ResearchTrend.AI
  • Papers
  • Communities
  • Organizations
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,019 papers shown
Title
Robust Prototypical Few-Shot Organ Segmentation with Regularized
  Neural-ODEs
Robust Prototypical Few-Shot Organ Segmentation with Regularized Neural-ODEs
Prashant Pandey
Mustafa Chasmai
Tanuj Sur
Brejesh Lall
126
11
0
26 Aug 2022
Semantic Preserving Adversarial Attack Generation with Autoencoder and
  Genetic Algorithm
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm
Xinyi Wang
S. Y. Enoch
Dan Dongseong Kim
AAML
41
2
0
25 Aug 2022
A Perturbation Resistant Transformation and Classification System for
  Deep Neural Networks
A Perturbation Resistant Transformation and Classification System for Deep Neural Networks
Nathaniel R. Dean
D. Sarkar
AAML
27
0
0
25 Aug 2022
Black-box Attacks Against Neural Binary Function Detection
Black-box Attacks Against Neural Binary Function Detection
Josh Bundt
Michael Davinroy
Ioannis Agadakos
Alina Oprea
William K. Robertson
AAML
62
1
0
24 Aug 2022
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Dongbin Na
Sangwoo Ji
Jong Kim
AAML
82
17
0
24 Aug 2022
Towards an Awareness of Time Series Anomaly Detection Models'
  Adversarial Vulnerability
Towards an Awareness of Time Series Anomaly Detection Models' Adversarial Vulnerability
Shahroz Tariq
B. Le
Simon S. Woo
AAMLAI4TS
57
4
0
24 Aug 2022
Auditing Membership Leakages of Multi-Exit Networks
Auditing Membership Leakages of Multi-Exit Networks
Zheng Li
Yiyong Liu
Xinlei He
Ning Yu
Michael Backes
Yang Zhang
AAML
73
34
0
23 Aug 2022
Transferability Ranking of Adversarial Examples
Transferability Ranking of Adversarial Examples
Mosh Levy
Guy Amit
Yuval Elovici
Yisroel Mirsky
AAML
129
0
0
23 Aug 2022
Adversarial Vulnerability of Temporal Feature Networks for Object
  Detection
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Svetlana Pavlitskaya
Nikolai Polley
Michael Weber
J. Marius Zöllner
AAML
71
3
0
23 Aug 2022
Hierarchical Perceptual Noise Injection for Social Media Fingerprint
  Privacy Protection
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Simin Li
Huangxinxin Xu
Jiakai Wang
Aishan Liu
Fazhi He
Xianglong Liu
Dacheng Tao
AAML
76
6
0
23 Aug 2022
Reversing Skin Cancer Adversarial Examples by Multiscale Diffusive and
  Denoising Aggregation Mechanism
Reversing Skin Cancer Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism
Yongwei Wang
Yuanpei Li
Zhiqi Shen
Yuhui Qiao
DiffMMedIm
89
5
0
22 Aug 2022
Byzantines can also Learn from History: Fall of Centered Clipping in
  Federated Learning
Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning
Kerem Ozfatura
Emre Ozfatura
Alptekin Kupcu
Deniz Gunduz
AAMLFedML
127
17
0
21 Aug 2022
Provably Tightest Linear Approximation for Robustness Verification of
  Sigmoid-like Neural Networks
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks
Zhaodi Zhang
Yiting Wu
Siwen Liu
Jing Liu
Min Zhang
AAML
57
11
0
21 Aug 2022
PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D
  Point Cloud Recognition
PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition
Jiachen Sun
Weili Nie
Zhiding Yu
Z. Morley Mao
Chaowei Xiao
DiffM
75
25
0
21 Aug 2022
Exploring Adversarial Robustness of Vision Transformers in the Spectral
  Perspective
Exploring Adversarial Robustness of Vision Transformers in the Spectral Perspective
Gihyun Kim
Juyeop Kim
Jong-Seok Lee
AAMLViT
54
6
0
20 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for
  Image Classifier Models
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
70
17
0
19 Aug 2022
Discovering Bugs in Vision Models using Off-the-shelf Image Generation
  and Captioning
Discovering Bugs in Vision Models using Off-the-shelf Image Generation and Captioning
Olivia Wiles
Isabela Albuquerque
Sven Gowal
VLM
72
47
0
18 Aug 2022
Resisting Adversarial Attacks in Deep Neural Networks using Diverse
  Decision Boundaries
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Manaar Alam
Shubhajit Datta
Debdeep Mukhopadhyay
Arijit Mondal
P. Chakrabarti
AAML
40
5
0
18 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
95
2
0
18 Aug 2022
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for
