ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.04644
  4. Cited By
Towards Evaluating the Robustness of Neural Networks
v1v2 (latest)

Towards Evaluating the Robustness of Neural Networks

16 August 2016
Nicholas Carlini
D. Wagner
    OODAAML
ArXiv (abs)PDFHTML

Papers citing "Towards Evaluating the Robustness of Neural Networks"

50 / 4,015 papers shown
Title
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
K. Makarychev
Pascal Dupré
Yury Makarychev
Giancarlo Pellegrino
Dan Boneh
AAML
104
64
0
08 Nov 2018
YASENN: Explaining Neural Networks via Partitioning Activation Sequences
YASENN: Explaining Neural Networks via Partitioning Activation Sequences
Yaroslav Zharov
Denis Korzhenkov
J. Lyu
Alexander Tuzhilin
FAttAAML
41
6
0
07 Nov 2018
SparseFool: a few pixels make a big difference
SparseFool: a few pixels make a big difference
Apostolos Modas
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
AAML
72
200
0
06 Nov 2018
Exploring Connections Between Active Learning and Model Extraction
Exploring Connections Between Active Learning and Model Extraction
Varun Chandrasekaran
Kamalika Chaudhuri
Irene Giacomelli
Shane Walker
Songbai Yan
MIACV
262
159
0
05 Nov 2018
On the Transferability of Adversarial Examples Against CNN-Based Image
  Forensics
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
Mauro Barni
Kassem Kallas
Ehsan Nowroozi
B. Tondi
AAML
68
34
0
05 Nov 2018
Security for Machine Learning-based Systems: Attacks and Challenges
  during Training and Inference
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Faiq Khalid
Muhammad Abdullah Hanif
Semeen Rehman
Mohamed Bennai
AAML
48
22
0
05 Nov 2018
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on
  Adversarial Machine Learning
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning
Faiq Khalid
Muhammad Abdullah Hanif
Semeen Rehman
Junaid Qadir
Mohamed Bennai
AAML
85
34
0
04 Nov 2018
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters
Hassan Ali
Faiq Khalid
Hammad Tariq
Muhammad Abdullah Hanif
Semeen Rehman
Rehan Ahmed
Mohamed Bennai
AAML
133
14
0
04 Nov 2018
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural
  Network against Adversarial Attacks
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Faiq Khalid
Hassan Ali
Hammad Tariq
Muhammad Abdullah Hanif
Semeen Rehman
Rehan Ahmed
Mohamed Bennai
AAMLMQ
100
37
0
04 Nov 2018
Learning to Defend by Learning to Attack
Learning to Defend by Learning to Attack
Haoming Jiang
Zhehui Chen
Yuyang Shi
Bo Dai
T. Zhao
108
22
0
03 Nov 2018
Semidefinite relaxations for certifying robustness to adversarial
  examples
Semidefinite relaxations for certifying robustness to adversarial examples
Aditi Raghunathan
Jacob Steinhardt
Percy Liang
AAML
126
439
0
02 Nov 2018
Efficient Neural Network Robustness Certification with General
  Activation Functions
Efficient Neural Network Robustness Certification with General Activation Functions
Huan Zhang
Tsui-Wei Weng
Pin-Yu Chen
Cho-Jui Hsieh
Luca Daniel
AAML
138
766
0
02 Nov 2018
Towards Adversarial Malware Detection: Lessons Learned from PDF-based
  Attacks
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
Davide Maiorca
Battista Biggio
Giorgio Giacinto
AAML
80
47
0
02 Nov 2018
Improving Adversarial Robustness by Encouraging Discriminative Features
Improving Adversarial Robustness by Encouraging Discriminative Features
Chirag Agarwal
Anh Totti Nguyen
Dan Schonfeld
OOD
66
5
0
01 Nov 2018
When Not to Classify: Detection of Reverse Engineering Attacks on DNN
  Image Classifiers
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers
