ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,017 papers shown
Title
Denoising and Verification Cross-Layer Ensemble Against Black-box
  Adversarial Attacks
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks
Ka-Ho Chow
Wenqi Wei
Yanzhao Wu
Ling Liu
AAML
56
15
0
21 Aug 2019
Protecting Neural Networks with Hierarchical Random Switching: Towards
  Better Robustness-Accuracy Trade-off for Stochastic Defenses
Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Tianlin Li
Siyue Wang
Pin-Yu Chen
Yanzhi Wang
Brian Kulis
Xue Lin
S. Chin
AAML
67
43
0
20 Aug 2019
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with
  Limited Queries
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
AAML
105
86
0
19 Aug 2019
On the Robustness of Human Pose Estimation
On the Robustness of Human Pose Estimation
Sahil Shah
Naman Jain
Abhishek Sharma
Arjun Jain
AAMLOOD
69
20
0
18 Aug 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial
  Attacks
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
John E. Hopcroft
AAML
158
578
0
17 Aug 2019
Adversarial shape perturbations on 3D point clouds
Adversarial shape perturbations on 3D point clouds
Daniel Liu
Ronald Yu
Hao Su
3DPC
89
12
0
16 Aug 2019
DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic
  Segmentation
DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation
Seungju Cho
Tae Joon Jun
Byungsoo Oh
Daeyoung Kim
113
31
0
14 Aug 2019
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target
  Adversarial Network Once
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once
Jiangfan Han
Xiaoyi Dong
Ruimao Zhang
Dongdong Chen
Weiming Zhang
Nenghai Yu
Ping Luo
Xiaogang Wang
AAML
73
29
0
14 Aug 2019
AdvFaces: Adversarial Face Synthesis
AdvFaces: Adversarial Face Synthesis
Debayan Deb
Jianbang Zhang
Anil K. Jain
GANCVBMAAMLPICV
101
129
0
14 Aug 2019
Benchmarking the Robustness of Semantic Segmentation Models
Benchmarking the Robustness of Semantic Segmentation Models
Christoph Kamann
Carsten Rother
VLMUQCV
86
164
0
14 Aug 2019
Universal Adversarial Audio Perturbations
Universal Adversarial Audio Perturbations
Sajjad Abdoli
L. G. Hafemann
Jérôme Rony
Ismail Ben Ayed
P. Cardinal
Alessandro Lameiras Koerich
AAML
97
52
0
08 Aug 2019
Robust Learning with Jacobian Regularization
Robust Learning with Jacobian Regularization
Judy Hoffman
Daniel A. Roberts
Sho Yaida
OODAAML
67
170
0
07 Aug 2019
Improved Adversarial Robustness by Reducing Open Space Risk via Tent
  Activations
Improved Adversarial Robustness by Reducing Open Space Risk via Tent Activations
Andras Rozsa
Terrance E. Boult
AAML
61
18
0
07 Aug 2019
BlurNet: Defense by Filtering the Feature Maps
BlurNet: Defense by Filtering the Feature Maps
Ravi Raju
Mikko H. Lipasti
AAML
71
16
0
06 Aug 2019
Random Directional Attack for Fooling Deep Neural Networks
Random Directional Attack for Fooling Deep Neural Networks
Wenjian Luo
Chenwang Wu
Nan Zhou
Li Ni
AAML
24
4
0
06 Aug 2019
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
  Recognition Systems
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
Lea Schonherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
130
65
0
05 Aug 2019
