ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations
v1v2v3 (latest)

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,270 papers shown
Title
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive Survey
A. Serban
E. Poll
Joost Visser
AAML
116
73
0
07 Aug 2020
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
Xiaoguang Han
AAML
75
88
0
05 Aug 2020
Efficient Adversarial Attacks for Visual Object Tracking
Efficient Adversarial Attacks for Visual Object Tracking
Siyuan Liang
Xingxing Wei
Siyuan Yao
Xiaochun Cao
AAML
78
75
0
01 Aug 2020
On the Convergence of SGD with Biased Gradients
On the Convergence of SGD with Biased Gradients
Ahmad Ajalloeian
Sebastian U. Stich
84
90
0
31 Jul 2020
Practical Detection of Trojan Neural Networks: Data-Limited and
  Data-Free Cases
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases
Ren Wang
Gaoyuan Zhang
Sijia Liu
Pin-Yu Chen
Jinjun Xiong
Meng Wang
AAML
148
149
0
31 Jul 2020
Revisiting the Modifiable Areal Unit Problem in Deep Traffic Prediction
  with Visual Analytics
Revisiting the Modifiable Areal Unit Problem in Deep Traffic Prediction with Visual Analytics
Wei Zeng
Chengqiao Lin
Juncong Lin
Jincheng Jiang
Jiazhi Xia
Cagatay Turkay
Wei Chen
53
27
0
30 Jul 2020
A General Framework For Detecting Anomalous Inputs to DNN Classifiers
A General Framework For Detecting Anomalous Inputs to DNN Classifiers
Jayaram Raghuram
Varun Chandrasekaran
S. Jha
Suman Banerjee
AAML
106
35
0
29 Jul 2020
End-to-End Adversarial White Box Attacks on Music Instrument
  Classification
End-to-End Adversarial White Box Attacks on Music Instrument Classification
Katharina Prinz
A. Flexer
AAML
24
0
0
29 Jul 2020
Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Xiaoyu Zhang
Ajmal Mian
Rohit Gupta
Nazanin Rahnavard
M. Shah
AAML
91
26
0
28 Jul 2020
Adversarial Privacy-preserving Filter
Adversarial Privacy-preserving Filter
Jiaming Zhang
Jitao Sang
Xian Zhao
Xiaowen Huang
Yanfeng Sun
Yongli Hu
PICV
81
42
0
25 Jul 2020
Adversarial Attacks against Face Recognition: A Comprehensive Study
Adversarial Attacks against Face Recognition: A Comprehensive Study
Fatemeh Vakhshiteh
A. Nickabadi
Raghavendra Ramachandra
AAML
83
16
0
22 Jul 2020
Robust Machine Learning via Privacy/Rate-Distortion Theory
Robust Machine Learning via Privacy/Rate-Distortion Theory
Ye Wang
Shuchin Aeron
Adnan Siraj Rakin
T. Koike-Akino
P. Moulin
OOD
74
6
0
22 Jul 2020
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive
  Review
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Yansong Gao
Bao Gia Doan
Zhi-Li Zhang
Siqi Ma
Jiliang Zhang
Anmin Fu
Surya Nepal
Hyoungshick Kim
AAML
127
233
0
21 Jul 2020
Robust Tracking against Adversarial Attacks
Robust Tracking against Adversarial Attacks
Shuai Jia
Chao Ma
Yibing Song
Xiaokang Yang
AAML
75
51
0
20 Jul 2020
Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of
  Multimodal Data with Adversarial Defense
Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense
Sayeed Shafayet Chowdhury
Kaji Mejbaul Islam
Rouhan Noor
AAML
50
3
0
17 Jul 2020
Technologies for Trustworthy Machine Learning: A Survey in a
  Socio-Technical Context
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context
Ehsan Toreini
Mhairi Aitken
Kovila P. L. Coopamootoo
Karen Elliott
Vladimiro González-Zelaya
P. Missier
Magdalene Ng
Aad van Moorsel
72
18
0
17 Jul 2020
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
170
614
0
17 Jul 2020
