Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1608.04644
Cited By
v1
v2 (latest)
Towards Evaluating the Robustness of Neural Networks
16 August 2016
Nicholas Carlini
D. Wagner
OOD
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Towards Evaluating the Robustness of Neural Networks"
50 / 4,015 papers shown
Title
Enhancing Adversarial Robustness through Multi-Objective Representation Learning
Sedjro Salomon Hotegni
Sebastian Peitz
AAML
94
2
0
01 Jul 2025
Insights on Adversarial Attacks for Tabular Machine Learning via a Systematic Literature Review
Salijona Dyrmishi
Mohamed Djilani
Thibault Simonetto
Salah Ghamizi
Maxime Cordy
AAML
LMTD
49
0
0
18 Jun 2025
Busting the Paper Ballot: Voting Meets Adversarial Machine Learning
Kaleel Mahmood
Caleb Manicke
Ethan Rathbun
Aayushi Verma
Sohaib Ahmad
Nicholas Stamatakis
L. Michel
Benjamin Fuller
AAML
51
0
0
17 Jun 2025
Position: Certified Robustness Does Not (Yet) Imply Model Security
Andrew C. Cullen
Paul Montague
S. Erfani
Benjamin I. P. Rubinstein
33
0
0
16 Jun 2025
CertDW: Towards Certified Dataset Ownership Verification via Conformal Prediction
Ting Qiao
Yiming Li
Jianbin Li
Yingjia Wang
Leyi Qi
Junfeng Guo
Ruili Feng
Dacheng Tao
AAML
31
0
0
16 Jun 2025
Active Adversarial Noise Suppression for Image Forgery Localization
Rongxuan Peng
Shunquan Tan
Xianbo Mo
Alex C. Kot
Jiwu Huang
AAML
26
0
0
15 Jun 2025
Lattice Climber Attack: Adversarial attacks for randomized mixtures of classifiers
Lucas Gnecco-Heredia
Benjamin Négrevergne
Y. Chevaleyre
AAML
114
0
0
12 Jun 2025
Canonical Latent Representations in Conditional Diffusion Models
Yitao Xu
Tong Zhang
Ehsan Pajouheshgar
Sabine Süsstrunk
DiffM
83
0
0
11 Jun 2025
Towards Class-wise Fair Adversarial Training via Anti-Bias Soft Label Distillation
Shiji Zhao
Chi Chen
Ranjie Duan
Xizhe Wang
Xingxing Wei
25
0
0
10 Jun 2025
ProARD: progressive adversarial robustness distillation: provide wide range of robust students
Seyedhamidreza Mousavi
Seyedali Mousavi
Masoud Daneshtalab
AAML
31
0
0
09 Jun 2025
HeTa: Relation-wise Heterogeneous Graph Foundation Attack Model
Yuling Wang
Zihui Chen
Pengfei Jiao
Xiao Wang
AAML
18
0
0
09 Jun 2025
PASS: Private Attributes Protection with Stochastic Data Substitution
Yizhuo Chen
Chun-Fu
Chen
Hsiang Hsu
Shaohan Hu
Tarek Abdelzaher
29
0
0
08 Jun 2025
KNN-Defense: Defense against 3D Adversarial Point Clouds using Nearest-Neighbor Search
Nima Jamali
Matina Mahdizadeh Sani
Hanieh Naderi
S. Kasaei
AAML
3DPC
22
0
0
07 Jun 2025
Robust Few-Shot Vision-Language Model Adaptation
Hanxin Wang
Tian Liu
Shu Kong
VLM
127
0
0
05 Jun 2025
Neural Network Reprogrammability: A Unified Theme on Model Reprogramming, Prompt Tuning, and Prompt Instruction
Zesheng Ye
C. Cai
Ruijiang Dong
Jianzhong Qi
Lei Feng
Pin-Yu Chen
Feng Liu
228
0
0
05 Jun 2025
Efficient Robust Conformal Prediction via Lipschitz-Bounded Networks
