ResearchTrend.AI
  • Papers
  • Communities
  • Organizations
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,019 papers shown
Title
Synthetic Dataset Generation for Adversarial Machine Learning Research
Synthetic Dataset Generation for Adversarial Machine Learning Research
Xiruo Liu
Shibani Singh
Cory Cornelius
Colin Busho
Mike Tan
Anindya Paul
Jason Martin
AAML
83
2
0
21 Jul 2022
Towards Efficient Adversarial Training on Vision Transformers
Towards Efficient Adversarial Training on Vision Transformers
Boxi Wu
Jindong Gu
Zhifeng Li
Deng Cai
Xiaofei He
Wei Liu
ViTAAML
115
40
0
21 Jul 2022
Rethinking Textual Adversarial Defense for Pre-trained Language Models
Rethinking Textual Adversarial Defense for Pre-trained Language Models
Jiayi Wang
Rongzhou Bao
Zhuosheng Zhang
Hai Zhao
AAMLSILM
63
11
0
21 Jul 2022
AugRmixAT: A Data Processing and Training Method for Improving Multiple
  Robustness and Generalization Performance
AugRmixAT: A Data Processing and Training Method for Improving Multiple Robustness and Generalization Performance
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAML
60
1
0
21 Jul 2022
One-vs-the-Rest Loss to Focus on Important Samples in Adversarial
  Training
One-vs-the-Rest Loss to Focus on Important Samples in Adversarial Training
Sekitoshi Kanai
Shin'ya Yamaguchi
Masanori Yamada
Hiroshi Takahashi
Kentaro Ohno
Yasutoshi Ida
AAML
87
9
0
21 Jul 2022
Prior-Guided Adversarial Initialization for Fast Adversarial Training
Prior-Guided Adversarial Initialization for Fast Adversarial Training
Xiaojun Jia
Yong Zhang
Xingxing Wei
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
76
40
0
18 Jul 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable
  Perturbations
Adversarial Pixel Restoration as a Pretext Task for Transferable Perturbations
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
Fahad Shahbaz Khan
AAML
65
8
0
18 Jul 2022
Rank-based Decomposable Losses in Machine Learning: A Survey
Rank-based Decomposable Losses in Machine Learning: A Survey
Shu Hu
Xin Wang
Siwei Lyu
102
32
0
18 Jul 2022
A Certifiable Security Patch for Object Tracking in Self-Driving Systems
  via Historical Deviation Modeling
A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling
Xudong Pan
Qifan Xiao
Mi Zhang
Min Yang
AAML
78
1
0
18 Jul 2022
Adversarial Contrastive Learning via Asymmetric InfoNCE
Adversarial Contrastive Learning via Asymmetric InfoNCE
Qiying Yu
Jieming Lou
Xianyuan Zhan
Qizhang Li
W. Zuo
Yang Liu
Jingjing Liu
AAML
79
23
0
18 Jul 2022
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
Xinwei Liu
Jian Liu
Yang Bai
Jindong Gu
Tao Chen
Xiaojun Jia
Xiaochun Cao
AAMLWIGM
73
28
0
17 Jul 2022
Achieve Optimal Adversarial Accuracy for Adversarial Deep Learning using
  Stackelberg Game
Achieve Optimal Adversarial Accuracy for Adversarial Deep Learning using Stackelberg Game
Xiao-Shan Gao
Shuang Liu
Lijia Yu
AAML
78
0
0
17 Jul 2022
Threat Model-Agnostic Adversarial Defense using Diffusion Models
Threat Model-Agnostic Adversarial Defense using Diffusion Models
Tsachi Blau
Roy Ganz
Bahjat Kawar
Alex M. Bronstein
Michael Elad
AAMLDiffM
98
27
0
17 Jul 2022
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial
  Training
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training
Xiaoyu Liang
Yaguan Qian
Jianchang Huang
Xiang Ling
Bin Wang
Chunming Wu
Wassim Swaileh
AAML
45
4
0
16 Jul 2022
3DVerifier: Efficient Robustness Verification for 3D Point Cloud Models
3DVerifier: Efficient Robustness Verification for 3D Point Cloud Models
Ronghui Mu
Wenjie Ruan
Leandro Soriano Marcolino
Q. Ni
3DPC
95
10
0
15 Jul 2022
Improving Task-free Continual Learning by Distributionally Robust Memory
  Evolution