Towards Evaluating Driver Fatigue with Robust Deep Learning Models
Towards Evaluating Driver Fatigue with Robust Deep Learning Models
Ken Alparslan
Yigit Can Alparslan
Matthew Burlick
20
7
0
16 Jul 2020
Deep Learning Backdoors
Deep Learning Backdoors
Shaofeng Li
Shiqing Ma
Minhui Xue
Benjamin Zi Hao Zhao
153
36
0
16 Jul 2020
Odyssey: Creation, Analysis and Detection of Trojan Models
Odyssey: Creation, Analysis and Detection of Trojan Models
Marzieh Edraki
Nazmul Karim
Nazanin Rahnavard
Ajmal Mian
M. Shah
AAML
97
14
0
16 Jul 2020
A Survey on Security Attacks and Defense Techniques for Connected and
  Autonomous Vehicles
A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles
M. Pham
Kaiqi Xiong
125
143
0
16 Jul 2020
Adversarial Attacks against Neural Networks in Audio Domain: Exploiting
  Principal Components
Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Ken Alparslan
Yigit Can Alparslan
Matthew Burlick
AAML
26
9
0
14 Jul 2020
Towards robust sensing for Autonomous Vehicles: An adversarial
  perspective
Towards robust sensing for Autonomous Vehicles: An adversarial perspective
Apostolos Modas
Ricardo Sánchez-Matilla
P. Frossard
Andrea Cavallaro
AAML
63
35
0
14 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Patch-wise Attack for Fooling Deep Neural Network
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
91
143
0
14 Jul 2020
Data from Model: Extracting Data from Non-robust and Robust Models
Data from Model: Extracting Data from Non-robust and Robust Models
Philipp Benz
Chaoning Zhang
Tooba Imtiaz
In-So Kweon
73
7
0
13 Jul 2020
Understanding Adversarial Examples from the Mutual Influence of Images
  and Perturbations
Understanding Adversarial Examples from the Mutual Influence of Images and Perturbations
Chaoning Zhang
Philipp Benz
Tooba Imtiaz
In-So Kweon
SSLAAML
83
119
0
13 Jul 2020
Probabilistic Jacobian-based Saliency Maps Attacks
Probabilistic Jacobian-based Saliency Maps Attacks
Théo Combey
António Loison
Maxime Faucher
H. Hajri
AAML
106
19
0
12 Jul 2020
Understanding Object Detection Through An Adversarial Lens
Understanding Object Detection Through An Adversarial Lens
Ka-Ho Chow
Ling Liu
Mehmet Emre Gursoy
Stacey Truex
Wenqi Wei
Yanzhao Wu
AAMLObjD
56
24
0
11 Jul 2020
Boundary thickness and robustness in learning models
Boundary thickness and robustness in learning models
Yaoqing Yang
Rekha Khanna
Yaodong Yu
A. Gholami
Kurt Keutzer
Joseph E. Gonzalez
Kannan Ramchandran
Michael W. Mahoney
OOD
72
42
0
09 Jul 2020
Making Adversarial Examples More Transferable and Indistinguishable
Making Adversarial Examples More Transferable and Indistinguishable
Junhua Zou
Yexin Duan
Xin Liu
Junyang Qiu
Yu Pan
Zhisong Pan
AAML
75
32
0
08 Jul 2020
Learning while Respecting Privacy and Robustness to Distributional
  Uncertainties and Adversarial Data
Learning while Respecting Privacy and Robustness to Distributional Uncertainties and Adversarial Data
A. Sadeghi
Gang Wang
Meng Ma
G. Giannakis
OODFedML
29
4
0
07 Jul 2020
Opportunities and Challenges in Deep Learning Adversarial Robustness: A
  Survey
Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey
S. Silva
Peyman Najafirad
AAMLOOD
104
135
0
01 Jul 2020
Geometry-Inspired Top-k Adversarial Perturbations
Geometry-Inspired Top-k Adversarial Perturbations
Nurislam Tursynbek
Aleksandr Petiushko
Ivan Oseledets
AAML
83
10
0
28 Jun 2020
Diverse Knowledge Distillation (DKD): A Solution for Improving The