Thomas Massena
Léo Andéol
Thibaut Boissin
Franck Mamalet
Corentin Friedrich
M. Serrurier
Sébastien Gerchinovitz
AAML
47
2
0
05 Jun 2025
Fool the Stoplight: Realistic Adversarial Patch Attacks on Traffic Light Detectors
Svetlana Pavlitska
Jamie Robb
Nikolai Polley
Melih Yazgan
Johann Marius Zöllner
AAML
113
0
0
05 Jun 2025
DURA-CPS: A Multi-Role Orchestrator for Dependability Assurance in LLM-Enabled Cyber-Physical Systems
Trisanth Srinivasan
Santosh Patapati
Himani Musku
Idhant Gode
Aditya Arora
Samvit Bhattacharya
Abubakr Nazriev
Sanika Hirave
Zaryab Kanjiani
Srinjoy Ghose
15
0
0
04 Jun 2025
Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack
Jing Xue
Zhishen Sun
Haishan Ye
Luo Luo
Xiangyu Chang
Ivor Tsang
Guang Dai
MIACV
MIALM
70
0
0
03 Jun 2025
Attacking Attention of Foundation Models Disrupts Downstream Tasks
Hondamunige Prasanna Silva
Federico Becattini
Lorenzo Seidenari
AAML
29
0
0
03 Jun 2025
MUC-G4: Minimal Unsat Core-Guided Incremental Verification for Deep Neural Network Compression
Jingyang Li
Guoqiang Li
29
0
0
03 Jun 2025
How stealthy is stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World
Francesco Panebianco
Mario DÓnghia
Stefano Zanero aand Michele Carminati
AAML
29
0
0
03 Jun 2025
Fighting Fire with Fire (F3): A Training-free and Efficient Visual Adversarial Example Purification Method in LVLMs
Yudong Zhang
Ruobing Xie
Yiqing Huang
Jiansheng Chen
Xingwu Sun
Zhanhui Kang
Di Wang
Yu Wang
AAML
53
0
0
01 Jun 2025
Towards Effective and Efficient Adversarial Defense with Diffusion Models for Robust Visual Tracking
Long Xu
Peng Gao
Wen-Jia Tang
Fei Wang
Ru-Yue Yuan
DiffM
AAML
29
0
0
31 May 2025
The Security Threat of Compressed Projectors in Large Vision-Language Models
Yudong Zhang
Ruobing Xie
Xingwu Sun
Jiansheng Chen
Zhanhui Kang
Di Wang
Yu Wang
23
0
0
31 May 2025
Light as Deception: GPT-driven Natural Relighting Against Vision-Language Pre-training Models
Ying Yang
Jie Zhang
Xiao Lv
Di Lin
Tao Xiang
Qing Guo
AAML
VLM
40
0
0
30 May 2025
Black-box Adversarial Attacks on CNN-based SLAM Algorithms
M. Gkeka
Bowen Sun
Evgenia Smirni
C. Antonopoulos
S. Lalis
Nikolaos Bellas
AAML
29
0
0
30 May 2025
A Red Teaming Roadmap Towards System-Level Safety
Zifan Wang
Christina Q. Knight
Jeremy Kritz
Willow Primack
Julian Michael
AAML
54
0
0
30 May 2025
TRAP: Targeted Redirecting of Agentic Preferences
Hangoo Kang
Jehyeok Yeon
Gagandeep Singh
AAML
72
0
0
29 May 2025
Understanding Adversarial Training with Energy-based Models
Mujtaba Hussain Mirza
Maria Rosaria Briglia
Filippo Bartolucci
Senad Beadini
G. Lisanti
I. Masi
AAML
64
0
0
28 May 2025
Preventing Adversarial AI Attacks Against Autonomous Situational Awareness: A Maritime Case Study
Mathew J. Walter
Aaron Barrett
Kimberly Tam
AAML
38
1
0
27 May 2025
Breaking Dataset Boundaries: Class-Agnostic Targeted Adversarial Attacks
Taïga Gonçalves
Tomo Miyazaki
