ResearchTrend.AI
  • Papers
  • Communities
  • Organizations
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,019 papers shown
Title
Understanding Adversarial Robustness Against On-manifold Adversarial
  Examples
Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
83
13
0
02 Oct 2022
DeltaBound Attack: Efficient decision-based attack in low queries regime
DeltaBound Attack: Efficient decision-based attack in low queries regime
L. Rossi
AAML
83
0
0
01 Oct 2022
On the tightness of linear relaxation based robustness certification
  methods
On the tightness of linear relaxation based robustness certification methods
Cheng Tang
AAML
94
0
0
01 Oct 2022
Improving Robustness with Adaptive Weight Decay
Improving Robustness with Adaptive Weight Decay
Amin Ghiasi
Ali Shafahi
R. Ardekani
OOD
46
8
0
30 Sep 2022
Learning Robust Kernel Ensembles with Kernel Average Pooling
Learning Robust Kernel Ensembles with Kernel Average Pooling
P. Bashivan
Adam Ibrahim
Amirozhan Dehghani
Yifei Ren
OOD
86
5
0
30 Sep 2022
Your Out-of-Distribution Detection Method is Not Robust!
Your Out-of-Distribution Detection Method is Not Robust!
Mohammad Azizmalayeri
Arshia Soltani Moakhar
Arman Zarei
Reihaneh Zohrabi
M. T. Manzuri
M. Rohban
OODD
111
17
0
30 Sep 2022
Physical Adversarial Attack meets Computer Vision: A Decade Survey
Physical Adversarial Attack meets Computer Vision: A Decade Survey
Hui Wei
Hao Tang
Xuemei Jia
Zhixiang Wang
Han-Bing Yu
Zhubo Li
Shiníchi Satoh
Luc Van Gool
Zheng Wang
AAML
152
57
0
30 Sep 2022
A Survey on Physical Adversarial Attack in Computer Vision
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang
Wen Yao
Tingsong Jiang
Guijian Tang
Xiaoqian Chen
AAML
165
39
0
28 Sep 2022
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural
  Networks
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks
Kevin Hector
Mathieu Dumont
Pierre-Alain Moëllic
J. Dutertre
AAML
65
4
0
28 Sep 2022
Exploring the Relationship between Architecture and Adversarially Robust
  Generalization
Exploring the Relationship between Architecture and Adversarially Robust Generalization
Aishan Liu
Shiyu Tang
Siyuan Liang
Ruihao Gong
Boxi Wu
Xianglong Liu
Dacheng Tao
AAML
97
19
0
28 Sep 2022
Discussion about Attacks and Defenses for Fair and Robust Recommendation
  System Design
Discussion about Attacks and Defenses for Fair and Robust Recommendation System Design
Mira Kim
Simon S. Woo
119
0
0
28 Sep 2022
Inducing Data Amplification Using Auxiliary Datasets in Adversarial
  Training
Inducing Data Amplification Using Auxiliary Datasets in Adversarial Training
Saehyung Lee
Hyungyu Lee
AAML
72
2
0
27 Sep 2022
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Zhixing Ye
Xinwen Cheng
Xiaolin Huang
AAML
112
11
0
27 Sep 2022
Employing Deep Ensemble Learning for Improving the Security of Computer
  Networks against Adversarial Attacks
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Ehsan Nowroozi
Mohammadreza Mohammadi
E. Savaş
Mauro Conti
Yassine Mekdad
AAML
81
8
0
25 Sep 2022
DARTSRepair: Core-failure-set Guided DARTS for Network Robustness to
  Common Corruptions
DARTSRepair: Core-failure-set Guided DARTS for Network Robustness to Common Corruptions
Xuhong Ren
Jianlang Chen
Felix Juefei Xu
Wanli Xue
Qing Guo
Lei Ma
Jianjun Zhao
Shengyong Chen
AAMLOOD
90
12
0
21 Sep 2022
Leveraging Local Patch Differences in Multi-Object Scenes for Generative
  Adversarial Attacks
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Abhishek Aich
Shasha Li
Chengyu Song
M. Salman Asif
S. Krishnamurthy
Amit K. Roy-Chowdhury
AAML
93
9
0
20 Sep 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Understanding Real-world Threats to Deep Learning Models in Android Apps
