ResearchTrend.AI
  • Papers
  • Communities
  • Organizations
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,019 papers shown
Title
A Robust Backpropagation-Free Framework for Images
A Robust Backpropagation-Free Framework for Images
Timothy Zee
Alexander Ororbia
A. Mali
Ifeoma Nwogu
70
1
0
03 Jun 2022
Towards Evading the Limits of Randomized Smoothing: A Theoretical
  Analysis
Towards Evading the Limits of Randomized Smoothing: A Theoretical Analysis
Raphael Ettedgui
Alexandre Araujo
Rafael Pinot
Y. Chevaleyre
Jamal Atif
AAML
67
3
0
03 Jun 2022
Understanding Deep Learning via Decision Boundary
Understanding Deep Learning via Decision Boundary
Shiye Lei
Fengxiang He
Yancheng Yuan
Dacheng Tao
76
14
0
03 Jun 2022
On the Generalization of Wasserstein Robust Federated Learning
On the Generalization of Wasserstein Robust Federated Learning
Tung Nguyen
Tuan Dung Nguyen
Long Tan Le
Canh T. Dinh
N. H. Tran
OODFedML
92
6
0
03 Jun 2022
Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Amrith Rajagopal Setlur
Benjamin Eysenbach
Virginia Smith
Sergey Levine
79
19
0
03 Jun 2022
Adaptive Adversarial Training to Improve Adversarial Robustness of DNNs
  for Medical Image Segmentation and Detection
Adaptive Adversarial Training to Improve Adversarial Robustness of DNNs for Medical Image Segmentation and Detection
Linhai Ma
Liang Liang
OOD
86
6
0
02 Jun 2022
Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNs
Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNs
Chen-Hao Hu
Yilong Wang
Kalibinuer Tiliwalidi
Wen Li
AAML
120
17
0
02 Jun 2022
FACM: Intermediate Layer Still Retain Effective Features against
  Adversarial Examples
FACM: Intermediate Layer Still Retain Effective Features against Adversarial Examples
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
85
0
0
02 Jun 2022
Improving the Robustness and Generalization of Deep Neural Network with
  Confidence Threshold Reduction
Improving the Robustness and Generalization of Deep Neural Network with Confidence Threshold Reduction
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAMLOOD
72
1
0
02 Jun 2022
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
Junjian Li
Honglong Chen
AAML
42
2
0
02 Jun 2022
On the reversibility of adversarial attacks
On the reversibility of adversarial attacks
C. Li
Ricardo Sánchez-Matilla
Ali Shahin Shamsabadi
Riccardo Mazzon
Andrea Cavallaro
AAML
53
2
0
01 Jun 2022
Attack-Agnostic Adversarial Detection
Attack-Agnostic Adversarial Detection
Jiaxin Cheng
Mohamed Hussein
J. Billa
Wael AbdAlmageed
AAML
76
0
0
01 Jun 2022
Hide and Seek: on the Stealthiness of Attacks against Deep Learning
  Systems
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
AAML
64
2
0
31 May 2022
Exact Feature Collisions in Neural Networks
Exact Feature Collisions in Neural Networks
Utku Ozbulak
Manvel Gasparyan
Shodhan Rao
W. D. Neve
Arnout Van Messem
AAML
63
1
0
31 May 2022
Searching for the Essence of Adversarial Perturbations
Searching for the Essence of Adversarial Perturbations
Dennis Y. Menn
Tzu-hsun Feng
Hung-yi Lee
AAML
39
1
0
30 May 2022
Securing AI-based Healthcare Systems using Blockchain Technology: A
  State-of-the-Art Systematic Literature Review and Future Research Directions
Securing AI-based Healthcare Systems using Blockchain Technology: A State-of-the-Art Systematic Literature Review and Future Research Directions
Rucha Shinde
S. Patil
K. Kotecha
V. Potdar
Ganeshsree Selvachandran
Ajith Abraham
55
33
0
30 May 2022
CalFAT: Calibrated Federated Adversarial Training with Label Skewness
CalFAT: Calibrated Federated Adversarial Training with Label Skewness
Chen Chen
Yuchen Liu
Xingjun Ma
Lingjuan Lyu
FedML
247
34
0
30 May 2022
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing
  Models
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models
Songlin Yang
Wei Wang
Chenye Xu
Ziwen He
Bo Peng
Jing Dong
AAMLCVBM
72
4
0
30 May 2022
Superclass Adversarial Attack
Superclass Adversarial Attack
Soichiro Kumano
Hiroshi Kera
T. Yamasaki
AAML
81
1
0
29 May 2022
Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Glenn Dawson
Muhammad Umer
R. Polikar
AAML
67
0
0
28 May 2022
Rethinking Bayesian Learning for Data Analysis: The Art of Prior and
  Inference in Sparsity-Aware Modeling
Rethinking Bayesian Learning for Data Analysis: The Art of Prior and Inference in Sparsity-Aware Modeling
Lei Cheng
Feng Yin
Sergios Theodoridis
S. Chatzis
Tsung-Hui Chang
128
78
0
28 May 2022
Standalone Neural ODEs with Sensitivity Analysis
Standalone Neural ODEs with Sensitivity Analysis
Rym Jaroudi
Lukáš Malý
Gabriel Eilertsen
B. Johansson
Jonas Unger
George Baravdish
64
0
0
27 May 2022
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating
  Weather Conditions on the Camera Lens of Autonomous Systems
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems
Alberto Marchisio
Giovanni Caramia
Maurizio Martina
Mohamed Bennai
AAML
75
8
0
27 May 2022