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan
  Backdoors in AI Systems
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Wenbo Guo
Lun Wang
Masashi Sugiyama
Min Du
Basel Alomair
94
231
0
02 Aug 2019
Sound source detection, localization and classification using
  consecutive ensemble of CRNN models
Sound source detection, localization and classification using consecutive ensemble of CRNN models
Slawomir Kapka
M. Lewandowski
122
66
0
02 Aug 2019
AdvGAN++ : Harnessing latent layers for adversary generation
AdvGAN++ : Harnessing latent layers for adversary generation
Puneet Mangla
Surgan Jandial
Sakshi Varshney
V. Balasubramanian
GAN
81
69
0
02 Aug 2019
Robustifying deep networks for image segmentation
Robustifying deep networks for image segmentation
Zheng Liu
Jinnian Zhang
Varun Jog
Po-Ling Loh
A. McMillan
AAMLOOD
58
7
0
01 Aug 2019
Adversarial Robustness Curves
Adversarial Robustness Curves
Christina Göpfert
Jan Philip Göpfert
Barbara Hammer
AAML
35
6
0
31 Jul 2019
Adversarial Test on Learnable Image Encryption
Adversarial Test on Learnable Image Encryption
Maungmaung Aprilpyone
Warit Sirichotedumrong
Hitoshi Kiya
42
8
0
31 Jul 2019
Impact of Adversarial Examples on Deep Learning Models for Biomedical
  Image Segmentation
Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation
Utku Ozbulak
Arnout Van Messem
W. D. Neve
MedImAAML
75
59
0
30 Jul 2019
Not All Adversarial Examples Require a Complex Defense: Identifying
  Over-optimized Adversarial Examples with IQR-based Logit Thresholding
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding
Utku Ozbulak
Arnout Van Messem
W. D. Neve
AAML
34
1
0
30 Jul 2019
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial
  Examples
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples
Hossein Hosseini
Sreeram Kannan
Radha Poovendran
AAML
70
19
0
28 Jul 2019
On the Design of Black-box Adversarial Examples by Leveraging
  Gradient-free Optimization and Operator Splitting Method
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Pu Zhao
Sijia Liu
Pin-Yu Chen
Nghia Hoang
Kaidi Xu
B. Kailkhura
Xue Lin
AAML
121
54
0
26 Jul 2019
Defense Against Adversarial Attacks Using Feature Scattering-based
  Adversarial Training
Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training
Haichao Zhang
Jianyu Wang
AAML
112
231
0
24 Jul 2019
Understanding Adversarial Attacks on Deep Learning Based Medical Image
  Analysis Systems
Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems
Xingjun Ma
Yuhao Niu
Lin Gu
Yisen Wang
Yitian Zhao
James Bailey
Feng Lu
MedImAAML
93
460
0
24 Jul 2019
Towards Adversarially Robust Object Detection
Towards Adversarially Robust Object Detection
Haichao Zhang
Jianyu Wang
AAMLObjD
139
131
0
24 Jul 2019
Enhancing Adversarial Example Transferability with an Intermediate Level
  Attack
Enhancing Adversarial Example Transferability with an Intermediate Level Attack
Qian Huang
Isay Katsman
Horace He
Zeqi Gu
Serge J. Belongie
Ser-Nam Lim
SILMAAML
116
248
0
23 Jul 2019
Characterizing Attacks on Deep Reinforcement Learning
Characterizing Attacks on Deep Reinforcement Learning
Xinlei Pan
Chaowei Xiao
Warren He
Shuang Yang
Jian Peng
...
