite
Zoubin Ghahramani
Daniel M. Roy
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"A study of the effect of JPG compression on adversarial images"
50 / 104 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
AAML
28
0
0
19 Apr 2025
ArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation Models
Linkang Du
Zheng Zhu
M. Chen
Zhou Su
S. Ji
Peng Cheng
Jiming Chen
Zhikun Zhang
DiffM
WIGM
MLAU
71
0
0
17 Apr 2025
Human Aligned Compression for Robust Models
Samuel Räber
Andreas Plesner
Till Aczél
Roger Wattenhofer
AAML
42
0
0
16 Apr 2025
Don't Lag, RAG: Training-Free Adversarial Detection Using RAG
Roie Kazoom
Raz Lapid
Moshe Sipper
Ofer Hadar
VLM
ObjD
AAML
69
0
0
07 Apr 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
52
0
0
16 Feb 2025
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Yixiao Chen
Shikun Sun
Jianshu Li
Ruoyu Li
Zhe Li
Junliang Xing
AAML
109
0
0
04 Feb 2025
OODFace: Benchmarking Robustness of Face Recognition under Common Corruptions and Appearance Variations
Caixin Kang
Yubo Chen
Shouwei Ruan
Shiji Zhao
Ruochen Zhang
Jiayi Wang
Shan Fu
Xingxing Wei
CVBM
79
0
0
03 Dec 2024
Exploring the Adversarial Vulnerabilities of Vision-Language-Action Models in Robotics
Taowen Wang
Dongfang Liu
James Liang
Wenhao Yang
Qifan Wang
Cheng Han
Jiebo Luo
Ruixiang Tang
Ruixiang Tang
AAML
82
3
0
18 Nov 2024
JPEG Inspired Deep Learning
Ahmed H. Salamah
Kaixiang Zheng
Yiwen Liu
En-Hui Yang
37
0
0
09 Oct 2024
A Pattern Language for Machine Learning Tasks
Benjamin Rodatz
Ian Fan
Tuomas Laakkonen
Neil John Ortega
Thomas Hoffman
Vincent Wang-Ma'scianica
56
3
0
02 Jul 2024
One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models
Hao Fang
Jiawei Kong
Wenbo Yu
Bin Chen
Jiawei Li
Hao Wu
Ke Xu
Ke Xu
AAML
VLM
40
13
0
08 Jun 2024
From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings
Firuz Juraev
Mohammed Abuhamad
Eric Chan-Tin
George K. Thiruvathukal
Tamer Abuhmed
AAML
41
0
0
03 May 2024
Adversarial purification for no-reference image-quality metrics: applicability study and new methods
Aleksandr Gushchin
Anna Chistyakova
Vladislav Minashkin
Anastasia Antsiferova
D. Vatolin
42
2
0
10 Apr 2024
StegoGAN: Leveraging Steganography for Non-Bijective Image-to-Image Translation
Sidi Wu
Yizi Chen
Samuel Mermet
L. Hurni
Konrad Schindler
Nicolas Gonthier
Loic Landrieu
GAN
35
8
0
29 Mar 2024
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks
Roey Bokobza
Yisroel Mirsky
AAML
38
0
0
14 Mar 2024
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural Networks
Peng Zhao
Jiehua Zhang
Bowen Peng
Longguang Wang
Yingmei Wei
Yu Liu
Li Liu
AAML
32
0
0
21 Dec 2023
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models
Ruoxi Chen
Haibo Jin
Yixin Liu
Jinyin Chen
Haohan Wang
Lichao Sun
34
10
0
19 Nov 2023
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Weijie Wang
Zhengyu Zhao
N. Sebe
Bruno Lepri
AAML
41
2
0
03 Sep 2023
Test-Time Poisoning Attacks Against Test-Time Adaptation Models
Tianshuo Cong
Xinlei He
Yun Shen
Yang Zhang
AAML
TTA
32
5
0
16 Aug 2023
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
Amira Guesmi
Muhammad Abdullah Hanif
B. Ouni
Muhammad Shafique
MDE
40
12
0
06 Aug 2023
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems
Xugui Zhou
Anqi Chen
Maxfield Kouzel
Haotian Ren
Morgan McCarty
Cristina Nita-Rotaru
H. Alemzadeh
AAML
31
2
0
18 Jul 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
52
50
0
18 May 2023
Adversarial Amendment is the Only Force Capable of Transforming an Enemy into a Friend