Physical-World Optical Adversarial Attacks on 3D Face Recognition
Physical-World Optical Adversarial Attacks on 3D Face Recognition
Yanjie Li
Yiquan Li
Xuelong Dai
Songtao Guo
Bin Xiao
AAML
140
32
0
26 May 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Yunpeng Huang
A. Kong
AAML
85
54
0
26 May 2022
One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
Shutong Wu
Sizhe Chen
Cihang Xie
Xiaolin Huang
AAML
94
27
0
24 May 2022
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box
  Score-Based Query Attacks
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Sizhe Chen
Zhehao Huang
Qinghua Tao
Yingwen Wu
Cihang Xie
Xiaolin Huang
AAML
201
28
0
24 May 2022
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Tianlong Chen
Zhenyu Zhang
Yihua Zhang
Shiyu Chang
Sijia Liu
Zhangyang Wang
AAML
80
25
0
24 May 2022
Alleviating Robust Overfitting of Adversarial Training With Consistency
  Regularization
Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization
Shudong Zhang
Haichang Gao
Tianwei Zhang
Yunyi Zhou
Zihui Wu
AAML
82
4
0
24 May 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial Robustness
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
105
9
0
23 May 2022
Stability of the scattering transform for deformations with minimal
  regularity
Stability of the scattering transform for deformations with minimal regularity
F. Nicola
S. I. Trapasso
72
4
0
23 May 2022
Post-breach Recovery: Protection against White-box Adversarial Examples
  for Leaked DNN Models
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
79
12
0
21 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
72
0
0
21 May 2022
Getting a-Round Guarantees: Floating-Point Attacks on Certified
  Robustness
Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness
Jiankai Jin
O. Ohrimenko
Benjamin I. P. Rubinstein
AAML
76
3
0
20 May 2022
Learning to Reverse DNNs from AI Programs Automatically
Learning to Reverse DNNs from AI Programs Automatically
Simin Chen
Hamed Khanpour
Cong Liu
Wei Yang
88
16
0
20 May 2022
On Trace of PGD-Like Adversarial Attacks
On Trace of PGD-Like Adversarial Attacks
Mo Zhou
Vishal M. Patel
AAML
80
4
0
19 May 2022
Gradient Aligned Attacks via a Few Queries
Gradient Aligned Attacks via a Few Queries
Xiangyuan Yang
Jie Lin
Hanlin Zhang
Xinyu Yang
Peng Zhao
AAML
76
0
0
19 May 2022
Gradient-based Counterfactual Explanations using Tractable Probabilistic
  Models
Gradient-based Counterfactual Explanations using Tractable Probabilistic Models
Xiaoting Shao
Kristian Kersting
BDL
66
1
0
16 May 2022
Robust Representation via Dynamic Feature Aggregation
Robust Representation via Dynamic Feature Aggregation
Haozhe Liu
Haoqin Ji
Yuexiang Li
Nanjun He
Haoqian Wu
Feng Liu
Linlin Shen
Yefeng Zheng
AAMLOOD
91
3
0
16 May 2022
Exploiting the Relationship Between Kendall's Rank Correlation and
  Cosine Similarity for Attribution Protection
Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Fan Wang
A. Kong
179
10
0
15 May 2022
Verifying Neural Networks Against Backdoor Attacks
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
73
5
0
14 May 2022
Evaluating Membership Inference Through Adversarial Robustness
Evaluating Membership Inference Through Adversarial Robustness
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Bilal Hussain Abbasi
Shengshan Hu
AAML
92
17
0
14 May 2022
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary
  Backdoor Pattern Types Using a Maximum Margin Statistic
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Hang Wang
Zhen Xiang
David J. Miller
G. Kesidis
AAML
117
44
0
13 May 2022
AEON: A Method for Automatic Evaluation of NLP Test Cases
AEON: A Method for Automatic Evaluation of NLP Test Cases
Jen-tse Huang
Jianping Zhang
Wenxuan Wang
Pinjia He
Yuxin Su
Michael R. Lyu
83
23
0
13 May 2022
The Different Faces of AI Ethics Across the World: A
  Principle-Implementation Gap Analysis
The Different Faces of AI Ethics Across the World: A Principle-Implementation Gap Analysis
L. Tidjon
Foutse Khomh
53
8
0
12 May 2022
Smooth-Reduce: Leveraging Patches for Improved Certified Robustness
Smooth-Reduce: Leveraging Patches for Improved Certified Robustness
Ameya Joshi
Minh Pham
Minsu Cho
Leonid Boytsov
Filipe Condessa
J. Zico Kolter
Chinmay Hegde
UQCVAAML
72
2
0
12 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
67
56
0
12 May 2022
How Does Frequency Bias Affect the Robustness of Neural Image
  Classifiers against Common Corruption and Adversarial Perturbations?
How Does Frequency Bias Affect the Robustness of Neural Image Classifiers against Common Corruption and Adversarial Perturbations?
Alvin Chan
Yew-Soon Ong
Clement Tan
AAML
60
14
0
09 May 2022
Model-Contrastive Learning for Backdoor Defense
Model-Contrastive Learning for Backdoor Defense
Zhihao Yue
Jun Xia
Zhiwei Ling
Ming Hu
Ting Wang
Xian Wei
Mingsong Chen
AAML
61
3
0
09 May 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
72
3
0
09 May 2022
Previous
123...313233...798081
Next