  Generating Adversarial Instances in Deep Networks
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for Generating Adversarial Instances in Deep Networks
Raz Lapid
Zvika Haramaty
Moshe Sipper
AAMLMLAU
73
12
0
17 Aug 2022
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Dong Huang
Qi Bu
Yuhao Qing
Haowen Pi
Sen Wang
Heming Cui
OODAAML
60
0
0
17 Aug 2022
An Efficient Multi-Step Framework for Malware Packing Identification
An Efficient Multi-Step Framework for Malware Packing Identification
Jong-Wouk Kim
Yang-Sae Moon
Mi-Jung Choi
25
0
0
17 Aug 2022
An Overview and Prospective Outlook on Robust Training and Certification
  of Machine Learning Models
An Overview and Prospective Outlook on Robust Training and Certification of Machine Learning Models
Brendon G. Anderson
Tanmay Gautam
Somayeh Sojoudi
OOD
57
2
0
15 Aug 2022
A Human-in-the-Middle Attack against Object Detection Systems
A Human-in-the-Middle Attack against Object Detection Systems
Han-Ching Wu
Sareh Rowlands
Johan Wahlstrom
AAML
81
0
0
15 Aug 2022
A Multi-objective Memetic Algorithm for Auto Adversarial Attack
  Optimization Design
A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Jialiang Sun
Wen Yao
Tingsong Jiang
Xiaoqian Chen
AAML
62
0
0
15 Aug 2022
Unifying Gradients to Improve Real-world Robustness for Deep Networks
Unifying Gradients to Improve Real-world Robustness for Deep Networks
Yingwen Wu
Sizhe Chen
Kun Fang
Xiaolin Huang
AAML
88
3
0
12 Aug 2022
Scale-free and Task-agnostic Attack: Generating Photo-realistic
  Adversarial Patterns with Patch Quilting Generator
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator
Xiang Gao
Cheng Luo
Qinliang Lin
Weicheng Xie
Minmin Liu
Linlin Shen
Keerthy Kusumam
Siyang Song
52
5
0
12 Aug 2022
Defensive Distillation based Adversarial Attacks Mitigation Method for
  Channel Estimation using Deep Learning Models in Next-Generation Wireless
  Networks
Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Ferhat Ozgur Catak
Murat Kuzlu
Evren Çatak
Umit Cali
Ozgur Guler
AAML
61
26
0
12 Aug 2022
On deceiving malware classification with section injection
On deceiving malware classification with section injection
Adeilson Antonio da Silva
Maurício Pamplona Segundo
110
4
0
12 Aug 2022
A Sublinear Adversarial Training Algorithm
A Sublinear Adversarial Training Algorithm
Yeqi Gao
Lianke Qin
Zhao Song
Yitan Wang
GAN
77
25
0
10 Aug 2022
Optimistic Optimisation of Composite Objective with Exponentiated Update
Optimistic Optimisation of Composite Objective with Exponentiated Update
Weijia Shao
F. Sivrikaya
S. Albayrak
123
3
0
08 Aug 2022
Abutting Grating Illusion: Cognitive Challenge to Neural Network Models
Abutting Grating Illusion: Cognitive Challenge to Neural Network Models
Jinyu Fan
Yi Zeng
AAML
68
1
0
08 Aug 2022
Federated Adversarial Learning: A Framework with Convergence Analysis
Federated Adversarial Learning: A Framework with Convergence Analysis
Xiaoxiao Li
Zhao Song
Jiaming Yang
FedML
92
21
0
07 Aug 2022
Blackbox Attacks via Surrogate Ensemble Search
Blackbox Attacks via Surrogate Ensemble Search
Zikui Cai
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
108
21
0
07 Aug 2022
FBI: Fingerprinting models with Benign Inputs
FBI: Fingerprinting models with Benign Inputs
Thibault Maho
Teddy Furon
Erwan Le Merrer
AAML
76
4
0
05 Aug 2022
Self-Ensembling Vision Transformer (SEViT) for Robust Medical Image
  Classification
Self-Ensembling Vision Transformer (SEViT) for Robust Medical Image Classification
Faris Almalik
Mohammad Yaqub
Karthik Nandakumar
ViTAAMLMedIm
107
34
0
04 Aug 2022
A New Kind of Adversarial Example
A New Kind of Adversarial Example
Ali Borji
AAML
122
1
0
04 Aug 2022
Design of secure and robust cognitive system for malware detection
Design of secure and robust cognitive system for malware detection
Sanket Shukla
AAML
58
2
0
03 Aug 2022
Adversarial Camouflage for Node Injection Attack on Graphs
Adversarial Camouflage for Node Injection Attack on Graphs
Shuchang Tao
Qi Cao
Huawei Shen
Yunfan Wu
Liang Hou
Fei Sun
Xueqi Cheng
AAMLGNN
103
24
0
03 Aug 2022
Is current research on adversarial robustness addressing the right
  problem?
