ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OOD
    AAML
ArXivPDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 1,684 papers shown
Title
SoK: Certified Robustness for Deep Neural Networks
SoK: Certified Robustness for Deep Neural Networks
Linyi Li
Tao Xie
Bo Li
AAML
38
128
0
09 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
33
157
0
08 Sep 2020
Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp
  Adversarial Attacks
Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp Adversarial Attacks
Wei-An Lin
Chun Pong Lau
Alexander Levine
Ramalingam Chellappa
S. Feizi
AAML
81
60
0
05 Sep 2020
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Jonas Geiping
Liam H. Fowl
Wenjie Huang
W. Czaja
Gavin Taylor
Michael Moeller
Tom Goldstein
AAML
21
215
0
04 Sep 2020
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
L. Chen
Junhai Yong
MLAU
OOD
41
17
0
02 Sep 2020
Adversarially Robust Neural Architectures
Adversarially Robust Neural Architectures
Minjing Dong
Yanxi Li
Yunhe Wang
Chang Xu
AAML
OOD
47
48
0
02 Sep 2020
On the Structures of Representation for the Robustness of Semantic
  Segmentation to Input Corruption
On the Structures of Representation for the Robustness of Semantic Segmentation to Input Corruption
Charles Lehman
Dogancan Temel
Ghassan AlRegib
23
4
0
02 Sep 2020
Open-set Adversarial Defense
Open-set Adversarial Defense
Rui Shao
Pramuditha Perera
Pong C. Yuen
Vishal M. Patel
AAML
23
30
0
02 Sep 2020
Adversarial Eigen Attack on Black-Box Models
Adversarial Eigen Attack on Black-Box Models
Linjun Zhou
Peng Cui
Yinan Jiang
Shiqiang Yang
AAML
14
12
0
27 Aug 2020
PermuteAttack: Counterfactual Explanation of Machine Learning Credit
  Scorecards
PermuteAttack: Counterfactual Explanation of Machine Learning Credit Scorecards
Masoud Hashemi
Ali Fathi
AAML
15
32
0
24 Aug 2020
On Attribution of Deepfakes
On Attribution of Deepfakes
Baiwu Zhang
Jin Peng Zhou
Ilia Shumailov
Nicolas Papernot
WIGM
32
11
0
20 Aug 2020
Yet Another Intermediate-Level Attack
Yet Another Intermediate-Level Attack
Qizhang Li
Yiwen Guo
Hao Chen
AAML
24
51
0
20 Aug 2020
Addressing Neural Network Robustness with Mixup and Targeted Labeling
  Adversarial Training
Addressing Neural Network Robustness with Mixup and Targeted Labeling Adversarial Training
Alfred Laugros
A. Caplier
Matthieu Ospici
AAML
24
19
0
19 Aug 2020
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical
  Attacks on Machine Learning for Windows Malware Detection
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Christian Scano
Scott E. Coull
Battista Biggio
Giovanni Lagorio
A. Armando
Fabio Roli
AAML
35
59
0
17 Aug 2020
Adversarial Filters for Secure Modulation Classification
Adversarial Filters for Secure Modulation Classification
A. Berian
K. Staab
N. Teku
G. Ditzler
T. Bose
Ravi Tandon
AAML
19
7
0
15 Aug 2020
Adversarial Training and Provable Robustness: A Tale of Two Objectives
Adversarial Training and Provable Robustness: A Tale of Two Objectives
Jiameng Fan
Wenchao Li
AAML
25
20
0
13 Aug 2020
Defending Adversarial Examples via DNN Bottleneck Reinforcement
Defending Adversarial Examples via DNN Bottleneck Reinforcement
Wenqing Liu
Miaojing Shi
Teddy Furon
Li Li
AAML
26
8
0
12 Aug 2020
Visual Attack and Defense on Text
Visual Attack and Defense on Text
Shengjun Liu
Ningkang Jiang
Yuanbin Wu
AAML
20
0
0
07 Aug 2020
Optimizing Information Loss Towards Robust Neural Networks
Optimizing Information Loss Towards Robust Neural Networks
Philip Sperl
Konstantin Böttinger
AAML
21
3
0
07 Aug 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
32
73
0
07 Aug 2020
Stronger and Faster Wasserstein Adversarial Attacks
Stronger and Faster Wasserstein Adversarial Attacks
Kaiwen Wu
Allen Wang
Yaoliang Yu
AAML
22
32
0
06 Aug 2020
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
Xiaoguang Han
AAML
17
86
0
05 Aug 2020
Can Adversarial Weight Perturbations Inject Neural Backdoors?
Can Adversarial Weight Perturbations Inject Neural Backdoors?