Jinfeng Yi
Zijiang Yang
Mingyan D. Liu
Yue Liu
Basel Alomair
AAML
104
70
0
21 Jul 2019
Structure-Invariant Testing for Machine Translation
Structure-Invariant Testing for Machine Translation
Pinjia He
Clara Meister
Z. Su
75
106
0
19 Jul 2019
Constrained Concealment Attacks against Reconstruction-based Anomaly
  Detectors in Industrial Control Systems
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
Alessandro Erba
Riccardo Taormina
S. Galelli
Marcello Pogliani
Michele Carminati
S. Zanero
Nils Ole Tippenhauer
AAML
95
22
0
17 Jul 2019
Adversarial Security Attacks and Perturbations on Machine Learning and
  Deep Learning Methods
Adversarial Security Attacks and Perturbations on Machine Learning and Deep Learning Methods
Arif Siddiqi
AAML
64
11
0
17 Jul 2019
Latent Adversarial Defence with Boundary-guided Generation
Latent Adversarial Defence with Boundary-guided Generation
Xiaowei Zhou
Ivor W. Tsang
Jie Yin
AAML
47
4
0
16 Jul 2019
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous
  Driving
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
Yulong Cao
Chaowei Xiao
Benjamin Cyr
Yimeng Zhou
Wonseok Park
Sara Rampazzi
Qi Alfred Chen
Kevin Fu
Z. Morley Mao
AAML
63
544
0
16 Jul 2019
Graph Interpolating Activation Improves Both Natural and Robust
  Accuracies in Data-Efficient Deep Learning
Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning
Bao Wang
Stanley J. Osher
AAMLAI4CE
77
10
0
16 Jul 2019
Recovery Guarantees for Compressible Signals with Adversarial Noise
Recovery Guarantees for Compressible Signals with Adversarial Noise
J. Dhaliwal
Kyle Hambrook
AAML
57
2
0
15 Jul 2019
A Novel User Representation Paradigm for Making Personalized Candidate
  Retrieval
A Novel User Representation Paradigm for Making Personalized Candidate Retrieval
Zheng Liu
Yu Xing
Jianxun Lian
Defu Lian
Ziyao Li
Xing Xie
53
3
0
15 Jul 2019
Measuring the Transferability of Adversarial Examples
Measuring the Transferability of Adversarial Examples
D. Petrov
Timothy M. Hospedales
SILMAAML
34
23
0
14 Jul 2019
Metamorphic Testing of a Deep Learning based Forecaster
Metamorphic Testing of a Deep Learning based Forecaster
Anurag Dwarakanath
Manish Ahuja
Sanjay Podder
Silja Vinu
Arijit Naskar
M. Koushik
AI4TS
48
9
0
13 Jul 2019
Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with
  GAN
Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with GAN
Guoping Zhao
Mingyu Zhang
Jiajun Liu
Ji-Rong Wen
AAMLGAN
65
25
0
12 Jul 2019
Stateful Detection of Black-Box Adversarial Attacks
Stateful Detection of Black-Box Adversarial Attacks
Steven Chen
Nicholas Carlini
D. Wagner
AAMLMLAU
69
126
0
12 Jul 2019
Adversarial Objects Against LiDAR-Based Autonomous Driving Systems
Adversarial Objects Against LiDAR-Based Autonomous Driving Systems
Yulong Cao
Chaowei Xiao
Dawei Yang
Jin Fang
Ruigang Yang
Mingyan D. Liu
Yue Liu
3DPCAAML
86
142
0
11 Jul 2019
Computational Concentration of Measure: Optimal Bounds, Reductions, and
  More
Computational Concentration of Measure: Optimal Bounds, Reductions, and More
O. Etesami
Saeed Mahloujifar
Mohammad Mahmoody
73
16
0
11 Jul 2019
PhysGAN: Generating Physical-World-Resilient Adversarial Examples for
  Autonomous Driving
PhysGAN: Generating Physical-World-Resilient Adversarial Examples for Autonomous Driving
Zelun Kong
Junfeng Guo
Ang Li
Cong Liu
AAML
105
131
0
09 Jul 2019
Detecting and Diagnosing Adversarial Images with Class-Conditional
  Capsule Reconstructions
Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions
Yao Qin
Nicholas Frosst
S. Sabour
Colin Raffel
G. Cottrell
Geoffrey E. Hinton
GANAAML
83
72
0
05 Jul 2019
Adversarial Robustness through Local Linearization
Adversarial Robustness through Local Linearization
Chongli Qin
James Martens
Sven Gowal
Dilip Krishnan
Krishnamurthy Dvijotham
Alhussein Fawzi
Soham De
Robert Stanforth
Pushmeet Kohli
AAML
142
308
0
04 Jul 2019
Adversarial Attacks in Sound Event Classification
Adversarial Attacks in Sound Event Classification
Vinod Subramanian
Emmanouil Benetos
N. Xu
SKoT McDonald
Mark Sandler
AAML
39
8
0
04 Jul 2019
Minimally distorted Adversarial Examples with a Fast Adaptive Boundary
  Attack
Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack
Francesco Croce
Matthias Hein
AAML
155
493
0
03 Jul 2019
Previous
123...676869...798081
Next