ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,015 papers shown
Title
Timbre-reserved Adversarial Attack in Speaker Identification
Timbre-reserved Adversarial Attack in Speaker Identification
Qing Wang
Jixun Yao
Li Zhang
Pengcheng Guo
Linfu Xie
AAML
81
4
0
02 Sep 2023
Towards Certified Probabilistic Robustness with High Accuracy
Towards Certified Probabilistic Robustness with High Accuracy
Ruihan Zhang
Peixin Zhang
Jun Sun
AAML
65
0
0
02 Sep 2023
Non-Asymptotic Bounds for Adversarial Excess Risk under Misspecified
  Models
Non-Asymptotic Bounds for Adversarial Excess Risk under Misspecified Models
Changyu Liu
Yuling Jiao
Junhui Wang
Jian Huang
AAML
43
2
0
02 Sep 2023
Adversarial Finetuning with Latent Representation Constraint to Mitigate
  Accuracy-Robustness Tradeoff
Adversarial Finetuning with Latent Representation Constraint to Mitigate Accuracy-Robustness Tradeoff
Satoshi Suzuki
Shin'ya Yamaguchi
Shoichiro Takeda
Sekitoshi Kanai
Naoki Makishima
Atsushi Ando
Ryo Masumura
AAML
99
5
0
31 Aug 2023
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart
  Grid: A Review
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review
Zhenyong Zhang
Mengxiang Liu
Mingyang Sun
Ruilong Deng
Peng Cheng
Dusit Niyato
Mo-Yuen Chow
Jiming Chen
115
47
0
30 Aug 2023
Intriguing Properties of Diffusion Models: An Empirical Study of the
  Natural Attack Capability in Text-to-Image Generative Models
Intriguing Properties of Diffusion Models: An Empirical Study of the Natural Attack Capability in Text-to-Image Generative Models
Takami Sato
Justin Yue
Nanze Chen
Ningfei Wang
Qi Alfred Chen
DiffM
74
3
0
30 Aug 2023
MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Arezoo Rajabi
Surudhi Asokraj
Feng-Shr Jiang
Luyao Niu
Bhaskar Ramasubramanian
J. Ritcey
Radha Poovendran
AAML
63
1
0
30 Aug 2023
Adaptive Attack Detection in Text Classification: Leveraging Space
  Exploration Features for Text Sentiment Classification
Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification
Atefeh Mahdavi
Neda Keivandarian
Marco Carvalho
AAML
15
0
0
29 Aug 2023
Prototype Fission: Closing Set for Robust Open-set Semi-supervised
  Learning
Prototype Fission: Closing Set for Robust Open-set Semi-supervised Learning
Xuwei Tan
Yi-Jie Huang
Yaqian Li
131
2
0
29 Aug 2023
3D Adversarial Augmentations for Robust Out-of-Domain Predictions
3D Adversarial Augmentations for Robust Out-of-Domain Predictions
Alexander Lehner
Stefano Gasperini
Alvaro Marcos-Ramiro
Michael Schmidt
Nassir Navab
Benjamin Busam
F. Tombari
3DPC
91
8
0
29 Aug 2023
Input margins can predict generalization too
Input margins can predict generalization too
Coenraad Mouton
Marthinus W. Theunissen
Marelie Hattingh Davel
AAMLUQCVAI4CE
70
4
0
29 Aug 2023
Advancing Adversarial Robustness Through Adversarial Logit Update
Advancing Adversarial Robustness Through Adversarial Logit Update
Hao Xuan
Peican Zhu
Xingyu Li
AAML
85
0
0
29 Aug 2023
RecRec: Algorithmic Recourse for Recommender Systems
RecRec: Algorithmic Recourse for Recommender Systems
Sahil Verma
Ashudeep Singh
Varich Boonsanong
John P. Dickerson
Chirag Shah
79
2
0
28 Aug 2023
Adversarial Attacks on Foundational Vision Models
Adversarial Attacks on Foundational Vision Models
Nathan Inkawhich
Gwendolyn McDonald
R. Luley
VLM
73
13
0
28 Aug 2023
Fast Adversarial Training with Smooth Convergence
Fast Adversarial Training with Smooth Convergence
Mengnan Zhao
Lulu Zhang
Yuqiu Kong
Baocai Yin
AAML
51
8
0
24 Aug 2023
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and
  Vulnerabilities
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities
Maximilian Mozes
Xuanli He
Bennett Kleinberg
Lewis D. Griffin
87
87
0
24 Aug 2023
On-Manifold Projected Gradient Descent
On-Manifold Projected Gradient Descent
Aaron Mahler
Tyrus Berry
Thomas Stephens
Harbir Antil
Michael Merritt
Jeanie Schreiber
Ioannis G. Kevrekidis
AAML
84
0
0
23 Aug 2023
Does Physical Adversarial Example Really Matter to Autonomous Driving?