Is current research on adversarial robustness addressing the right problem?
Ali Borji
OODAAML
63
1
0
31 Jul 2022
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against
  Adversarial Machine Learning
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning
Mohammad Hossein Samavatian
Saikat Majumdar
Kristin Barber
R. Teodorescu
AAML
90
2
0
31 Jul 2022
Robust Trajectory Prediction against Adversarial Attacks
Robust Trajectory Prediction against Adversarial Attacks
Yulong Cao
Danfei Xu
Xinshuo Weng
Zhuoqing Mao
Anima Anandkumar
Chaowei Xiao
Marco Pavone
AAML
74
30
0
29 Jul 2022
Point Cloud Attacks in Graph Spectral Domain: When 3D Geometry Meets
  Graph Signal Processing
Point Cloud Attacks in Graph Spectral Domain: When 3D Geometry Meets Graph Signal Processing
Daizong Liu
Wei Hu
Xin Li
AAML3DPC
101
16
0
27 Jul 2022
Perception-Aware Attack: Creating Adversarial Music via
  Reverse-Engineering Human Perception
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Rui Duan
Zhe Qu
Shangqing Zhao
Leah Ding
Yao-Hong Liu
Zhuo Lu
AAML
61
6
0
26 Jul 2022
SegPGD: An Effective and Efficient Adversarial Attack for Evaluating and
  Boosting Segmentation Robustness
SegPGD: An Effective and Efficient Adversarial Attack for Evaluating and Boosting Segmentation Robustness
Jindong Gu
Hengshuang Zhao
Volker Tresp
Philip Torr
AAML
122
78
0
25 Jul 2022
Improving Adversarial Robustness via Mutual Information Estimation
Improving Adversarial Robustness via Mutual Information Estimation
Dawei Zhou
Nannan Wang
Xinbo Gao
Bo Han
Xiaoyu Wang
Yibing Zhan
Tongliang Liu
AAML
57
16
0
25 Jul 2022
Jigsaw-ViT: Learning Jigsaw Puzzles in Vision Transformer
Jigsaw-ViT: Learning Jigsaw Puzzles in Vision Transformer
Yingyi Chen
Xiaoke Shen
Yahui Liu
Qinghua Tao
Johan A. K. Suykens
AAMLViT
85
24
0
25 Jul 2022
Can we achieve robustness from data alone?
Can we achieve robustness from data alone?
Nikolaos Tsilivis
Jingtong Su
Julia Kempe
OODDD
113
18
0
24 Jul 2022
Do Perceptually Aligned Gradients Imply Adversarial Robustness?
Do Perceptually Aligned Gradients Imply Adversarial Robustness?
Roy Ganz
Bahjat Kawar
Michael Elad
AAML
76
10
0
22 Jul 2022
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Tong Wu
Tianhao Wang
Vikash Sehwag
Saeed Mahloujifar
Prateek Mittal
AAML
98
39
0
22 Jul 2022
Previous
123...282930...798081
Next