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
82
29
0
20 Sep 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
M. Salman Asif
Amit K. Roy-Chowdhury
AAML
112
20
0
20 Sep 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
89
3
0
19 Sep 2022
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Yulong Cao
Chaowei Xiao
Anima Anandkumar
Danfei Xu
Marco Pavone
AAML
68
66
0
19 Sep 2022
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples
  on Self-Supervised Speech Recognition models
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
R. Olivier
H. Abdullah
Bhiksha Raj
AAML
86
1
0
17 Sep 2022
Robust Ensemble Morph Detection with Domain Generalization
Robust Ensemble Morph Detection with Domain Generalization
Hossein Kashiani
S. Sami
Sobhan Soleymani
Nasser M. Nasrabadi
OODAAML
83
8
0
16 Sep 2022
Trustworthy Reinforcement Learning Against Intrinsic Vulnerabilities:
  Robustness, Safety, and Generalizability
Trustworthy Reinforcement Learning Against Intrinsic Vulnerabilities: Robustness, Safety, and Generalizability
Mengdi Xu
Zuxin Liu
Peide Huang
Wenhao Ding
Zhepeng Cen
Yue Liu
Ding Zhao
178
47
0
16 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud
  Recognition
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition
Qidong Huang
Xiaoyi Dong
DongDong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
102
13
0
16 Sep 2022
Explicit Tradeoffs between Adversarial and Natural Distributional
  Robustness
Explicit Tradeoffs between Adversarial and Natural Distributional Robustness
Mazda Moayeri
Kiarash Banihashem
Soheil Feizi
OOD
129
23
0
15 Sep 2022
Improving Robust Fairness via Balance Adversarial Training
Improving Robust Fairness via Balance Adversarial Training
Chunyu Sun
Chenye Xu
Chengyuan Yao
Siyuan Liang
Yichao Wu
Ding Liang
XiangLong Liu
Aishan Liu
54
11
0
15 Sep 2022
Sound and Complete Verification of Polynomial Networks
Sound and Complete Verification of Polynomial Networks
Elias Abad Rocamora
Mehmet Fatih Şahin
Fanghui Liu
Grigorios G. Chrysos
Volkan Cevher
61
5
0
15 Sep 2022
Weakly Supervised Invariant Representation Learning Via Disentangling
  Known and Unknown Nuisance Factors
Weakly Supervised Invariant Representation Learning Via Disentangling Known and Unknown Nuisance Factors
Jiageng Zhu
Hanchen Xie
Wael AbdAlmageed
64
1
0
15 Sep 2022
PointACL:Adversarial Contrastive Learning for Robust Point Clouds
  Representation under Adversarial Attack
PointACL:Adversarial Contrastive Learning for Robust Point Clouds Representation under Adversarial Attack
Junxuan Huang
Yatong An
Lu Cheng
Bai Chen
Junsong Yuan
Chunming Qiao
3DPC
57
1
0
14 Sep 2022
On the interplay of adversarial robustness and architecture components:
  patches, convolution and attention
On the interplay of adversarial robustness and architecture components: patches, convolution and attention
Francesco Croce
Matthias Hein
96
6
0
14 Sep 2022
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through
  Multi-Objective Attack
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective Attack
Yanyun Wang
Dehui Du
Haibo Hu
Zi Liang
Yuanhao Liu
AAMLAI4TS
110
3
0
14 Sep 2022
Resisting Deep Learning Models Against Adversarial Attack
  Transferability via Feature Randomization
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Ehsan Nowroozi
Mohammadreza Mohammadi
Pargol Golmohammadi
Yassine Mekdad
Mauro Conti
Selcuk Uluagac
AAMLSILM
82
14
0
11 Sep 2022
Scattering Model Guided Adversarial Examples for SAR Target Recognition:
  Attack and Defense
Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and Defense
Bo Peng
Bo Peng
Jie Zhou
Jianyue Xie
Li Liu
AAML
92
46
0
11 Sep 2022
