ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,016 papers shown
Title
Generalizable Lightweight Proxy for Robust NAS against Diverse
  Perturbations
Generalizable Lightweight Proxy for Robust NAS against Diverse Perturbations
Hyeonjeong Ha
Minseon Kim
Sung Ju Hwang
OODAAML
68
6
0
08 Jun 2023
A Melting Pot of Evolution and Learning
A Melting Pot of Evolution and Learning
Moshe Sipper
Achiya Elyasaf
Tomer Halperin
Zvika Haramaty
Raz Lapid
Eyal Segal
Itai Tzruia
Snir Vitrack Tamam
BDL
57
0
0
08 Jun 2023
A Linearly Convergent GAN Inversion-based Algorithm for Reverse
  Engineering of Deceptions
A Linearly Convergent GAN Inversion-based Algorithm for Reverse Engineering of Deceptions
D. Thaker
Paris V. Giampouras
René Vidal
AAML
62
0
0
07 Jun 2023
Adversarial Sample Detection Through Neural Network Transport Dynamics
Adversarial Sample Detection Through Neural Network Transport Dynamics
Skander Karkar
Patrick Gallinari
A. Rakotomamonjy
AAML
56
1
0
07 Jun 2023
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not
  Preserving)
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)
Yohan Beugin
Patrick McDaniel
138
7
0
06 Jun 2023
Exploring Model Dynamics for Accumulative Poisoning Discovery
Exploring Model Dynamics for Accumulative Poisoning Discovery
Jianing Zhu
Xiawei Guo
Jiangchao Yao
Chao Du
Li He
Shuo Yuan
Tongliang Liu
Liang Wang
Bo Han
AAML
60
0
0
06 Jun 2023
Revisiting the Trade-off between Accuracy and Robustness via Weight
  Distribution of Filters
Revisiting the Trade-off between Accuracy and Robustness via Weight Distribution of Filters
Xingxing Wei
Shiji Zhao
Bo li
AAML
121
7
0
06 Jun 2023
Adversarial alignment: Breaking the trade-off between the strength of an
  attack and its relevance to human perception
Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception
Drew Linsley
Pinyuan Feng
Thibaut Boissin
A. Ashok
Thomas Fel
Stephanie Olaiya
Thomas Serre
AAML
78
6
0
05 Jun 2023
From Robustness to Explainability and Back Again
From Robustness to Explainability and Back Again
Xuanxiang Huang
Sasha Rubin
95
10
0
05 Jun 2023
Stable Diffusion is Unstable
Stable Diffusion is Unstable
Chengbin Du
Yanxi Li
Zhongwei Qiu
Chang Xu
DiffM
116
18
0
05 Jun 2023
Adversary for Social Good: Leveraging Adversarial Attacks to Protect
  Personal Attribute Privacy
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy
Xiaoting Li
Ling-Hao Chen
Dinghao Wu
AAMLSILM
66
6
0
04 Jun 2023
Towards Black-box Adversarial Example Detection: A Data
  Reconstruction-based Method
Towards Black-box Adversarial Example Detection: A Data Reconstruction-based Method
Yifei Gao
Zhi Lin
Yunfan Yang
Jitao Sang
AAML
99
4
0
03 Jun 2023
Supervised Adversarial Contrastive Learning for Emotion Recognition in
  Conversations
Supervised Adversarial Contrastive Learning for Emotion Recognition in Conversations
Dou Hu
Yinan Bao
Lingwei Wei
Wei Zhou
Song Hu
105
56
0
02 Jun 2023
Adversarial Attack Based on Prediction-Correction
Adversarial Attack Based on Prediction-Correction
Chen Wan
Fangjun Huang
AAML
62
4
0
02 Jun 2023
Reconstruction Distortion of Learned Image Compression with
  Imperceptible Perturbations
Reconstruction Distortion of Learned Image Compression with Imperceptible Perturbations
Yang Sui
Zhuohang Li
Ding Ding
Xiang Pan
Xiaozhong Xu
Shan Liu
Zhenzhong Chen
AAML
38
4
0
01 Jun 2023
SlothSpeech: Denial-of-service Attack Against Speech Recognition Models
SlothSpeech: Denial-of-service Attack Against Speech Recognition Models
Mirazul Haque
Rutvij J. Shah
Simin Chen
Berrak cSicsman
Cong Liu
Wei Yang
AuLLMAAML
62
7
0
01 Jun 2023
Adversarial-Aware Deep Learning System based on a Secondary Classical
