Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1608.04644
Cited By
Towards Evaluating the Robustness of Neural Networks
16 August 2016
Nicholas Carlini
D. Wagner
OOD
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Towards Evaluating the Robustness of Neural Networks"
50 / 1,401 papers shown
Title
X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
Hanxun Huang
Sarah Monazam Erfani
Yige Li
Xingjun Ma
James Bailey
AAML
44
0
0
08 May 2025
Crafting Physical Adversarial Examples by Combining Differentiable and Physically Based Renders
Yuqiu Liu
Huanqian Yan
Xiaopei Zhu
Xiaolin Hu
L. Tang
Hang Su
Chen Lv
29
0
0
07 May 2025
Data-Driven Falsification of Cyber-Physical Systems
Atanu Kundu
Sauvik Gon
Rajarshi Ray
AAML
AI4CE
41
3
0
06 May 2025
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems
Abdul Mustafa
Muhammad Talha Khan
Muhammad Azmi Umer
Zaki Masood
Chuadhry Mujeeb Ahmed
AAML
46
0
0
06 May 2025
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Shashank Kapoor
Sanjay Surendranath Girija
Lakshit Arora
Dipen Pradhan
Ankit Shetgaonkar
Aman Raj
AAML
74
0
0
06 May 2025
Lightweight Defense Against Adversarial Attacks in Time Series Classification
Yi Han
AAML
40
0
0
04 May 2025
Adaptive Branch-and-Bound Tree Exploration for Neural Network Verification
Kota Fukuda
Guanqin Zhang
Zhenya Zhang
Yulei Sui
Jianjun Zhao
45
0
0
02 May 2025
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
47
0
0
02 May 2025
Stochastic Subspace Descent Accelerated via Bi-fidelity Line Search
Nuojin Cheng
Alireza Doostan
Stephen Becker
39
0
0
30 Apr 2025
Active Light Modulation to Counter Manipulation of Speech Visual Content
Hadleigh Schwartz
Xiaofeng Yan
Charles J. Carver
Xia Zhou
68
0
0
30 Apr 2025
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
Shiwen Song
Xiaofei Xie
Ruitao Feng
Qi Guo
Sen Chen
AAML
45
0
0
28 Apr 2025
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift
Jiamin Chang
Hao Li
Hammond Pearce
Ruoxi Sun
Bo-wen Li
Minhui Xue
38
0
0
28 Apr 2025
Unveiling and Mitigating Adversarial Vulnerabilities in Iterative Optimizers
Elad Sofer
Tomer Shaked
Caroline Chaux
Nir Shlezinger
AAML
45
0
0
26 Apr 2025
Fine-Tuning Adversarially-Robust Transformers for Single-Image Dehazing
Vlad Vasilescu
Ana Neacsu
Daniela Faur
ViT
29
0
0
24 Apr 2025
A Numerical Gradient Inversion Attack in Variational Quantum Neural-Networks
Georgios Papadopoulos
Shaltiel Eloul
Yash Satsangi
Jamie Heredge
Niraj Kumar
Chun-Fu Chen
Marco Pistoia
51
0
0
17 Apr 2025
Human Aligned Compression for Robust Models
Samuel Räber
Andreas Plesner
Till Aczél
Roger Wattenhofer
AAML
39
0
0
16 Apr 2025
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
Jialei Song
Xingquan Zuo
Feiyang Wang
Hai Huang
Tianle Zhang
AAML
83
0
0
16 Apr 2025
Adversarial Training of Reward Models
Alexander Bukharin
Haifeng Qian
Shengyang Sun
Adithya Renduchintala
Soumye Singhal
Zhilin Wang
Oleksii Kuchaiev
Olivier Delalleau
T. Zhao
AAML
32
0
0
08 Apr 2025
Two is Better than One: Efficient Ensemble Defense for Robust and Compact Models
Yoojin Jung
Byung Cheol Song
AAML
VLM
MQ
36
0
0
07 Apr 2025
On the Robustness of GUI Grounding Models Against Image Attacks
Haoren Zhao
Tianyi Chen
Zhen Wang
AAML
36
1
0
07 Apr 2025
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Giulia Marchiori Pietrosanti
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
84
0
0
02 Apr 2025
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios
Jingzheng Li
X. Liu
Shikui Wei
Zhijun Chen
Yangqiu Song
Qing-Wu Guo
Xianqi Yang
Yanjun Pu
Jiakai Wang
AAML
ELM
74
0
0
31 Mar 2025
GSBA
K
^K
K
:
t
o
p
top
t
o
p
-
K
K
K
Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
47
0
0
17 Mar 2025
Weakly Supervised Contrastive Adversarial Training for Learning Robust Features from Semi-supervised Data
Lilin Zhang
Chengpei Wu
Ning Yang
39
0
0
14 Mar 2025
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
Jin Li
Ziqiang He
Anwei Luo
Jian-Fang Hu