Improving Task-free Continual Learning by Distributionally Robust Memory Evolution
Zhenyi Wang
Li Shen
Le Fang
Qiuling Suo
Tiehang Duan
Mingchen Gao
OOD
98
43
0
15 Jul 2022
Adversarially-Aware Robust Object Detector
Adversarially-Aware Robust Object Detector
Ziyi Dong
Pengxu Wei
Liang Lin
AAMLObjD
96
30
0
13 Jul 2022
Interactive Machine Learning: A State of the Art Review
Interactive Machine Learning: A State of the Art Review
Natnael A. Wondimu
Cédric Buche
U. Visser
VLMHAI
102
10
0
13 Jul 2022
On the Robustness of Bayesian Neural Networks to Adversarial Attacks
On the Robustness of Bayesian Neural Networks to Adversarial Attacks
Luca Bortolussi
Ginevra Carbone
Luca Laurenti
A. Patané
G. Sanguinetti
Matthew Wicker
AAML
54
13
0
13 Jul 2022
Perturbation Inactivation Based Adversarial Defense for Face Recognition
Perturbation Inactivation Based Adversarial Defense for Face Recognition
Min Ren
Yuhao Zhu
Yunlong Wang
Zhenan Sun
AAML
63
14
0
13 Jul 2022
Exploring Adversarial Examples and Adversarial Robustness of
  Convolutional Neural Networks by Mutual Information
Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
GANAAML
74
0
0
12 Jul 2022
Adversarial Robustness Assessment of NeuroEvolution Approaches
Adversarial Robustness Assessment of NeuroEvolution Approaches
Inês Valentim
Nuno Lourenço
Nuno Antunes
AAML
74
1
0
12 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
126
167
0
12 Jul 2022
Certified Adversarial Robustness via Anisotropic Randomized Smoothing
Certified Adversarial Robustness via Anisotropic Randomized Smoothing
Hanbin Hong
Yuan Hong
AAML
91
5
0
12 Jul 2022
Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust
  Deep Neural Architectures
Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust Deep Neural Architectures
Jia-Wei Liu
Ran Cheng
Yaochu Jin
AAML
114
8
0
12 Jul 2022
Susceptibility of Continual Learning Against Adversarial Attacks
Susceptibility of Continual Learning Against Adversarial Attacks
Hikmat Khan
Pir Masoom Shah
Syed Farhan Alam Zaidi
S. M. Fakhrul Islam
Qasim Zia
AAML
99
9
0
11 Jul 2022
RUSH: Robust Contrastive Learning via Randomized Smoothing
Yijiang Pang
Boyang Liu
Jiayu Zhou
OODAAML
72
1
0
11 Jul 2022
How Robust is your Fair Model? Exploring the Robustness of Diverse
  Fairness Strategies
How Robust is your Fair Model? Exploring the Robustness of Diverse Fairness Strategies
E. Small
Wei Shao
Zeliang Zhang
Peihan Liu
Jeffrey Chan
Kacper Sokol
Flora D. Salim
144
2
0
11 Jul 2022
Dynamic Time Warping based Adversarial Framework for Time-Series Domain
Dynamic Time Warping based Adversarial Framework for Time-Series Domain
Taha Belkhouja
Yan Yan
J. Doppa
AAMLAI4TS
82
26
0
09 Jul 2022
Adversarial Framework with Certified Robustness for Time-Series Domain
  via Statistical Features
Adversarial Framework with Certified Robustness for Time-Series Domain via Statistical Features
Taha Belkhouja
J. Doppa
AAMLAI4TS
66
12
0
09 Jul 2022
Training Robust Deep Models for Time-Series Domain: Novel Algorithms and
  Theoretical Analysis
Training Robust Deep Models for Time-Series Domain: Novel Algorithms and Theoretical Analysis
Taha Belkhouja
Yan Yan
J. Doppa
OODAI4TS
77
9
0
09 Jul 2022
On the Robustness and Anomaly Detection of Sparse Neural Networks
On the Robustness and Anomaly Detection of Sparse Neural Networks
Morgane Ayle
Bertrand Charpentier
John Rachwan
Daniel Zügner
Simon Geisler
Stephan Günnemann
AAML
91
3
0
09 Jul 2022
Jacobian Norm with Selective Input Gradient Regularization for Improved
  and Interpretable Adversarial Defense
Jacobian Norm with Selective Input Gradient Regularization for Improved and Interpretable Adversarial Defense
Deyin Liu
Lin Wu
Haifeng Zhao
F. Boussaïd
Bennamoun
Xianghua Xie
AAML
75
3
0