Robust-by-Design Classification via Unitary-Gradient Neural Networks
Robust-by-Design Classification via Unitary-Gradient Neural Networks
Fabio Brau
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
121
5
0
09 Sep 2022
Attacking the Spike: On the Transferability and Security of Spiking
  Neural Networks to Adversarial Examples
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples
Nuo Xu
Kaleel Mahmood
Haowen Fang
Ethan Rathbun
Caiwen Ding
Wujie Wen
AAML
104
13
0
07 Sep 2022
Annealing Optimization for Progressive Learning with Stochastic
  Approximation
Annealing Optimization for Progressive Learning with Stochastic Approximation
Christos N. Mavridis
John S. Baras
86
10
0
06 Sep 2022
Instance Attack:An Explanation-based Vulnerability Analysis Framework
  Against DNNs for Malware Detection
Instance Attack:An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection
Ruijin Sun
Shize Guo
Jinhong Guo
Changyou Xing
Luming Yang
Xi Guo
Zhisong Pan
AAML
137
1
0
06 Sep 2022
Adversarial Detection: Attacking Object Detection in Real Time
Adversarial Detection: Attacking Object Detection in Real Time
Han-Ching Wu
Syed Yunas
Sareh Rowlands
Wenjie Ruan
Johan Wahlstrom
AAML
94
5
0
05 Sep 2022
Revisiting Outer Optimization in Adversarial Training
Revisiting Outer Optimization in Adversarial Training
Ali Dabouei
Fariborz Taherkhani
Sobhan Soleymani
Nasser M. Nasrabadi
AAML
90
4
0
02 Sep 2022
Adversarial Color Film: Effective Physical-World Attack to DNNs
Adversarial Color Film: Effective Physical-World Attack to DNNs
Chen-Hao Hu
Weiwen Shi
AAML
196
14
0
02 Sep 2022
Formalising the Robustness of Counterfactual Explanations for Neural
  Networks
Formalising the Robustness of Counterfactual Explanations for Neural Networks
Junqi Jiang
Francesco Leofante
Antonio Rago
Francesca Toni
AAML
93
27
0
31 Aug 2022
Be Your Own Neighborhood: Detecting Adversarial Example by the
  Neighborhood Relations Built on Self-Supervised Learning
Be Your Own Neighborhood: Detecting Adversarial Example by the Neighborhood Relations Built on Self-Supervised Learning
Zhiyuan He
Yijun Yang
Pin-Yu Chen
Qiang Xu
Tsung-Yi Ho
AAML
73
9
0
31 Aug 2022
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters
  Substitution
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
52
0
0
31 Aug 2022
Constraining Representations Yields Models That Know What They Don't
  Know
Constraining Representations Yields Models That Know What They Don't Know
João Monteiro
Pau Rodríguez López
Pierre-Andre Noel
I. Laradji
David Vazquez
AAML
122
0
0
30 Aug 2022
A Black-Box Attack on Optical Character Recognition Systems
A Black-Box Attack on Optical Character Recognition Systems
Samet Bayram
Kenneth Barner
AAML
128
6
0
30 Aug 2022
Towards Adversarial Purification using Denoising AutoEncoders
Towards Adversarial Purification using Denoising AutoEncoders
Dvij Kalaria
Aritra Hazra
P. Chakrabarti
DiffM
58
5
0
29 Aug 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models
  with Transferred Evolutionary Strategies
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
65
1
0
28 Aug 2022
SA: Sliding attack for synthetic speech detection with resistance to clipping and self-splicing
JiaCheng Deng
Dong Li
Yan Diqun
Rangding Wang
Zeng Jiaming
AAML
67
0
0
27 Aug 2022
Adversarial Robustness for Tabular Data through Cost and Utility
  Awareness
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
97
18
0
27 Aug 2022
Multi-Scale Architectures Matter: On the Adversarial Robustness of
  Flow-based Lossless Compression
Multi-Scale Architectures Matter: On the Adversarial Robustness of Flow-based Lossless Compression
Yitong Xia
Bin Chen
Yan Feng
Tian-shuo Ge
AI4CE
59
0
0
26 Aug 2022
Previous
123...272829...798081
Next