Papers
Communities
Organizations
Events
Blog
Pricing
Search
Open menu
Home
Papers
1608.04644
Cited By
v1
v2 (latest)
Towards Evaluating the Robustness of Neural Networks
16 August 2016
Nicholas Carlini
D. Wagner
OOD
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Towards Evaluating the Robustness of Neural Networks"
50 / 4,019 papers shown
Title
Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
83
13
0
02 Oct 2022
DeltaBound Attack: Efficient decision-based attack in low queries regime
L. Rossi
AAML
83
0
0
01 Oct 2022
On the tightness of linear relaxation based robustness certification methods
Cheng Tang
AAML
94
0
0
01 Oct 2022
Improving Robustness with Adaptive Weight Decay
Amin Ghiasi
Ali Shafahi
R. Ardekani
OOD
46
8
0
30 Sep 2022
Learning Robust Kernel Ensembles with Kernel Average Pooling
P. Bashivan
Adam Ibrahim
Amirozhan Dehghani
Yifei Ren
OOD
86
5
0
30 Sep 2022
Your Out-of-Distribution Detection Method is Not Robust!
Mohammad Azizmalayeri
Arshia Soltani Moakhar
Arman Zarei
Reihaneh Zohrabi
M. T. Manzuri
M. Rohban
OODD
111
17
0
30 Sep 2022
Physical Adversarial Attack meets Computer Vision: A Decade Survey
Hui Wei
Hao Tang
Xuemei Jia
Zhixiang Wang
Han-Bing Yu
Zhubo Li
Shiníchi Satoh
Luc Van Gool
Zheng Wang
AAML
152
57
0
30 Sep 2022
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang
Wen Yao
Tingsong Jiang
Guijian Tang
Xiaoqian Chen
AAML
165
39
0
28 Sep 2022
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks
Kevin Hector
Mathieu Dumont
Pierre-Alain Moëllic
J. Dutertre
AAML
65
4
0
28 Sep 2022
Exploring the Relationship between Architecture and Adversarially Robust Generalization
Aishan Liu
Shiyu Tang
Siyuan Liang
Ruihao Gong
Boxi Wu
Xianglong Liu
Dacheng Tao
AAML
97
19
0
28 Sep 2022
Discussion about Attacks and Defenses for Fair and Robust Recommendation System Design
Mira Kim
Simon S. Woo
119
0
0
28 Sep 2022
Inducing Data Amplification Using Auxiliary Datasets in Adversarial Training
Saehyung Lee
Hyungyu Lee
AAML
72
2
0
27 Sep 2022
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Zhixing Ye
Xinwen Cheng
Xiaolin Huang
AAML
112
11
0
27 Sep 2022
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Ehsan Nowroozi
Mohammadreza Mohammadi
E. Savaş
Mauro Conti
Yassine Mekdad
AAML
81
8
0
25 Sep 2022
DARTSRepair: Core-failure-set Guided DARTS for Network Robustness to Common Corruptions
Xuhong Ren
Jianlang Chen
Felix Juefei Xu
Wanli Xue
Qing Guo
Lei Ma
Jianjun Zhao
Shengyong Chen
AAML
OOD
90
12
0
21 Sep 2022
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Abhishek Aich
Shasha Li
Chengyu Song
M. Salman Asif
S. Krishnamurthy
Amit K. Roy-Chowdhury
AAML
93
9
0
20 Sep 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
82
29
0
20 Sep 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
M. Salman Asif
Amit K. Roy-Chowdhury
AAML
112
20
0
20 Sep 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
89
3
0
19 Sep 2022
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Yulong Cao
Chaowei Xiao
Anima Anandkumar
Danfei Xu
Marco Pavone
AAML
68
66
0
19 Sep 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
86
1
0
17 Sep 2022
Robust Ensemble Morph Detection with Domain Generalization
Hossein Kashiani
S. Sami
Sobhan Soleymani
Nasser M. Nasrabadi
OOD
AAML
83
8
0
16 Sep 2022
Trustworthy Reinforcement Learning Against Intrinsic Vulnerabilities: Robustness, Safety, and Generalizability
Mengdi Xu
Zuxin Liu
Peide Huang
Wenhao Ding
Zhepeng Cen
Yue Liu
Ding Zhao
178
47
0
16 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition
Qidong Huang
Xiaoyi Dong
DongDong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
102
13
0
16 Sep 2022
Explicit Tradeoffs between Adversarial and Natural Distributional Robustness
Mazda Moayeri
Kiarash Banihashem
Soheil Feizi
OOD
129
23
0
