ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,017 papers shown
Title
Neural Network Verification as Piecewise Linear Optimization:
  Formulations for the Composition of Staircase Functions
Neural Network Verification as Piecewise Linear Optimization: Formulations for the Composition of Staircase Functions
Tu Anh-Nguyen
Joey Huchette
67
2
0
27 Nov 2022
Boundary Adversarial Examples Against Adversarial Overfitting
Boundary Adversarial Examples Against Adversarial Overfitting
Muhammad Zaid Hameed
Beat Buesser
AAML
66
1
0
25 Nov 2022
SAGA: Spectral Adversarial Geometric Attack on 3D Meshes
SAGA: Spectral Adversarial Geometric Attack on 3D Meshes
Tomer Stolik
Itai Lang
S. Avidan
AAML
58
1
0
24 Nov 2022
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning
  Few-Shot Meta-Learners
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners
E. T. Oldewage
J. Bronskill
Richard Turner
68
3
0
23 Nov 2022
Improving Robust Generalization by Direct PAC-Bayesian Bound
  Minimization
Improving Robust Generalization by Direct PAC-Bayesian Bound Minimization
Zifa Wang
Nan Ding
Tomer Levinboim
Xi Chen
Radu Soricut
AAML
87
6
0
22 Nov 2022
Attacking Image Splicing Detection and Localization Algorithms Using
  Synthetic Traces
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces
Shengbang Fang
Matthew C. Stamm
AAML
114
7
0
22 Nov 2022
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models
  Against Adversarial Examples
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
Shengshan Hu
Junwei Zhang
Wen Liu
Xianqiang Lyu
Minghui Li
L. Zhang
Hai Jin
Lichao Sun
AAML3DPC
90
11
0
22 Nov 2022
SoK: Secure Human-centered Wireless Sensing
SoK: Secure Human-centered Wireless Sensing
Wei Sun
Tingjun Chen
Neil Zhenqiang Gong
77
7
0
22 Nov 2022
Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Sizhe Chen
Geng Yuan
Xinwen Cheng
Yifan Gong
Minghai Qin
Yanzhi Wang
Xiaolin Huang
AAML
79
20
0
22 Nov 2022
Understanding the Vulnerability of Skeleton-based Human Activity
  Recognition via Black-box Attack
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack
Yunfeng Diao
He Wang
Tianjia Shao
Yong-Liang Yang
Kun Zhou
David C. Hogg
Meng Wang
AAML
81
8
0
21 Nov 2022
Boosting the Transferability of Adversarial Attacks with Global Momentum
  Initialization
Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Jiafeng Wang
Zhaoyu Chen
Kaixun Jiang
Dingkang Yang
Lingyi Hong
Pinxue Guo
Yan Wang
Wenqiang Zhang
AAML
126
31
0
21 Nov 2022
DualApp: Tight Over-Approximation for Neural Network Robustness
  Verification via Under-Approximation
DualApp: Tight Over-Approximation for Neural Network Robustness Verification via Under-Approximation
Yiting Wu
Zhaodi Zhang
Zhiyi Xue
Si Liu
Hao Fei
AAML
63
0
0
21 Nov 2022
Adversarial Detection by Approximation of Ensemble Boundary
Adversarial Detection by Approximation of Ensemble Boundary
T. Windeatt
AAML
193
0
0
18 Nov 2022
Potential Auto-driving Threat: Universal Rain-removal Attack
Potential Auto-driving Threat: Universal Rain-removal Attack
Jincheng Hu
Jihao Li
Zhuoran Hou
Jingjing Jiang
Cunjia Liu
Yuanjian Zhang
AAML
64
5
0
18 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
107
20
0
17 Nov 2022
PrivacyProber: Assessment and Detection of Soft-Biometric
  Privacy-Enhancing Techniques
PrivacyProber: Assessment and Detection of Soft-Biometric Privacy-Enhancing Techniques
Peter Rot
Peter Peer
Vitomir vStruc
PICV
38
12
0
16 Nov 2022
Efficiently Finding Adversarial Examples with DNN Preprocessing
Efficiently Finding Adversarial Examples with DNN Preprocessing
Avriti Chauhan
Mohammad Afzal
Hrishikesh Karmarkar
