ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OOD
    AAML
ArXivPDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 1,726 papers shown
Title
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference
  Attacks
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks
Nuo Xu
Binghui Wang
Ran Ran
Wujie Wen
Parv Venkitasubramaniam
AAML
31
5
0
11 Jun 2022
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Shehzeen Samarah Hussain
Todd P. Huster
Chris Mesterharm
Paarth Neekhara
Kevin R. An
Malhar Jere
Harshvardhan Digvijay Sikka
F. Koushanfar
AAML
26
6
0
09 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
29
2
0
08 Jun 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
30
37
0
07 Jun 2022
Building Robust Ensembles via Margin Boosting
Building Robust Ensembles via Margin Boosting
Dinghuai Zhang
Hongyang R. Zhang
Aaron Courville
Yoshua Bengio
Pradeep Ravikumar
A. Suggala
AAML
UQCV
48
15
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
47
18
0
07 Jun 2022
Fooling Explanations in Text Classifiers
Fooling Explanations in Text Classifiers
Adam Ivankay
Ivan Girardi
Chiara Marchiori
P. Frossard
AAML
35
19
0
07 Jun 2022
Robust Adversarial Attacks Detection based on Explainable Deep
  Reinforcement Learning For UAV Guidance and Planning
Robust Adversarial Attacks Detection based on Explainable Deep Reinforcement Learning For UAV Guidance and Planning
Tom Hickling
Nabil Aouf
P. Spencer
AAML
30
50
0
06 Jun 2022
Certified Robustness in Federated Learning
Certified Robustness in Federated Learning
Motasem Alfarra
Juan C. Pérez
Egor Shulgin
Peter Richtárik
Guohao Li
AAML
FedML
23
7
0
06 Jun 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness
  Trade-Off in Adversarial Training
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training
Guodong Cao
Peng Kuang
Xiaowei Dong
Zhifei Zhang
Hengchang Guo
Zhan Qin
Kui Ren
AAML
30
1
0
05 Jun 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
37
11
0
04 Jun 2022
Towards Evading the Limits of Randomized Smoothing: A Theoretical
  Analysis
Towards Evading the Limits of Randomized Smoothing: A Theoretical Analysis
Raphael Ettedgui
Alexandre Araujo
Rafael Pinot
Y. Chevaleyre
Jamal Atif
AAML
34
3
0
03 Jun 2022
On the Generalization of Wasserstein Robust Federated Learning
On the Generalization of Wasserstein Robust Federated Learning
Tung Nguyen
Tuan Dung Nguyen
Long Tan Le
Canh T. Dinh
N. H. Tran
OOD
FedML
36
6
0
03 Jun 2022
On the reversibility of adversarial attacks
On the reversibility of adversarial attacks
C. Li
Ricardo Sánchez-Matilla
Ali Shahin Shamsabadi
Riccardo Mazzon
Andrea Cavallaro
AAML
27
2
0
01 Jun 2022
Attack-Agnostic Adversarial Detection
Attack-Agnostic Adversarial Detection
Jiaxin Cheng
Mohamed Hussein
J. Billa
Wael AbdAlmageed
AAML
28
0
0
01 Jun 2022
Hide and Seek: on the Stealthiness of Attacks against Deep Learning
  Systems
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
AAML
15
1
0
31 May 2022
Exact Feature Collisions in Neural Networks
Exact Feature Collisions in Neural Networks
Utku Ozbulak
Manvel Gasparyan
Shodhan Rao
W. D. Neve
Arnout Van Messem
AAML
34
1
0
31 May 2022
Superclass Adversarial Attack
Superclass Adversarial Attack
Soichiro Kumano
Hiroshi Kera
T. Yamasaki
AAML
41
1
0
29 May 2022
Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Glenn Dawson
Muhammad Umer
R. Polikar
AAML
36
0
0
28 May 2022
Rethinking Bayesian Learning for Data Analysis: The Art of Prior and
  Inference in Sparsity-Aware Modeling
Rethinking Bayesian Learning for Data Analysis: The Art of Prior and Inference in Sparsity-Aware Modeling
Lei Cheng
Feng Yin
Sergios Theodoridis
S. Chatzis
Tsung-Hui Chang
73
75
0
28 May 2022
Standalone Neural ODEs with Sensitivity Analysis
Standalone Neural ODEs with Sensitivity Analysis
Rym Jaroudi
Lukáš Malý
Gabriel Eilertsen
B. Johansson
Jonas Unger
George Baravdish
23
0
0
27 May 2022
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating
  Weather Conditions on the Camera Lens of Autonomous Systems
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems
Alberto Marchisio
Giovanni Caramia
Maurizio Martina
Mohamed Bennai
AAML
38
8
0
27 May 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
45
50
0
26 May 2022
One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
Shutong Wu
Sizhe Chen
Cihang Xie
Xiaolin Huang
AAML
51
27
0
24 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