Chong Yu
Tao Chen
Zhongxue Gan
AAML
23
1
0
18 May 2023
AdvART: Adversarial Art for Camouflaged Object Detection Attacks
Amira Guesmi
Ioan Marius Bilasco
Muhammad Shafique
Ihsen Alouani
GAN
AAML
34
20
0
03 Mar 2023
Attacking Important Pixels for Anchor-free Detectors
Yunxu Xie
Shu Hu
Xin Wang
Quanyu Liao
Bin Zhu
Xi Wu
Siwei Lyu
ObjD
AAML
38
2
0
26 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
24
4
0
18 Jan 2023
Distributed Black-box Attack: Do Not Overestimate Black-box Attacks
Han-Ching Wu
Sareh Rowlands
Johan Wahlstrom
MLAU
AAML
37
0
0
28 Oct 2022
Distributionally Robust Multiclass Classification and Applications in Deep Image Classifiers
Ruidi Chen
Boran Hao
I. Paschalidis
19
5
0
15 Oct 2022
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
Zhibo Zhang
H. A. Hamadi
Ernesto Damiani
C. Yeun
Fatma Taher
AAML
32
148
0
31 Aug 2022
Robust Real-World Image Super-Resolution against Adversarial Attacks
N. Babaguchi
John R. Smith
Pengxu Wei
T. Plagemann
Rong Yan
AAML
26
25
0
31 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
32
155
0
12 Jul 2022
PatchZero: Defending against Adversarial Patch Attacks by Detecting and Zeroing the Patch
Ke Xu
Yao Xiao
Zhao-Heng Zheng
Kaijie Cai
Ramkant Nevatia
AAML
26
28
0
05 Jul 2022
Exploring Adversarial Attacks and Defenses in Vision Transformers trained with DINO
Javier Rando
Nasib Naimi
Thomas Baumann
Max Mathys
AAML
20
5
0
14 Jun 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
38
21
0
09 Mar 2022
Sparsity Winning Twice: Better Robust Generalization from More Efficient Training
Tianlong Chen
Zhenyu Zhang
Pengju Wang
Santosh Balachandra
Haoyu Ma
Zehao Wang
Zhangyang Wang
OOD
AAML
100
47
0
20 Feb 2022
Boundary Defense Against Black-box Adversarial Attacks
Manjushree B. Aithal
Xiaohua Li
AAML
21
6
0
31 Jan 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
Towards Robust Neural Image Compression: Adversarial Attack and Model Finetuning
Tong Chen
Zhan Ma
AAML
28
29
0
16 Dec 2021
Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks
Jaehui Hwang
Huan Zhang
Jun-Ho Choi
Cho-Jui Hsieh
Jong-Seok Lee
AAML
19
5
0
15 Dec 2021
Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection
Jiangjiang Liu
Alexander Levine
Chun Pong Lau
Ramalingam Chellappa
S. Feizi
AAML
32
76
0
08 Dec 2021
Human Imperceptible Attacks and Applications to Improve Fairness
Xinru Hua
Huanzhong Xu
Jose H. Blanchet
V. Nguyen
AAML
27
3
0
30 Nov 2021
Adaptive Perturbation for Adversarial Attack
Zheng Yuan
Jie Zhang
Zhaoyan Jiang
Liangliang Li
Shiguang Shan
AAML
27
3
0
27 Nov 2021
Medical Aegis: Robust adversarial protectors for medical images
Qingsong Yao
Zecheng He
S. Kevin Zhou
AAML
MedIm
30
2
0
22 Nov 2021
Generative Dynamic Patch Attack
Xiang Li
Shihao Ji
AAML
30
22
0
08 Nov 2021
Fast Gradient Non-sign Methods
Yaya Cheng
Jingkuan Song
Xiaosu Zhu
Qilong Zhang
Lianli Gao
Heng Tao Shen
AAML
29
11
0
25 Oct 2021
On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Inderjeet Singh
Satoru Momiyama
Kazuya Kakizaki
Toshinori Araki
AAML
37
12
0
29 Sep 2021
Simple Post-Training Robustness Using Test Time Augmentations and Random Forest
Gilad Cohen
Raja Giryes
AAML
40
4
0
16 Sep 2021
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator
Wenzhao Xiang
Hang Su
Chang-rui Liu
Yandong Guo
Shibao Zheng
AAML
29
5
0
13 Sep 2021
Multi-granularity Textual Adversarial Attack with Behavior Cloning
Yangyi Chen
Jingtong Su
Wei Wei
AAML
19
32
0
09 Sep 2021
1
2
3
Next