  Machine Learning Verification Approach
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach
Mohammed Alkhowaiter
Hisham A. Kholidy
Mnassar Alyami
Abdulmajeed Alghamdi
C. Zou
AAML
80
8
0
01 Jun 2023
Graph-based methods coupled with specific distributional distances for
  adversarial attack detection
Graph-based methods coupled with specific distributional distances for adversarial attack detection
dwight nwaigwe
Lucrezia Carboni
Martial Mermillod
Sophie Achard
M. Dojat
AAML
72
3
0
31 May 2023
Exploring the Vulnerabilities of Machine Learning and Quantum Machine
  Learning to Adversarial Attacks using a Malware Dataset: A Comparative
  Analysis
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Mst. Shapna Akter
Hossain Shahriar
Iysa Iqbal
M. Hossain
M. A. Karim
Victor A. Clincy
R. Voicu
AAML
70
8
0
31 May 2023
NaturalFinger: Generating Natural Fingerprint with Generative
  Adversarial Networks
NaturalFinger: Generating Natural Fingerprint with Generative Adversarial Networks
Kan Yang
Kunhao Lai
AAML
88
0
0
29 May 2023
Amplification trojan network: Attack deep neural networks by amplifying
  their inherent weakness
Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness
Zhan Hu
Jun Zhu
Bo Zhang
Xiaolin Hu
AAML
72
2
0
28 May 2023
On the Importance of Backbone to the Adversarial Robustness of Object Detectors
On the Importance of Backbone to the Adversarial Robustness of Object Detectors
Xiao-Li Li
Hang Chen
Xiaolin Hu
AAML
134
4
0
27 May 2023
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection
Nils Palumbo
Yang Guo
Xi Wu
Jiefeng Chen
Yingyu Liang
S. Jha
AAML
113
0
0
27 May 2023
A Tale of Two Approximations: Tightening Over-Approximation for DNN
  Robustness Verification via Under-Approximation
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation
Zhiyi Xue
Si Liu
Zhaodi Zhang
Yiting Wu
Hao Fei
AAML
61
2
0
26 May 2023
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness
  and Controllability
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability
Haotian Xue
Alexandre Araujo
Bin Hu
Yongxin Chen
DiffM
147
48
0
25 May 2023
Securing Deep Generative Models with Universal Adversarial Signature
Securing Deep Generative Models with Universal Adversarial Signature
Yu Zeng
Mo Zhou
Yuan Xue
Vishal M. Patel
WIGM
65
12
0
25 May 2023
Detecting Adversarial Data by Probing Multiple Perturbations Using
  Expected Perturbation Score
Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score
Shuhai Zhang
Feng Liu
Jiahao Yang
Yifan Yang
Changsheng Li
Bo Han
Mingkui Tan
DiffMAAML
60
18
0
25 May 2023
PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image
  Deraining for Semantic Segmentation
PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image Deraining for Semantic Segmentation
Xianghao Jiao
Yao-Tsorng Liu
Jiaxin Gao
Xinyuan Chu
Risheng Liu
Xin-Yue Fan
VLM
90
6
0
25 May 2023
Fast Adversarial CNN-based Perturbation Attack on No-Reference Image-
  and Video-Quality Metrics
Fast Adversarial CNN-based Perturbation Attack on No-Reference Image- and Video-Quality Metrics
E. Shumitskaya
Anastasia Antsiferova
D. Vatolin
75
7
0
24 May 2023
Robust Classification via a Single Diffusion Model
Robust Classification via a Single Diffusion Model
Huanran Chen
Yinpeng Dong
Zhengyi Wang
Xiaohu Yang
Chen-Dong Duan
Hang Su
Jun Zhu
154
60
0
24 May 2023
AdvFunMatch: When Consistent Teaching Meets Adversarial Robustness
AdvFunMatch: When Consistent Teaching Meets Adversarial Robustness
Ziuhi Wu
Haichang Gao
Bingqian Zhou
Ping Wang
AAML
70
0
0
24 May 2023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition
  Systems
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Guangke Chen