  Towards System-Level Effect of Adversarial Object Evasion Attack
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack
Ningfei Wang
Y. Luo
Takami Sato
Kaidi Xu
Qi Alfred Chen
AAML
74
34
0
23 Aug 2023
Adversarial Training Using Feedback Loops
Adversarial Training Using Feedback Loops
Ali Haisam Muhammad Rafid
Adrian Sandu
AAML
48
1
0
23 Aug 2023
Revisiting and Exploring Efficient Fast Adversarial Training via LAW:
  Lipschitz Regularization and Auto Weight Averaging
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging
Xiaojun Jia
YueFeng Chen
Xiaofeng Mao
Ranjie Duan
Jindong Gu
Rong Zhang
H. Xue
Xiaochun Cao
AAML
67
11
0
22 Aug 2023
Enhancing Adversarial Attacks: The Similar Target Method
Enhancing Adversarial Attacks: The Similar Target Method
Shuo Zhang
Ziruo Wang
Zikai Zhou
Huanran Chen
AAML
98
1
0
21 Aug 2023
Measuring the Effect of Causal Disentanglement on the Adversarial
  Robustness of Neural Network Models
Measuring the Effect of Causal Disentanglement on the Adversarial Robustness of Neural Network Models
Preben Ness
D. Marijan
Sunanda Bose
CML
70
0
0
21 Aug 2023
Improving the Transferability of Adversarial Examples with Arbitrary
  Style Transfer
Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer
Zhijin Ge
Fanhua Shang
Hongying Liu
Yuanyuan Liu
Liang Wan
Wei Feng
Xiaosen Wang
AAML
98
19
0
21 Aug 2023
Improving Adversarial Robustness of Masked Autoencoders via Test-time
  Frequency-domain Prompting
Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting
Qidong Huang
Xiaoyi Dong
DongDong Chen
Yinpeng Chen
Lu Yuan
Gang Hua
Weiming Zhang
Neng H. Yu
AAML
110
9
0
20 Aug 2023
Boosting Adversarial Transferability by Block Shuffle and Rotation
Boosting Adversarial Transferability by Block Shuffle and Rotation
Kunyu Wang
Xu He
Wenxuan Wang
Xiaosen Wang
AAML
115
44
0
20 Aug 2023
Robust Mixture-of-Expert Training for Convolutional Neural Networks
Robust Mixture-of-Expert Training for Convolutional Neural Networks
Yihua Zhang
Ruisi Cai
Tianlong Chen
Guanhua Zhang
Huan Zhang
Pin-Yu Chen
Shiyu Chang
Zhangyang Wang
Sijia Liu
MoEAAMLOOD
93
19
0
19 Aug 2023
Distributionally Robust Cross Subject EEG Decoding
Distributionally Robust Cross Subject EEG Decoding
Tiehang Duan
Zhenyi Wang
Gianfranco Doretto
Fang Li
Cui Tao
Don Adjeroh
38
3
0
19 Aug 2023
Enumerating Safe Regions in Deep Neural Networks with Provable
  Probabilistic Guarantees
Enumerating Safe Regions in Deep Neural Networks with Provable Probabilistic Guarantees
Luca Marzari
Davide Corsi
Enrico Marchesini
Alessandro Farinelli
Ferdinando Cicalese
AAML
64
12
0
18 Aug 2023
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing
  Framework for Content Moderation Software
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software
Wenxuan Wang
Jingyuan Huang
Jen-tse Huang
Chang Chen
Jiazhen Gu
Pinjia He
Michael R. Lyu
VLM
69
6
0
18 Aug 2023
General Lipschitz: Certified Robustness Against Resolvable Semantic
  Transformations via Transformation-Dependent Randomized Smoothing
General Lipschitz: Certified Robustness Against Resolvable Semantic Transformations via Transformation-Dependent Randomized Smoothing
Dmitrii Korzh
Alireza Azadbakht
Maryam Tahmasbi
Alireza Javaheri
AAML
88
0
0
17 Aug 2023
A White-Box False Positive Adversarial Attack Method on Contrastive Loss
  Based Offline Handwritten Signature Verification Models
A White-Box False Positive Adversarial Attack Method on Contrastive Loss Based Offline Handwritten Signature Verification Models
Zhongliang Guo
Weiye Li
Yifei Qian
Ognjen Arandjelovic
Lei Fang
AAML
90
14
0
17 Aug 2023
Dynamic Neural Network is All You Need: Understanding the Robustness of
  Dynamic Mechanisms in Neural Networks
Dynamic Neural Network is All You Need: Understanding the Robustness of Dynamic Mechanisms in Neural Networks
Mirazul Haque
Wei Yang
AAML
53
2
0
17 Aug 2023
Benchmarking Adversarial Robustness of Compressed Deep Learning Models