15 Sep 2022
Improving Robust Fairness via Balance Adversarial Training
Chunyu Sun
Chenye Xu
Chengyuan Yao
Siyuan Liang
Yichao Wu
Ding Liang
XiangLong Liu
Aishan Liu
54
11
0
15 Sep 2022
Sound and Complete Verification of Polynomial Networks
Elias Abad Rocamora
Mehmet Fatih Şahin
Fanghui Liu
Grigorios G. Chrysos
Volkan Cevher
61
5
0
15 Sep 2022
Weakly Supervised Invariant Representation Learning Via Disentangling Known and Unknown Nuisance Factors
Jiageng Zhu
Hanchen Xie
Wael AbdAlmageed
64
1
0
15 Sep 2022
PointACL:Adversarial Contrastive Learning for Robust Point Clouds Representation under Adversarial Attack
Junxuan Huang
Yatong An
Lu Cheng
Bai Chen
Junsong Yuan
Chunming Qiao
3DPC
57
1
0
14 Sep 2022
On the interplay of adversarial robustness and architecture components: patches, convolution and attention
Francesco Croce
Matthias Hein
96
6
0
14 Sep 2022
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective Attack
Yanyun Wang
Dehui Du
Haibo Hu
Zi Liang
Yuanhao Liu
AAML
AI4TS
110
3
0
14 Sep 2022
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Ehsan Nowroozi
Mohammadreza Mohammadi
Pargol Golmohammadi
Yassine Mekdad
Mauro Conti
Selcuk Uluagac
AAML
SILM
82
14
0
11 Sep 2022
Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and Defense
Bo Peng
Bo Peng
Jie Zhou
Jianyue Xie
Li Liu
AAML
92
46
0
11 Sep 2022
Robust-by-Design Classification via Unitary-Gradient Neural Networks
Fabio Brau
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
121
5
0
09 Sep 2022
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples
Nuo Xu
Kaleel Mahmood
Haowen Fang
Ethan Rathbun
Caiwen Ding
Wujie Wen
AAML
104
13
0
07 Sep 2022
Annealing Optimization for Progressive Learning with Stochastic Approximation
Christos N. Mavridis
John S. Baras
86
10
0
06 Sep 2022
Instance Attack:An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection
Ruijin Sun
Shize Guo
Jinhong Guo
Changyou Xing
Luming Yang
Xi Guo
Zhisong Pan
AAML
137
1
0
06 Sep 2022
Adversarial Detection: Attacking Object Detection in Real Time
Han-Ching Wu
Syed Yunas
Sareh Rowlands
Wenjie Ruan
Johan Wahlstrom
AAML
94
5
0
05 Sep 2022
Revisiting Outer Optimization in Adversarial Training
Ali Dabouei
Fariborz Taherkhani
Sobhan Soleymani
Nasser M. Nasrabadi
AAML
90
4
0
02 Sep 2022
Adversarial Color Film: Effective Physical-World Attack to DNNs
Chen-Hao Hu
Weiwen Shi
AAML
196
14
0
02 Sep 2022
Formalising the Robustness of Counterfactual Explanations for Neural Networks
Junqi Jiang
Francesco Leofante
Antonio Rago
Francesca Toni
AAML
93
27
0
31 Aug 2022
Be Your Own Neighborhood: Detecting Adversarial Example by the Neighborhood Relations Built on Self-Supervised Learning
Zhiyuan He
Yijun Yang
Pin-Yu Chen
Qiang Xu
Tsung-Yi Ho
AAML
73
9
0
31 Aug 2022
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
52
0
0
31 Aug 2022
Constraining Representations Yields Models That Know What They Don't Know
João Monteiro
Pau Rodríguez López
Pierre-Andre Noel
I. Laradji
David Vazquez
AAML
122
0
0
30 Aug 2022
A Black-Box Attack on Optical Character Recognition Systems
Samet Bayram
Kenneth Barner
AAML
128
6
0
30 Aug 2022
Towards Adversarial Purification using Denoising AutoEncoders
Dvij Kalaria
Aritra Hazra
P. Chakrabarti
DiffM
58
5
0
29 Aug 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
65
1
0
28 Aug 2022
SA: Sliding attack for synthetic speech detection with resistance to clipping and self-splicing
JiaCheng Deng
Dong Li
Yan Diqun
Rangding Wang
Zeng Jiaming
AAML
67
0
0
27 Aug 2022
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
97
18
0
27 Aug 2022
Multi-Scale Architectures Matter: On the Adversarial Robustness of Flow-based Lossless Compression
Yitong Xia
Bin Chen
Yan Feng
Tian-shuo Ge
AI4CE
59
0
0
26 Aug 2022
Previous
1
2
3
...
27
28
29
...
79
80
81
Next