S. Omachi
OOD
AAML
81
0
0
27 May 2025
Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment
Xiaojun Jia
Sensen Gao
Simeng Qin
Tianyu Pang
C. Du
Yihao Huang
Xinfeng Li
Yiming Li
Bo Li
Yang Liu
AAML
48
0
0
27 May 2025
A Framework for Adversarial Analysis of Decision Support Systems Prior to Deployment
Brett Bissey
Kyle Gatesman
Walker Dimon
Mohammad Alam
Luis Robaina
Joseph Weissman
AAML
47
0
0
27 May 2025
One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP
Binyan Xu
Xilin Dai
Di Tang
Kehuan Zhang
AAML
24
0
0
26 May 2025
Diagnosing and Mitigating Modality Interference in Multimodal Large Language Models
Rui Cai
Bangzheng Li
Xiaofei Wen
Muhao Chen
Zhe Zhao
29
0
0
26 May 2025
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation
Peiran Sun
AAML
35
0
0
25 May 2025
Ignition Phase : Standard Training for Fast Adversarial Robustness
Wang Yu-Hang
Liu ying
Fang liang
Wang Xuelin
Junkang Guo
Shiwei Li
Lei Gao
Jian Liu
Wenfei Yin
AAML
19
0
0
25 May 2025
Mitigating Deceptive Alignment via Self-Monitoring
Jiaming Ji
Wenqi Chen
Kaile Wang
Donghai Hong
Sitong Fang
...
Jiayi Zhou
Juntao Dai
Sirui Han
Yike Guo
Yaodong Yang
LRM
57
2
0
24 May 2025
EdgeAgentX: A Novel Framework for Agentic AI at the Edge in Military Communication Networks
Abir Ray
29
0
0
24 May 2025
Adversarial Robustness of Nonparametric Regression
Parsa Moradi
Hanzaleh Akabrinodehi
M. Maddah-ali
AAML
76
0
0
23 May 2025
Out of the Shadows: Exploring a Latent Space for Neural Network Verification
Lukas Koller
Tobias Ladner
Matthias Althoff
68
0
0
23 May 2025
What is the role of memorization in Continual Learning?
Jędrzej Kozal
Jan Wasilewski
Alif Ashrafee
Bartosz Krawczyk
Michał Woźniak
49
0
0
23 May 2025
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models
Hossein Khalili
Seongbin Park
Venkat Bollapragada
Nader Sehatbakhsh
AAML
220
0
0
22 May 2025
Neuromorphic Mimicry Attacks Exploiting Brain-Inspired Computing for Covert Cyber Intrusions
Hemanth Ravipati
AAML
64
0
0
21 May 2025
My Face Is Mine, Not Yours: Facial Protection Against Diffusion Model Face Swapping
Hon Ming Yam
Zhongliang Guo
Chun Pong Lau
DiffM
AAML
64
0
0
21 May 2025
Anomaly Detection Based on Critical Paths for Deep Neural Networks
Fangzhen Zhao
Chenyi Zhang
Naipeng Dong
Ming Li
Jinxiao Shan
AAML
37
0
0
20 May 2025
Use as Many Surrogates as You Want: Selective Ensemble Attack to Unleash Transferability without Sacrificing Resource Efficiency
Bo Yang
Hengwei Zhang
Jindong Wang
Yuchen Ren
Chenhao Lin
Chao Shen
Zhengyu Zhao
AAML
95
0
0
19 May 2025
FlowPure: Continuous Normalizing Flows for Adversarial Purification
Elias Collaert
Abel Rodríguez
Sander Joos
Lieven Desmet
Vera Rimmer
AAML
71
0
0
19 May 2025
On the Security Risks of ML-based Malware Detection Systems: A Survey
Ping He
Yuhao Mao
Changjiang Li
Lorenzo Cavallaro
Ting Wang
Shouling Ji
100
0
0
16 May 2025
1
2
3
4
...
79
80
81
Next