  Robustness of Ensemble Models Against Adversarial Attacks
Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks
Ali Mirzaeian
Jana Kosecka
Houman Homayoun
Tinoosh Mohsening
Avesta Sasan
FedMLAAML
41
3
0
26 Jun 2020
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Kaidi Jin
Tianwei Zhang
Chao Shen
Yufei Chen
Ming Fan
Chenhao Lin
Ting Liu
AAML
43
14
0
26 Jun 2020
Orthogonal Deep Models As Defense Against Black-Box Attacks
Orthogonal Deep Models As Defense Against Black-Box Attacks
M. Jalwana
Naveed Akhtar
Bennamoun
Ajmal Mian
AAML
45
11
0
26 Jun 2020
Not all Failure Modes are Created Equal: Training Deep Neural Networks
  for Explicable (Mis)Classification
Not all Failure Modes are Created Equal: Training Deep Neural Networks for Explicable (Mis)Classification
Alberto Olmo
Sailik Sengupta
S. Kambhampati
58
6
0
26 Jun 2020
Network Moments: Extensions and Sparse-Smooth Attacks
Network Moments: Extensions and Sparse-Smooth Attacks
Modar Alfadly
Adel Bibi
Emilio Botero
Salman Alsubaihi
Guohao Li
AAML
37
2
0
21 Jun 2020
Adversarial Attacks for Multi-view Deep Models
Adversarial Attacks for Multi-view Deep Models
Xuli Sun
Shiliang Sun
AAML
29
0
0
19 Jun 2020
REGroup: Rank-aggregating Ensemble of Generative Classifiers for Robust
  Predictions
REGroup: Rank-aggregating Ensemble of Generative Classifiers for Robust Predictions
Lokender Tiwari
Anish Madan
Saket Anand
Subhashis Banerjee
AAML
35
1
0
18 Jun 2020
OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives
  Training
OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training
Eran Segalis
Eran Galili
69
17
0
17 Jun 2020
Classifier-independent Lower-Bounds for Adversarial Robustness
Classifier-independent Lower-Bounds for Adversarial Robustness
Elvis Dohmatob
33
1
0
17 Jun 2020
AdvMind: Inferring Adversary Intent of Black-Box Attacks
AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
MLAUAAML
64
30
0
16 Jun 2020
Robust Federated Learning: The Case of Affine Distribution Shifts
Robust Federated Learning: The Case of Affine Distribution Shifts
Amirhossein Reisizadeh
Farzan Farnia
Ramtin Pedarsani
Ali Jadbabaie
FedMLOOD
98
167
0
16 Jun 2020
Total Deep Variation: A Stable Regularizer for Inverse Problems
Total Deep Variation: A Stable Regularizer for Inverse Problems
Erich Kobler
Alexander Effland
K. Kunisch
Thomas Pock
MedIm
82
19
0
15 Jun 2020
On the Loss Landscape of Adversarial Training: Identifying Challenges
  and How to Overcome Them
On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them
Chen Liu
Mathieu Salzmann
Tao R. Lin
Ryota Tomioka
Sabine Süsstrunk
AAML
134
82
0
15 Jun 2020
The Pitfalls of Simplicity Bias in Neural Networks
The Pitfalls of Simplicity Bias in Neural Networks
Harshay Shah
Kaustav Tamuly
Aditi Raghunathan
Prateek Jain
Praneeth Netrapalli
AAML
76
364
0
13 Jun 2020
Targeted Adversarial Perturbations for Monocular Depth Prediction
Targeted Adversarial Perturbations for Monocular Depth Prediction
A. Wong
Safa Cicek
Stefano Soatto
AAMLMDE
62
45
0
12 Jun 2020
Defending against GAN-based Deepfake Attacks via Transformation-aware
  Adversarial Faces
Defending against GAN-based Deepfake Attacks via Transformation-aware Adversarial Faces
Chaofei Yang
Lei Ding
Yiran Chen
H. Li
AAML
78
46
0
12 Jun 2020
Towards Robust Pattern Recognition: A Review
Towards Robust Pattern Recognition: A Review
Xu-Yao Zhang
Cheng-Lin Liu
C. Suen
OODHAI
69
110
0
12 Jun 2020
Previous
123...151617...242526
Next