110
28
0
24 May 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial Robustness
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
56
9
0
23 May 2022
Learning to Reverse DNNs from AI Programs Automatically
Learning to Reverse DNNs from AI Programs Automatically
Simin Chen
Hamed Khanpour
Cong Liu
Wei Yang
40
16
0
20 May 2022
Gradient-based Counterfactual Explanations using Tractable Probabilistic
  Models
Gradient-based Counterfactual Explanations using Tractable Probabilistic Models
Xiaoting Shao
Kristian Kersting
BDL
27
1
0
16 May 2022
Robust Representation via Dynamic Feature Aggregation
Robust Representation via Dynamic Feature Aggregation
Haozhe Liu
Haoqin Ji
Yuexiang Li
Nanjun He
Haoqian Wu
Feng Liu
Linlin Shen
Yefeng Zheng
AAML
OOD
45
3
0
16 May 2022
Verifying Neural Networks Against Backdoor Attacks
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
26
5
0
14 May 2022
Evaluating Membership Inference Through Adversarial Robustness
Evaluating Membership Inference Through Adversarial Robustness
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Bilal Hussain Abbasi
Shengshan Hu
AAML
64
15
0
14 May 2022
AEON: A Method for Automatic Evaluation of NLP Test Cases
AEON: A Method for Automatic Evaluation of NLP Test Cases
Jen-tse Huang
Jianping Zhang
Wenxuan Wang
Pinjia He
Yuxin Su
Michael R. Lyu
45
23
0
13 May 2022
Smooth-Reduce: Leveraging Patches for Improved Certified Robustness
Smooth-Reduce: Leveraging Patches for Improved Certified Robustness
Ameya Joshi
Minh Pham
Minsu Cho
Leonid Boytsov
Filipe Condessa
J. Zico Kolter
Chinmay Hegde
UQCV
AAML
36
2
0
12 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
28
55
0
12 May 2022
How Does Frequency Bias Affect the Robustness of Neural Image
  Classifiers against Common Corruption and Adversarial Perturbations?
How Does Frequency Bias Affect the Robustness of Neural Image Classifiers against Common Corruption and Adversarial Perturbations?
Alvin Chan
Yew-Soon Ong
Clement Tan
AAML
24
13
0
09 May 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
31
3
0
09 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Binghui Wang
Youqin Li
Pan Zhou
AAML
34
14
0
07 May 2022
Imperceptible Backdoor Attack: From Input Space to Feature
  Representation
Imperceptible Backdoor Attack: From Input Space to Feature Representation
Nan Zhong
Zhenxing Qian
Xinpeng Zhang
AAML
25
52
0
06 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
27
7
0
05 May 2022
CE-based white-box adversarial attacks will not work using super-fitting
CE-based white-box adversarial attacks will not work using super-fitting
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
39
0
0
04 May 2022
Deep-Attack over the Deep Reinforcement Learning
Deep-Attack over the Deep Reinforcement Learning
Yang Li
Quanbiao Pan
Min Zhang
AAML
32
13
0
02 May 2022
DDDM: a Brain-Inspired Framework for Robust Classification
DDDM: a Brain-Inspired Framework for Robust Classification
Xiyuan Chen
Xingyu Li
Yi Zhou
Tianming Yang
AAML
DiffM
50
7
0
01 May 2022
Software Testing for Machine Learning
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
30
27
0
30 Apr 2022
Detecting Textual Adversarial Examples Based on Distributional
  Characteristics of Data Representations
Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Na Liu
Mark Dras
Wei Emma Zhang
AAML
24
6
0
29 Apr 2022
Uncertainty-Aware Prediction of Battery Energy Consumption for Hybrid
  Electric Vehicles
Uncertainty-Aware Prediction of Battery Energy Consumption for Hybrid Electric Vehicles
Jihed Khiari
Cristina Olaverri-Monreal
32
2
0
27 Apr 2022
A review of Federated Learning in Intrusion Detection Systems for IoT
A review of Federated Learning in Intrusion Detection Systems for IoT
Aitor Belenguer
J. Navaridas
J. A. Pascual
33
15
0
26 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection
  Mechanism in Social Networks
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
25
28
0
26 Apr 2022
A Mask-Based Adversarial Defense Scheme
A Mask-Based Adversarial Defense Scheme
Weizhen Xu
Chenyi Zhang
Fangzhen Zhao
Liangda Fang
AAML
30
3
0
21 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
25
5
0
20 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile
  Edge
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
31
2
0
18 Apr 2022
Previous
123...111213...333435
Next