Y. Elboher
Kumar Madhukar
Guy Katz
AAML
57
0
0
16 Nov 2022
GLFF: Global and Local Feature Fusion for AI-synthesized Image Detection
GLFF: Global and Local Feature Fusion for AI-synthesized Image Detection
Yan Ju
Shan Jia
Jia Cai
Haiying Guan
Siwei Lyu
CVBM
128
30
0
16 Nov 2022
MORA: Improving Ensemble Robustness Evaluation with Model-Reweighing
  Attack
MORA: Improving Ensemble Robustness Evaluation with Model-Reweighing Attack
Yunrui Yu
Xitong Gao
Chengzhong Xu
AAML
68
8
0
15 Nov 2022
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for
  Object Detection
Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for Object Detection
N. Doan
Arda Yüksel
Chih-Hong Cheng
AAML
63
1
0
14 Nov 2022
Privacy-Utility Balanced Voice De-Identification Using Adversarial
  Examples
Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Meng Chen
Liwang Lu
Jiadi Yu
Ying Chen
Zhongjie Ba
Feng Lin
Kui Ren
AAML
123
1
0
10 Nov 2022
Robust Smart Home Face Recognition under Starving Federated Data
Robust Smart Home Face Recognition under Starving Federated Data
Jaechul Roh
Yajun Fang
FedMLCVBMAAML
70
0
0
10 Nov 2022
Robust DNN Surrogate Models with Uncertainty Quantification via
  Adversarial Training
Robust DNN Surrogate Models with Uncertainty Quantification via Adversarial Training
Lixiang Zhang
Jia Li
AAML
89
0
0
10 Nov 2022
Accelerating Adversarial Perturbation by 50% with Semi-backward
  Propagation
Accelerating Adversarial Perturbation by 50% with Semi-backward Propagation
Zhiqi Bu
AAML
64
0
0
09 Nov 2022
Are AlphaZero-like Agents Robust to Adversarial Perturbations?
Are AlphaZero-like Agents Robust to Adversarial Perturbations?
Li-Cheng Lan
Huan Zhang
Ti-Rong Wu
Meng-Yu Tsai
I-Chen Wu
Cho-Jui Hsieh
AAML
80
11
0
07 Nov 2022
Deviations in Representations Induced by Adversarial Attacks
Deviations in Representations Induced by Adversarial Attacks
Danielle L Steinberg
P. Munro
AAML
31
0
0
07 Nov 2022
Physics-Constrained Backdoor Attacks on Power System Fault Localization
Physics-Constrained Backdoor Attacks on Power System Fault Localization
Jianing Bai
Ren Wang
Zuyi Li
AAMLAI4CE
53
5
0
07 Nov 2022
Decoding Neural Signals with Computational Models: A Systematic Review of Invasive BMI
Rezwan Firuzi
Hamed Ahmadyani
Mohammad Foad Abdi
Dana Naderi
Jahanfar Hassan
Ayub Bokani
AI4CE
103
1
0
07 Nov 2022
An Adversarial Robustness Perspective on the Topology of Neural Networks
An Adversarial Robustness Perspective on the Topology of Neural Networks
Morgane Goibert
Thomas Ricatte
Elvis Dohmatob
AAML
66
2
0
04 Nov 2022
Visually Adversarial Attacks and Defenses in the Physical World: A
  Survey
Visually Adversarial Attacks and Defenses in the Physical World: A Survey
Xingxing Wei
Bangzheng Pu
Jiefan Lu
Baoyuan Wu
AAML
148
11
0
03 Nov 2022
Defending with Errors: Approximate Computing for Robustness of Deep
  Neural Networks
Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks
Amira Guesmi
Ihsen Alouani
Khaled N. Khasawneh
M. Baklouti
T. Frikha
Mohamed Abid
Nael B. Abu-Ghazaleh
AAMLOOD
156
2
0
02 Nov 2022
Improving transferability of 3D adversarial attacks with scale and shear
  transformations
Improving transferability of 3D adversarial attacks with scale and shear transformations
Jinali Zhang
Yinpeng Dong
Junyi Zhu
Jihong Zhu
Minchi Kuang
Xiaming Yuan
3DPC
132
18
0
02 Nov 2022
Generative Poisoning Using Random Discriminators
Generative Poisoning Using Random Discriminators
Dirren van Vlijmen
A. Kolmus
Zhuoran Liu
Zhengyu Zhao
Martha Larson
68
2
0
02 Nov 2022
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker
  Verification
