ResearchTrend.AI
  • Papers
  • Communities
  • Organizations
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,019 papers shown
Title
Btech thesis report on adversarial attack detection and purification of
  adverserially attacked images
Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Dvij Kalaria
AAML
27
1
0
09 May 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Binghui Wang
Youqin Li
Pan Zhou
AAML
76
14
0
07 May 2022
Imperceptible Backdoor Attack: From Input Space to Feature
  Representation
Imperceptible Backdoor Attack: From Input Space to Feature Representation
Nan Zhong
Zhenxing Qian
Xinpeng Zhang
AAML
73
53
0
06 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
98
7
0
05 May 2022
Rethinking Classifier and Adversarial Attack
Rethinking Classifier and Adversarial Attack
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
64
0
0
04 May 2022
CE-based white-box adversarial attacks will not work using super-fitting
CE-based white-box adversarial attacks will not work using super-fitting
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
104
0
0
04 May 2022
SemAttack: Natural Textual Attacks via Different Semantic Spaces
SemAttack: Natural Textual Attacks via Different Semantic Spaces
Wei Ping
Chejian Xu
Xiangyu Liu
Yuk-Kit Cheng
Yue Liu
SILMAAML
125
54
0
03 May 2022
MIRST-DM: Multi-Instance RST with Drop-Max Layer for Robust
  Classification of Breast Cancer
MIRST-DM: Multi-Instance RST with Drop-Max Layer for Robust Classification of Breast Cancer
Shoukun Sun
Min Xian
Aleksandar Vakanski
Hossny Ghanem
OOD
38
4
0
02 May 2022
Deep-Attack over the Deep Reinforcement Learning
Deep-Attack over the Deep Reinforcement Learning
Yang Li
Quanbiao Pan
Min Zhang
AAML
69
13
0
02 May 2022
Enhancing Adversarial Training with Feature Separability
Enhancing Adversarial Training with Feature Separability
Yaxin Li
Xiaorui Liu
Han Xu
Wentao Wang
Jiliang Tang
AAMLGAN
31
1
0
02 May 2022
Adversarial Plannning
Adversarial Plannning
Valentin Vie
Ryan Sheatsley
Sophia Beyda
S. Shringarputale
Kevin S. Chan
Trent Jaeger
Patrick McDaniel
AAML
35
0
0
01 May 2022
DDDM: a Brain-Inspired Framework for Robust Classification
DDDM: a Brain-Inspired Framework for Robust Classification
Xiyuan Chen
Xingyu Li
Yi Zhou
Tianming Yang
AAMLDiffM
79
7
0
01 May 2022
Software Testing for Machine Learning
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
65
29
0
30 Apr 2022
Detecting Textual Adversarial Examples Based on Distributional
  Characteristics of Data Representations
Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Na Liu
Mark Dras
Wei Emma Zhang
AAML
53
6
0
29 Apr 2022
Formulating Robustness Against Unforeseen Attacks
Formulating Robustness Against Unforeseen Attacks
Sihui Dai
Saeed Mahloujifar
Prateek Mittal
OODAAML
68
8
0
28 Apr 2022
Defending Person Detection Against Adversarial Patch Attack by using