Yedi Zhang
Zhe Zhao
Fu Song
AAML
71
14
0
23 May 2023
DiffProtect: Generate Adversarial Examples with Diffusion Models for
  Facial Privacy Protection
DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection
Jiang-Long Liu
Chun Pong Lau
Ramalingam Chellappa
DiffM
80
32
0
23 May 2023
Generalizable Synthetic Image Detection via Language-guided Contrastive Learning
Generalizable Synthetic Image Detection via Language-guided Contrastive Learning
Haiwei Wu
Jiantao Zhou
Shile Zhang
212
30
0
23 May 2023
Adversarial Defenses via Vector Quantization
Adversarial Defenses via Vector Quantization
Zhiyi Dong
Yongyi Mao
AAML
74
1
0
23 May 2023
Latent Magic: An Investigation into Adversarial Examples Crafted in the
  Semantic Latent Space
Latent Magic: An Investigation into Adversarial Examples Crafted in the Semantic Latent Space
Bo Zheng
DiffM
99
1
0
22 May 2023
Towards Benchmarking and Assessing Visual Naturalness of Physical World
  Adversarial Attacks
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks
Simin Li
Shuing Zhang
Gujun Chen
Dong Wang
Pu Feng
Jiakai Wang
Aishan Liu
Xin Yi
Xianglong Liu
AAML
65
18
0
22 May 2023
FGAM:Fast Adversarial Malware Generation Method Based on Gradient Sign
FGAM:Fast Adversarial Malware Generation Method Based on Gradient Sign
Kunkun Li
Fan Zhang
Wei Guo
AAML
29
4
0
22 May 2023
Multi-Task Models Adversarial Attacks
Multi-Task Models Adversarial Attacks
Lijun Zhang
Xiao Liu
Kaleel Mahmood
Caiwen Ding
Hui Guan
AAML
91
0
0
20 May 2023
DAP: A Dynamic Adversarial Patch for Evading Person Detectors
DAP: A Dynamic Adversarial Patch for Evading Person Detectors
Amira Guesmi
Ruitian Ding
Muhammad Abdullah Hanif
Ihsen Alouani
Mohamed Bennai
AAML
116
28
0
19 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
122
64
0
18 May 2023
Attacking Perceptual Similarity Metrics
Attacking Perceptual Similarity Metrics
Abhijay Ghildyal
Feng Liu
AAML
97
10
0
15 May 2023
Exploiting Frequency Spectrum of Adversarial Images for General
  Robustness
Exploiting Frequency Spectrum of Adversarial Images for General Robustness
Chun Yang Tan
K. Kawamoto
Hiroshi Kera
AAMLOOD
68
1
0
15 May 2023
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen
Hechang Chen
Keyan Chen
Yilan Zhang
Zhengxia Zou
Z. Shi
DiffM
116
73
0
14 May 2023
Improving Defensive Distillation using Teacher Assistant
Improving Defensive Distillation using Teacher Assistant
Maniratnam Mandal
Suna Gao
AAML
18
0
0
14 May 2023
On enhancing the robustness of Vision Transformers: Defensive Diffusion
On enhancing the robustness of Vision Transformers: Defensive Diffusion
Raza Imam
Muhammad Huzaifa
Mohammed El-Amine Azz
MedImDiffM
120
5
0
14 May 2023
Efficient Search of Comprehensively Robust Neural Architectures via
  Multi-fidelity Evaluation
Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation
Jialiang Sun
Wen Yao
Tingsong Jiang
Xiaoqian Chen
AAML
77
10
0
12 May 2023
Distracting Downpour: Adversarial Weather Attacks for Motion Estimation
Distracting Downpour: Adversarial Weather Attacks for Motion Estimation
Jenny Schmalfuss
Lukas Mehl
Andrés Bruhn
AAML
67
17
0
11 May 2023
Investigating the Corruption Robustness of Image Classifiers with Random
  Lp-norm Corruptions
Investigating the Corruption Robustness of Image Classifiers with Random Lp-norm Corruptions
George J. Siedel
Weijia Shao
S. Vock
Andrey Morozov
59
1
0
09 May 2023
Adversarial Examples Detection with Enhanced Image Difference Features
  based on Local Histogram Equalization
Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization
Z. Yin
Shaowei Zhu
Han Su
Jianteng Peng
Wanli Lyu
Bin Luo
AAML
67
3
0
08 May 2023
Previous
123...192021...798081
Next