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker Verification
Xingqi Chen
Jie Wang
Xiaoli Zhang
Weiqiang Zhang
Kunde Yang
AAML
116
7
0
02 Nov 2022
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for
  Improving Adversarial Training
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Junhao Dong
Seyed-Mohsen Moosavi-Dezfooli
Jianhuang Lai
Xiaohua Xie
AAML
117
29
0
01 Nov 2022
Amplifying Membership Exposure via Data Poisoning
Amplifying Membership Exposure via Data Poisoning
Yufei Chen
Chao Shen
Yun Shen
Cong Wang
Yang Zhang
AAML
125
33
0
01 Nov 2022
FRSUM: Towards Faithful Abstractive Summarization via Enhancing Factual
  Robustness
FRSUM: Towards Faithful Abstractive Summarization via Enhancing Factual Robustness
Wenhao Wu
Wei Li
Jiachen Liu
Xinyan Xiao
Ziqiang Cao
Sujian Li
Hua Wu
HILM
79
11
0
01 Nov 2022
SoK: Modeling Explainability in Security Analytics for Interpretability,
  Trustworthiness, and Usability
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability
Dipkamal Bhusal
Rosalyn Shin
Ajay Ashok Shewale
M. K. Veerabhadran
Michael Clifford
Sara Rampazzi
Nidhi Rastogi
FAttAAML
92
5
0
31 Oct 2022
Scoring Black-Box Models for Adversarial Robustness
Scoring Black-Box Models for Adversarial Robustness
Jian Vora
Pranay Reddy Samala
73
0
0
31 Oct 2022
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Jiadi Yao
Xing Chen
Xiao-Lei Zhang
Weiqiang Zhang
Kunde Yang
AAML
83
9
0
30 Oct 2022
Benchmarking Adversarial Patch Against Aerial Detection
Benchmarking Adversarial Patch Against Aerial Detection
Jiawei Lian
Shaohui Mei
Shun Zhang
Mingyang Ma
AAML
99
59
0
30 Oct 2022
Recursive Reasoning in Minimax Games: A Level $k$ Gradient Play Method
Recursive Reasoning in Minimax Games: A Level kkk Gradient Play Method
Zichuan Liu
Lacra Pavel
LRM
115
3
0
29 Oct 2022
Improving Hyperspectral Adversarial Robustness Under Multiple Attacks
Improving Hyperspectral Adversarial Robustness Under Multiple Attacks
Nicholas Soucy
Salimeh Yasaei Sekeh
AAML
50
0
0
28 Oct 2022
Learning to Immunize Images for Tamper Localization and Self-Recovery
Learning to Immunize Images for Tamper Localization and Self-Recovery
Qichao Ying
Hang Zhou
Zhenxing Qian
Sheng Li
Xinpeng Zhang
AAML
94
15
0
28 Oct 2022
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion
  Attacks against Network Intrusion Detection Systems
TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems
Islam Debicha
Richard Bauwens
Thibault Debatty
Jean-Michel Dricot
Tayeb Kenaza
Wim Mees
AAML
71
46
0
27 Oct 2022
Isometric 3D Adversarial Examples in the Physical World
Isometric 3D Adversarial Examples in the Physical World
Yibo Miao
Yinpeng Dong
Junyi Zhu
Xiao-Shan Gao
104
32
0
27 Oct 2022
Improving Adversarial Robustness with Self-Paced Hard-Class Pair
  Reweighting
Improving Adversarial Robustness with Self-Paced Hard-Class Pair Reweighting
Peng-Fei Hou
Jie Han
Xingyu Li
AAMLOOD
51
11
0
26 Oct 2022
There is more than one kind of robustness: Fooling Whisper with
  adversarial examples
There is more than one kind of robustness: Fooling Whisper with adversarial examples
R. Olivier
Bhiksha Raj
AAML
97
12
0
26 Oct 2022
LP-BFGS attack: An adversarial attack based on the Hessian with limited
  pixels
LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
AAML
68
6
0
26 Oct 2022
Improving Adversarial Robustness via Joint Classification and Multiple
  Explicit Detection Classes
Improving Adversarial Robustness via Joint Classification and Multiple Explicit Detection Classes
Sina Baharlouei
Fatemeh Sheikholeslami
Meisam Razaviyayn
Zico Kolter
AAML
85
6
0
26 Oct 2022
Previous
123...252627...798081
Next