  Universal Defensive Frame
Defending Person Detection Against Adversarial Patch Attack by using Universal Defensive Frame
Youngjoon Yu
Hong Joo Lee
Hakmin Lee
Yong Man Ro
AAML
46
12
0
27 Apr 2022
Uncertainty-Aware Prediction of Battery Energy Consumption for Hybrid
  Electric Vehicles
Uncertainty-Aware Prediction of Battery Energy Consumption for Hybrid Electric Vehicles
Jihed Khiari
Cristina Olaverri-Monreal
56
2
0
27 Apr 2022
A review of Federated Learning in Intrusion Detection Systems for IoT
A review of Federated Learning in Intrusion Detection Systems for IoT
Aitor Belenguer
J. Navaridas
J. A. Pascual
94
16
0
26 Apr 2022
Performance Analysis of Out-of-Distribution Detection on Trained Neural
  Networks
Performance Analysis of Out-of-Distribution Detection on Trained Neural Networks
Jens Henriksson
C. Berger
Markus Borg
Lars Tornberg
S. Sathyamoorthy
Cristofer Englund
OODD
62
21
0
26 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection
  Mechanism in Social Networks
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
60
28
0
26 Apr 2022
A Simple Structure For Building A Robust Model
A Simple Structure For Building A Robust Model
Xiao Tan
Jingbo Gao
Ruolin Li
AAMLOOD
86
3
0
25 Apr 2022
VITA: A Multi-Source Vicinal Transfer Augmentation Method for
  Out-of-Distribution Generalization
VITA: A Multi-Source Vicinal Transfer Augmentation Method for Out-of-Distribution Generalization
Minghui Chen
Cheng Wen
Feng Zheng
Fengxiang He
Ling Shao
OODD
64
5
0
25 Apr 2022
Improving Deep Learning Model Robustness Against Adversarial Attack by
  Increasing the Network Capacity
Improving Deep Learning Model Robustness Against Adversarial Attack by Increasing the Network Capacity
M. Marchetti
Edmond S. L. Ho
AAML
13
0
0
24 Apr 2022
Smart App Attack: Hacking Deep Learning Models in Android Apps
Smart App Attack: Hacking Deep Learning Models in Android Apps
Yujin Huang
Chunyang Chen
FedMLAAML
69
21
0
23 Apr 2022
A Tale of Two Models: Constructing Evasive Attacks on Edge Models
A Tale of Two Models: Constructing Evasive Attacks on Edge Models
Wei Hao
Aahil Awatramani
Jia-Bin Hu
Chengzhi Mao
Pin-Chun Chen
Eyal Cidon
Asaf Cidon
Junfeng Yang
AAML
95
4
0
22 Apr 2022
How Sampling Impacts the Robustness of Stochastic Neural Networks
How Sampling Impacts the Robustness of Stochastic Neural Networks
Sina Daubener
Asja Fischer
SILMAAML
59
1
0
22 Apr 2022
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Enhancing the Transferability via Feature-Momentum Adversarial Attack
Xianglong He
Yuezun Li
Haipeng Qu
Junyu Dong
AAML
47
1
0
22 Apr 2022
A Mask-Based Adversarial Defense Scheme
A Mask-Based Adversarial Defense Scheme
Weizhen Xu
Chenyi Zhang
Fangzhen Zhao
Liangda Fang
AAML
77
4
0
21 Apr 2022
Is Neuron Coverage Needed to Make Person Detection More Robust?
Is Neuron Coverage Needed to Make Person Detection More Robust?