Yujia Wang
David J. Miller
M. Schaar
AAML
49
9
0
31 Oct 2018
Data Poisoning Attack against Unsupervised Node Embedding Methods
Data Poisoning Attack against Unsupervised Node Embedding Methods
Mingjie Sun
Jian Tang
Huichen Li
Yue Liu
Chaowei Xiao
Yao-Liang Chen
Basel Alomair
GNNAAML
50
67
0
30 Oct 2018
On the Effectiveness of Interval Bound Propagation for Training
  Verifiably Robust Models
On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Sven Gowal
Krishnamurthy Dvijotham
Robert Stanforth
Rudy Bunel
Chongli Qin
J. Uesato
Relja Arandjelović
Timothy A. Mann
Pushmeet Kohli
AAML
109
559
0
30 Oct 2018
Improved Network Robustness with Adversary Critic
Improved Network Robustness with Adversary Critic
Alexander Matyasko
Lap-Pui Chau
AAML
55
14
0
30 Oct 2018
Adversarial Risk and Robustness: General Definitions and Implications
  for the Uniform Distribution
Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution
Dimitrios I. Diochnos
Saeed Mahloujifar
Mohammad Mahmoody
AAML
58
72
0
29 Oct 2018
Logit Pairing Methods Can Fool Gradient-Based Attacks
Logit Pairing Methods Can Fool Gradient-Based Attacks
Marius Mosbach
Maksym Andriushchenko
T. A. Trost
Matthias Hein
Dietrich Klakow
AAML
68
83
0
29 Oct 2018
Attack Graph Convolutional Networks by Adding Fake Nodes
Attack Graph Convolutional Networks by Adding Fake Nodes
Xiaoyun Wang
Minhao Cheng
Joe Eaton
Cho-Jui Hsieh
S. F. Wu
AAMLGNN
120
79
0
25 Oct 2018
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial
  Examples Against Gradient Obfuscation Defenses
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses
Mohammad J. Hashemi
Greg Cusack
Eric Keller
AAMLSILM
51
8
0
23 Oct 2018
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep
  Reinforcement Learning
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep Reinforcement Learning
Vahid Behzadan
Arslan Munir
88
27
0
23 Oct 2018
One Bit Matters: Understanding Adversarial Examples as the Abuse of
  Redundancy
One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Jingkang Wang
R. Jia
Gerald Friedland
Yangqiu Song
C. Spanos
AAML
42
4
0
23 Oct 2018
Sparse DNNs with Improved Adversarial Robustness
Sparse DNNs with Improved Adversarial Robustness
Yiwen Guo
Chao Zhang
Changshui Zhang
Yurong Chen
AAML
105
154
0
23 Oct 2018
On Extensions of CLEVER: A Neural Network Robustness Evaluation
  Algorithm
On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Tsui-Wei Weng
Huan Zhang
Pin-Yu Chen
A. Lozano
Cho-Jui Hsieh
Luca Daniel
51
10
0
19 Oct 2018
Compositional Verification for Autonomous Systems with Deep Learning
  Components
Compositional Verification for Autonomous Systems with Deep Learning Components
C. Păsăreanu
D. Gopinath
Huafeng Yu
45
20
0
18 Oct 2018
Exploring Adversarial Examples in Malware Detection
Exploring Adversarial Examples in Malware Detection
Octavian Suciu
Scott E. Coull
Jeffrey Johns
AAML
101
193
0
18 Oct 2018
Provable Robustness of ReLU networks via Maximization of Linear Regions
Provable Robustness of ReLU networks via Maximization of Linear Regions
Francesco Croce
Maksym Andriushchenko
Matthias Hein
97
166
0
17 Oct 2018
MeshAdv: Adversarial Meshes for Visual Recognition
MeshAdv: Adversarial Meshes for Visual Recognition
Chaowei Xiao
Dawei Yang
Yue Liu
Jia Deng
M. Liu
AAML
65
25
0
11 Oct 2018
Characterizing Adversarial Examples Based on Spatial Consistency
  Information for Semantic Segmentation
Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Chaowei Xiao
Ruizhi Deng
Yue Liu
Feng Yu
M. Liu
Basel Alomair
AAML
59
99
0
11 Oct 2018