Benchmarking Adversarial Robustness of Compressed Deep Learning Models
Brijesh Vora
Kartik Patwari
Syed Mahbub Hafiz
Zubair Shafiq
Chen-Nee Chuah
AAML
77
2
0
16 Aug 2023
SEDA: Self-Ensembling ViT with Defensive Distillation and Adversarial
  Training for robust Chest X-rays Classification
SEDA: Self-Ensembling ViT with Defensive Distillation and Adversarial Training for robust Chest X-rays Classification
Raza Imam
Ibrahim Almakky
Salma Alrashdi
Baketah Alrashdi
Mohammad Yaqub
AAML
60
1
0
15 Aug 2023
Robustness Over Time: Understanding Adversarial Examples' Effectiveness
  on Longitudinal Versions of Large Language Models
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models
Yugeng Liu
Tianshuo Cong
Zhengyu Zhao
Michael Backes
Yun Shen
Yang Zhang
AAML
90
8
0
15 Aug 2023
Simple and Efficient Partial Graph Adversarial Attack: A New Perspective
Simple and Efficient Partial Graph Adversarial Attack: A New Perspective
Guanghui Zhu
Meng Chen
Chun Yuan
Jiaming Ji
AAML
69
7
0
15 Aug 2023
A Review of Adversarial Attacks in Computer Vision
A Review of Adversarial Attacks in Computer Vision
Yutong Zhang
Yao Li
Yin Li
Zhichang Guo
AAML
86
3
0
15 Aug 2023
Backpropagation Path Search On Adversarial Transferability
Backpropagation Path Search On Adversarial Transferability
Zhuoer Xu
Zhangxuan Gu
Jianping Zhang
Shiwen Cui
Changhua Meng
Weiqiang Wang
AAML
77
5
0
15 Aug 2023
Robustified ANNs Reveal Wormholes Between Human Category Percepts
Robustified ANNs Reveal Wormholes Between Human Category Percepts
Guy Gaziv
Michael J. Lee
J. DiCarlo
AAML
75
7
0
14 Aug 2023
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network
  Intrusion Detection
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection
João Vitorino
Isabel Praça
Eva Maia
AAML
61
26
0
13 Aug 2023
Not So Robust After All: Evaluating the Robustness of Deep Neural
  Networks to Unseen Adversarial Attacks
Not So Robust After All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks
R. Garaev
Bader Rasheed
Adil Mehmood Khan
AAMLOOD
38
2
0
12 Aug 2023
Physical Adversarial Attacks For Camera-based Smart Systems: Current
  Trends, Categorization, Applications, Research Challenges, and Future Outlook
Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Amira Guesmi
Muhammad Abdullah Hanif
B. Ouni
Muhammed Shafique
AAML
125
23
0
11 Aug 2023
TrajPAC: Towards Robustness Verification of Pedestrian Trajectory
  Prediction Models
TrajPAC: Towards Robustness Verification of Pedestrian Trajectory Prediction Models
Liang Zhang
Nathaniel Xu
Pengfei Yang
Gao Jin
Cheng-Chao Huang
Lijun Zhang
101
9
0
11 Aug 2023
Face Encryption via Frequency-Restricted Identity-Agnostic Attacks
Xinjie Dong
Rui Wang
Siyuan Liang
Aishan Liu
Lihua Jing
AAMLPICV
91
9
0
11 Aug 2023
Symmetry Defense Against XGBoost Adversarial Perturbation Attacks
Symmetry Defense Against XGBoost Adversarial Perturbation Attacks
Blerta Lindqvist
AAML
75
0
0
10 Aug 2023
Generating Transferable and Stealthy Adversarial Patch via
  Attention-guided Adversarial Inpainting
Generating Transferable and Stealthy Adversarial Patch via Attention-guided Adversarial Inpainting
Yanjie Li
Mingxing Duan
Xuelong Dai
Bin Xiao
AAML
71
0
0
10 Aug 2023
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated
  Learning
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning
Simon Queyrut
Yérom-David Bromberg
V. Schiavoni
FedMLAAML
81
1
0
08 Aug 2023
A reading survey on adversarial machine learning: Adversarial attacks
  and their understanding
A reading survey on adversarial machine learning: Adversarial attacks and their understanding
Shashank Kotyan
AAML
71
6
0
07 Aug 2023
CGBA: Curvature-aware Geometric Black-box Attack
CGBA: Curvature-aware Geometric Black-box Attack
Md. Farhamdur Reza
A. Rahmati
Tianfu Wu
H. Dai
AAML
83
20
0
06 Aug 2023
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation
Amira Guesmi
Muhammad Abdullah Hanif
B. Ouni
Mohamed Bennai
MDE
82
13
0
06 Aug 2023
Previous
123...161718...798081
Next