Svetlana Pavlitskaya
Siyar Yikmis
J. Marius Zöllner
AAML
28
2
0
21 Apr 2022
Eliminating Backdoor Triggers for Deep Neural Networks Using Attention
  Relation Graph Distillation
Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
Jun Xia
Ting Wang
Jiepin Ding
Xian Wei
Mingsong Chen
AAML
90
34
0
21 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
81
5
0
20 Apr 2022
Poisons that are learned faster are more effective
Poisons that are learned faster are more effective
Pedro Sandoval-Segura
Vasu Singla
Liam H. Fowl
Jonas Geiping
Micah Goldblum
David Jacobs
Tom Goldstein
89
17
0
19 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile
  Edge
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
55
2
0
18 Apr 2022
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based
  Retrieval
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based Retrieval
Xunguang Wang
Yinqun Lin
Xuelong Li
AAMLGAN
82
7
0
18 Apr 2022
Towards Comprehensive Testing on the Robustness of Cooperative
  Multi-agent Reinforcement Learning
Towards Comprehensive Testing on the Robustness of Cooperative Multi-agent Reinforcement Learning
Jun Guo
Yonghong Chen
Yihang Hao
Zixin Yin
Yin Yu
Simin Li
AAML
106
34
0
17 Apr 2022
Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot
  Learning
Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot Learning
Mathias Lechner
Alexander Amini
Daniela Rus
T. Henzinger
AAML
93
10
0
15 Apr 2022
Q-TART: Quickly Training for Adversarial Robustness and
  in-Transferability
Q-TART: Quickly Training for Adversarial Robustness and in-Transferability
Madan Ravi Ganesh
Salimeh Yasaei Sekeh
Jason J. Corso
AAML
38
1
0
14 Apr 2022
From Environmental Sound Representation to Robustness of 2D CNN Models
  Against Adversarial Attacks
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks
Mohammad Esmaeilpour
P. Cardinal
Alessandro Lameiras Koerich
AAML
121
7
0
14 Apr 2022
Liuer Mihou: A Practical Framework for Generating and Evaluating
  Grey-box Adversarial Attacks against NIDS
Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS
Ke He
Dan Dongseong Kim
Jing Sun
J. Yoo
Young Hun Lee
H. Kim
AAML
39
5
0
12 Apr 2022
Toward Robust Spiking Neural Network Against Adversarial Perturbation
Toward Robust Spiking Neural Network Against Adversarial Perturbation
Ling Liang
Kaidi Xu
Xing Hu
Lei Deng
Yuan Xie
AAML
77
16
0
12 Apr 2022
Examining the Proximity of Adversarial Examples to Class Manifolds in
  Deep Networks
Examining the Proximity of Adversarial Examples to Class Manifolds in Deep Networks
Stefan Pócos
Iveta Becková
Igor Farkas
AAML
47
2
0
12 Apr 2022
3DeformRS: Certifying Spatial Deformations on Point Clouds
3DeformRS: Certifying Spatial Deformations on Point Clouds
S. GabrielPérez
Juan C. Pérez
Motasem Alfarra
Silvio Giancola
Guohao Li
3DPC
95
12
0
12 Apr 2022
Evaluating the Adversarial Robustness for Fourier Neural Operators
Evaluating the Adversarial Robustness for Fourier Neural Operators
Abolaji D. Adesoji
Pin-Yu Chen
AAML
80
1
0
08 Apr 2022
AdvEst: Adversarial Perturbation Estimation to Classify and Detect
  Adversarial Attacks against Speaker Identification
AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Sonal Joshi
Saurabh Kataria
Jesus Villalba
Najim Dehak
AAML
86
7
0
08 Apr 2022
Adaptive-Gravity: A Defense Against Adversarial Samples
Adaptive-Gravity: A Defense Against Adversarial Samples
Ali Mirzaeian
Zhi Tian
Sai Manoj P D
B. S. Latibari
I. Savidis
Houman Homayoun
Avesta Sasan
AAMLOOD
62
1
0
07 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
107
19
0
07 Apr 2022
Masking Adversarial Damage: Finding Adversarial Saliency for Robust and
  Sparse Network
Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network
Byung-Kwan Lee
Junho Kim
Y. Ro
AAML
59
20
0
06 Apr 2022
Distilling Robust and Non-Robust Features in Adversarial Examples by
  Information Bottleneck
Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bottleneck
Junho Kim
Byung-Kwan Lee
Yong Man Ro
AAML
64
46
0
06 Apr 2022
Adversarial Robustness through the Lens of Convolutional Filters
Adversarial Robustness through the Lens of Convolutional Filters
Paul Gavrikov
J. Keuper
70
15
0
05 Apr 2022
DST: Dynamic Substitute Training for Data-free Black-box Attack
DST: Dynamic Substitute Training for Data-free Black-box Attack
Wenxuan Wang
Xuelin Qian
Yanwei Fu
Xiangyang Xue
OODAAML
63
18
0
03 Apr 2022
Previous
123...323334...798081
Next