Siddhant Garg
Adarsh Kumar
Vibhor Goel
Yingyu Liang
AAML
48
86
0
04 Aug 2020
Anti-Bandit Neural Architecture Search for Model Defense
Anti-Bandit Neural Architecture Search for Model Defense
Hanlin Chen
Baochang Zhang
Shenjun Xue
Xuan Gong
Hong Liu
Rongrong Ji
David Doermann
AAML
22
34
0
03 Aug 2020
On the Generalizability of Neural Program Models with respect to
  Semantic-Preserving Program Transformations
On the Generalizability of Neural Program Models with respect to Semantic-Preserving Program Transformations
Md Rafiqul Islam Rabin
Nghi D. Q. Bui
Ke Wang
Yijun Yu
Lingxiao Jiang
Mohammad Amin Alipour
30
90
0
31 Jul 2020
Securing CNN Model and Biometric Template using Blockchain
Securing CNN Model and Biometric Template using Blockchain
Akhil Goel
Akshay Agarwal
Mayank Vatsa
Richa Singh
Nalini Ratha
19
31
0
31 Jul 2020
Practical Detection of Trojan Neural Networks: Data-Limited and
  Data-Free Cases
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases
Ren Wang
Gaoyuan Zhang
Sijia Liu
Pin-Yu Chen
Jinjun Xiong
Meng Wang
AAML
36
148
0
31 Jul 2020
Membership Leakage in Label-Only Exposures
Membership Leakage in Label-Only Exposures
Zheng Li
Yang Zhang
34
237
0
30 Jul 2020
Stylized Adversarial Defense
Stylized Adversarial Defense
Muzammal Naseer
Salman Khan
Munawar Hayat
Fahad Shahbaz Khan
Fatih Porikli
GAN
AAML
28
16
0
29 Jul 2020
Derivation of Information-Theoretically Optimal Adversarial Attacks with
  Applications to Robust Machine Learning
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning
Jirong Yi
R. Mudumbai
Weiyu Xu
AAML
32
2
0
28 Jul 2020
From Sound Representation to Model Robustness
From Sound Representation to Model Robustness
Mohamad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
20
6
0
27 Jul 2020
RANDOM MASK: Towards Robust Convolutional Neural Networks
RANDOM MASK: Towards Robust Convolutional Neural Networks
Tiange Luo
Tianle Cai
Mengxiao Zhang
Siyu Chen
Liwei Wang
AAML
OOD
24
17
0
27 Jul 2020
Adversarial Attacks against Face Recognition: A Comprehensive Study
Adversarial Attacks against Face Recognition: A Comprehensive Study
Fatemeh Vakhshiteh
A. Nickabadi
Raghavendra Ramachandra
AAML
28
16
0
22 Jul 2020
Robust Machine Learning via Privacy/Rate-Distortion Theory
Robust Machine Learning via Privacy/Rate-Distortion Theory
Ye Wang
Shuchin Aeron
Adnan Siraj Rakin
T. Koike-Akino
P. Moulin
OOD
22
6
0
22 Jul 2020
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive
  Review
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Yansong Gao
Bao Gia Doan
Zhi-Li Zhang
Siqi Ma
Jiliang Zhang
Anmin Fu
Surya Nepal
Hyoungshick Kim
AAML
36
221
0
21 Jul 2020
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
30
12
0
21 Jul 2020
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
Yuzhen Ding
Nupur Thakur
Baoxin Li
AAML
24
3
0
20 Jul 2020
Scaling Polyhedral Neural Network Verification on GPUs
Scaling Polyhedral Neural Network Verification on GPUs
Christoph Müller
F. Serre
Gagandeep Singh
Markus Püschel
Martin Vechev
AAML
29
56
0
20 Jul 2020
Transfer Learning without Knowing: Reprogramming Black-box Machine
  Learning Models with Scarce Data and Limited Resources
Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources
Yun-Yun Tsai
Pin-Yu Chen
Tsung-Yi Ho
AAML
MLAU
BDL
18
95
0
17 Jul 2020
On Adversarial Robustness: A Neural Architecture Search perspective
On Adversarial Robustness: A Neural Architecture Search perspective
Chaitanya Devaguptapu
Devansh Agarwal
Gaurav Mittal
Pulkit Gopalani
V. Balasubramanian
OOD
AAML
17
33
0
16 Jul 2020
Training Interpretable Convolutional Neural Networks by Differentiating
  Class-specific Filters
Training Interpretable Convolutional Neural Networks by Differentiating Class-specific Filters
Haoyun Liang
Zhihao Ouyang
Yuyuan Zeng
Hang Su
Zihao He
Shutao Xia
Jun Zhu
Bo Zhang
16
47
0
16 Jul 2020
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
19
66
0
15 Jul 2020
Robustifying Reinforcement Learning Agents via Action Space Adversarial
  Training
Robustifying Reinforcement Learning Agents via Action Space Adversarial Training
Kai Liang Tan
Yasaman Esfandiari
Xian Yeow Lee
Aakanksha
Soumik Sarkar
AAML
26
55
0
14 Jul 2020
Adversarial Attacks against Neural Networks in Audio Domain: Exploiting
  Principal Components
Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Ken Alparslan
Yigit Can Alparslan
Matthew Burlick
AAML
24
8
0
14 Jul 2020
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
32
128
0
13 Jul 2020
Understanding Adversarial Examples from the Mutual Influence of Images
  and Perturbations
Understanding Adversarial Examples from the Mutual Influence of Images and Perturbations
Chaoning Zhang
Philipp Benz
Tooba Imtiaz
In-So Kweon
SSL
AAML
22
118
0
13 Jul 2020
Probabilistic Jacobian-based Saliency Maps Attacks
Probabilistic Jacobian-based Saliency Maps Attacks
Théo Combey
António Loison
Maxime Faucher
H. Hajri
AAML
23
19
0
12 Jul 2020
Boundary thickness and robustness in learning models
Boundary thickness and robustness in learning models
Yaoqing Yang
Rekha Khanna
Yaodong Yu
A. Gholami
Kurt Keutzer
Joseph E. Gonzalez
Kannan Ramchandran
Michael W. Mahoney
OOD
18
37
0
09 Jul 2020
Evaluation of Adversarial Training on Different Types of Neural Networks
  in Deep Learning-based IDSs
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs
Rana Abou-Khamis
Ashraf Matrawy
AAML
41
46
0
08 Jul 2020
URSABench: Comprehensive Benchmarking of Approximate Bayesian Inference
  Methods for Deep Neural Networks
URSABench: Comprehensive Benchmarking of Approximate Bayesian Inference Methods for Deep Neural Networks
Meet P. Vadera
Adam D. Cobb
B. Jalaeian
Benjamin M. Marlin
BDL
UQCV
27
16
0
08 Jul 2020
Previous
123...212223...323334
Next