09 Jul 2022
How many perturbations break this model? Evaluating robustness beyond
  adversarial accuracy
How many perturbations break this model? Evaluating robustness beyond adversarial accuracy
R. Olivier
Bhiksha Raj
AAML
86
5
0
08 Jul 2022
Guiding the retraining of convolutional neural networks against
  adversarial inputs
Guiding the retraining of convolutional neural networks against adversarial inputs
Francisco Durán
Silverio Martínez-Fernández
Michael Felderer
Xavier Franch
AAML
121
1
0
08 Jul 2022
UniCR: Universally Approximated Certified Robustness via Randomized
  Smoothing
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing
Hanbin Hong
Binghui Wang
Yuan Hong
AAML
85
11
0
05 Jul 2022
Learning to Accelerate Approximate Methods for Solving Integer
  Programming via Early Fixing
Learning to Accelerate Approximate Methods for Solving Integer Programming via Early Fixing
Longkang Li
Baoyuan Wu
84
3
0
05 Jul 2022
Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling
Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling
Daniel Wang
Jiayu Lin
Yuansheng Wang
AAML
60
6
0
05 Jul 2022
Vector Quantisation for Robust Segmentation
Vector Quantisation for Robust Segmentation
Ainkaran Santhirasekaram
Avinash Kori
Mathias Winkler
A. Rockall
Ben Glocker
OOD
82
9
0
05 Jul 2022
PatchZero: Defending against Adversarial Patch Attacks by Detecting and
  Zeroing the Patch
PatchZero: Defending against Adversarial Patch Attacks by Detecting and Zeroing the Patch
Ke Xu
Yao Xiao
Zhao-Heng Zheng
Kaijie Cai
Ramkant Nevatia
AAML
117
32
0
05 Jul 2022
Machine Learning in Access Control: A Taxonomy and Survey
Machine Learning in Access Control: A Taxonomy and Survey
M. N. Nobi
Maanak Gupta
Lopamudra Praharaj
Mahmoud Abdelsalam
R. Krishnan
Ravi Sandhu
OOD
39
6
0
04 Jul 2022
Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Yaguan Qian
Yu-qun Wang
Bin Wang
Zhaoquan Gu
Yu-Shuang Guo
Wassim Swaileh
AAML
108
3
0
04 Jul 2022
Removing Batch Normalization Boosts Adversarial Training
Removing Batch Normalization Boosts Adversarial Training
Haotao Wang
Aston Zhang
Shuai Zheng
Xingjian Shi
Mu Li
Zhangyang Wang
107
42
0
04 Jul 2022
Abstraction and Refinement: Towards Scalable and Exact Verification of
  Neural Networks
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks
Jiaxiang Liu
Yunhan Xing
Xiaomu Shi
Fu Song
Zhiwu Xu
Zhong Ming
68
11
0
02 Jul 2022
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean
  Label
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
118
46
0
01 Jul 2022
MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples
  Detectors
MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples Detectors
Federica Granese
Marine Picot
Marco Romanelli
Francisco Messina
Pablo Piantanida
AAML
89
3
0
30 Jun 2022
Detecting and Recovering Adversarial Examples from Extracting Non-robust
  and Highly Predictive Adversarial Perturbations
Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Mingyu Dong
Jiahao Chen
Diqun Yan
Jingxing Gao
Li Dong
Rangding Wang
AAML
65
0
0
30 Jun 2022
Adversarial Ensemble Training by Jointly Learning Label Dependencies and
  Member Models
Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Lele Wang
B. Liu
UQCV
80
5
0
29 Jun 2022
A Deep Learning Approach to Create DNS Amplification Attacks
A Deep Learning Approach to Create DNS Amplification Attacks
Jared Mathews
Prosenjit Chatterjee
S. Banik
Cory Nance
AAML
53
1
0
29 Jun 2022
On the amplification of security and privacy risks by post-hoc
  explanations in machine learning models
On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Pengrui Quan
Supriyo Chakraborty
J. Jeyakumar
Mani B. Srivastava
MIACVAAML
93
5
0
28 Jun 2022
Previous
123...293031...798081
Next