Zhong Wang
Xiangui Kang
DiffM
66
0
0
12 Mar 2025
Long-tailed Adversarial Training with Self-Distillation
Seungju Cho
Hongsin Lee
Changick Kim
AAML
TTA
185
0
0
09 Mar 2025
TAET: Two-Stage Adversarial Equalization Training on Long-Tailed Distributions
Wang YuHang
Junkang Guo
Aolei Liu
Kaihao Wang
Zaitong Wu
Zhenyu Liu
Wenfei Yin
Jian Liu
AAML
50
0
0
02 Mar 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
144
0
0
28 Feb 2025
Single-pass Detection of Jailbreaking Input in Large Language Models
Leyla Naz Candogan
Yongtao Wu
Elias Abad Rocamora
Grigorios G. Chrysos
V. Cevher
AAML
51
0
0
24 Feb 2025
Adversarial Prompt Evaluation: Systematic Benchmarking of Guardrails Against Prompt Input Attacks on LLMs
Giulio Zizzo
Giandomenico Cornacchia
Kieran Fraser
Muhammad Zaid Hameed
Ambrish Rawat
Beat Buesser
Mark Purcell
Pin-Yu Chen
P. Sattigeri
Kush R. Varshney
AAML
43
2
0
24 Feb 2025
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
145
0
0
21 Feb 2025
Adversary-Aware DPO: Enhancing Safety Alignment in Vision Language Models via Adversarial Training
Fenghua Weng
Jian Lou
Jun Feng
Minlie Huang
Wenjie Wang
AAML
72
2
0
17 Feb 2025
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
Almuthanna Alageel
Sergio Maffeis
Imperial College London
41
2
0
07 Feb 2025
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Yixiao Chen
Shikun Sun
Jianshu Li
Ruoyu Li
Zhe Li
Junliang Xing
AAML
109
0
0
04 Feb 2025
UNIDOOR: A Universal Framework for Action-Level Backdoor Attacks in Deep Reinforcement Learning
Oubo Ma
L. Du
Yang Dai
Chunyi Zhou
Qingming Li
Yuwen Pu
Shouling Ji
46
0
0
28 Jan 2025
On the Adversarial Vulnerabilities of Transfer Learning in Remote Sensing
Tao Bai
Xingjian Tian
Yonghao Xu
B. Wen
AAML
43
0
0
20 Jan 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
107
0
0
20 Jan 2025
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
Ping Guo
Cheng Gong
Xi Lin
Fei Liu
Zhichao Lu
Qingfu Zhang
Zhenkun Wang
AAML
45
0
0
13 Jan 2025
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Jialin Wu
Kaikai Pan
Yanjiao Chen
Jiangyi Deng
Shengyuan Pang
Wenyuan Xu
ViT
AAML
43
0
0
13 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
42
0
0
04 Jan 2025
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models
Sipeng Shen
Yunming Zhang
Dengpan Ye
Xiuwen Shi
Long Tang
Haoran Duan
Jiacheng Deng
Ziyi Liu
AAML
PICV
84
0
0
31 Dec 2024
Two Heads Are Better Than One: Averaging along Fine-Tuning to Improve Targeted Transferability
Hui Zeng
Sanshuai Cui
Biwei Chen
Anjie Peng
AAML
39
0
0
31 Dec 2024
A Robust Adversarial Ensemble with Causal (Feature Interaction) Interpretations for Image Classification
Chunheng Zhao
P. Pisu
G. Comert
N. Begashaw
Varghese Vaidyan
Nina Christine Hubig
AAML
32
0
0
31 Dec 2024
Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness
Olukorede Fakorede
Modeste Atsague
Jin Tian
AAML
39
0
0
31 Dec 2024
Forget Vectors at Play: Universal Input Perturbations Driving Machine Unlearning in Image Classification
Changchang Sun
Ren Wang
Yihua Zhang
Jinghan Jia
Jiancheng Liu
Gaowen Liu
Sijia Liu
Yan Yan
AAML
MU
93
0
0
21 Dec 2024
Adversarial Hubness in Multi-Modal Retrieval
Tingwei Zhang
Fnu Suya
Rishi Jha
Collin Zhang
Vitaly Shmatikov
AAML
83
1
0
18 Dec 2024
PGD-Imp: Rethinking and Unleashing Potential of Classic PGD with Dual Strategies for Imperceptible Adversarial Attacks
Jin Li
Zitong Yu
Ziqiang He
Zhong Wang
Xiangui Kang
AAML
84
0
0
15 Dec 2024
DiffPatch: Generating Customizable Adversarial Patches using Diffusion Models
Zhixiang Wang
Guangnan Ye
Xinyu Wang
Siheng Chen
Zhilin Wang
Xingjun Ma
Yu-Gang Jiang
AAML
DiffM
93
0
0
02 Dec 2024
Fall Leaf Adversarial Attack on Traffic Sign Classification
Anthony Etim
Jakub Szefer
AAML
73
3
0
27 Nov 2024
Edit Away and My Face Will not Stay: Personal Biometric Defense against Malicious Generative Editing
Hanhui Wang
Yihua Zhang
Ruizheng Bai
Yue Zhao
Sijia Liu
Z. Tu
AAML
PICV
98
2
0
25 Nov 2024
1
2
3
4
...
27
28
29
Next