Secure Deep Learning Engineering: A Software Quality Assurance
  Perspective
Secure Deep Learning Engineering: A Software Quality Assurance Perspective
Lei Ma
Felix Juefei Xu
Minhui Xue
Q. Hu
Sen Chen
Yue Liu
Yang Liu
Jianjun Zhao
Jianxiong Yin
Simon See
AAML
80
35
0
10 Oct 2018
The Adversarial Attack and Detection under the Fisher Information Metric
The Adversarial Attack and Detection under the Fisher Information Metric
Chenxiao Zhao
P. T. Fletcher
Mixue Yu
Chaomin Shen
Guixu Zhang
Yaxin Peng
AAML
76
47
0
09 Oct 2018
What made you do this? Understanding black-box decisions with sufficient
  input subsets
What made you do this? Understanding black-box decisions with sufficient input subsets
Brandon Carter
Jonas W. Mueller
Siddhartha Jain
David K Gifford
FAtt
90
79
0
09 Oct 2018
Efficient Two-Step Adversarial Defense for Deep Neural Networks
Efficient Two-Step Adversarial Defense for Deep Neural Networks
Ting-Jui Chang
Yukun He
Peng Li
AAML
69
11
0
08 Oct 2018
Combinatorial Attacks on Binarized Neural Networks
Combinatorial Attacks on Binarized Neural Networks
Elias Boutros Khalil
Amrita Gupta
B. Dilkina
AAML
89
40
0
08 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
Large batch size training of neural networks with adversarial training
  and second-order information
Large batch size training of neural networks with adversarial training and second-order information
Z. Yao
A. Gholami
Daiyaan Arfeen
Richard Liaw
Joseph E. Gonzalez
Kurt Keutzer
Michael W. Mahoney
ODL
96
42
0
02 Oct 2018
Improved robustness to adversarial examples using Lipschitz regularization of the loss
Chris Finlay
Adam M. Oberman
B. Abbasi
93
34
0
01 Oct 2018
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural
  Network
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Xuanqing Liu
Yao Li
Chongruo Wu
Cho-Jui Hsieh
AAMLOOD
93
171
0
01 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
74
67
0
30 Sep 2018
Interpreting Adversarial Robustness: A View from Decision Surface in
  Input Space
Interpreting Adversarial Robustness: A View from Decision Surface in Input Space
Fuxun Yu
Chenchen Liu
Yanzhi Wang
Liang Zhao
Xiang Chen
AAMLOOD
99
27
0
29 Sep 2018
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
148
684
0
28 Sep 2018
Characterizing Audio Adversarial Examples Using Temporal Dependency
Characterizing Audio Adversarial Examples Using Temporal Dependency
Zhuolin Yang
Yue Liu
Pin-Yu Chen
Basel Alomair
AAML
69
165
0
28 Sep 2018
Vision-based Navigation of Autonomous Vehicle in Roadway Environments
  with Unexpected Hazards
Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards
Mhafuzul Islam
M. Chowdhury
Hongda Li
Hongxin Hu
AAML
36
12
0
27 Sep 2018
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge
  and the Way Forward
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward
Muhammad Usama
Junaid Qadir
Ala I. Al-Fuqaha
AAML
53
20
0
26 Sep 2018
Fast Geometrically-Perturbed Adversarial Faces
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBMAAML
64
65
0
24 Sep 2018
On The Utility of Conditional Generation Based Mutual Information for
  Characterizing Adversarial Subspaces
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces
Chia-Yi Hsu
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
70
1
0
24 Sep 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial Perturbation
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
86
168
0
24 Sep 2018
Generating 3D Adversarial Point Clouds
Generating 3D Adversarial Point Clouds
Chong Xiang
C. Qi
Yue Liu
3DPC
117
294
0
19 Sep 2018
Previous
123...747576...798081
Next