ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXivPDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,267 papers shown
Title
Simple Black-box Adversarial Attacks
Simple Black-box Adversarial Attacks
Chuan Guo
Jacob R. Gardner
Yurong You
A. Wilson
Kilian Q. Weinberger
AAML
28
568
0
17 May 2019
Harnessing the Vulnerability of Latent Layers in Adversarially Trained
  Models
Harnessing the Vulnerability of Latent Layers in Adversarially Trained Models
M. Singh
Abhishek Sinha
Nupur Kumari
Harshitha Machiraju
Balaji Krishnamurthy
V. Balasubramanian
AAML
19
61
0
13 May 2019
Moving Target Defense for Deep Visual Sensing against Adversarial
  Examples
Moving Target Defense for Deep Visual Sensing against Adversarial Examples
Qun Song
Zhenyu Yan
Rui Tan
AAML
21
20
0
11 May 2019
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and
  Challenges
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges
Rob Ashmore
R. Calinescu
Colin Paterson
AI4TS
34
116
0
10 May 2019
Universal Adversarial Perturbations for Speech Recognition Systems
Universal Adversarial Perturbations for Speech Recognition Systems
Paarth Neekhara
Shehzeen Samarah Hussain
Prakhar Pandey
Shlomo Dubnov
Julian McAuley
F. Koushanfar
AAML
36
113
0
09 May 2019
ROSA: Robust Salient Object Detection against Adversarial Attacks
ROSA: Robust Salient Object Detection against Adversarial Attacks
Haofeng Li
Guanbin Li
Yizhou Yu
AAML
16
28
0
09 May 2019
Adversarial Examples Are Not Bugs, They Are Features
Adversarial Examples Are Not Bugs, They Are Features
Andrew Ilyas
Shibani Santurkar
Dimitris Tsipras
Logan Engstrom
Brandon Tran
Aleksander Madry
SILM
57
1,810
0
06 May 2019
Better the Devil you Know: An Analysis of Evasion Attacks using
  Out-of-Distribution Adversarial Examples
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Vikash Sehwag
A. Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
M. Chiang
Prateek Mittal
OODD
32
26
0
05 May 2019
NATTACK: Learning the Distributions of Adversarial Examples for an
  Improved Black-Box Attack on Deep Neural Networks
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks
Yandong Li
Lijun Li
Liqiang Wang
Tong Zhang
Boqing Gong
AAML
18
245
0
01 May 2019
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via
  Genetic Algorithm
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm
Jinyin Chen
Mengmeng Su
Shijing Shen
Hui Xiong
Haibin Zheng
AAML
22
67
0
01 May 2019
Physical Adversarial Textures that Fool Visual Object Tracking
Physical Adversarial Textures that Fool Visual Object Tracking
R. Wiyatno
Anqi Xu
AAML
29
73
0
24 Apr 2019
Analytical Moment Regularizer for Gaussian Robust Networks
Analytical Moment Regularizer for Gaussian Robust Networks
Modar Alfadly
Adel Bibi
Guohao Li
AAML
27
4
0
24 Apr 2019
Minimizing Perceived Image Quality Loss Through Adversarial Attack
  Scoping
Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping
K. Khabarlak
L. Koriashkina
AAML
16
1
0
23 Apr 2019
AnonymousNet: Natural Face De-Identification with Measurable Privacy
AnonymousNet: Natural Face De-Identification with Measurable Privacy
Tao Li
Lei Lin
PICV
32
144
0
19 Apr 2019
Fooling automated surveillance cameras: adversarial patches to attack
  person detection
Fooling automated surveillance cameras: adversarial patches to attack person detection
Simen Thys
W. V. Ranst
Toon Goedemé
AAML
52
565
0
18 Apr 2019
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep
  Classifiers
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers
Ameya Joshi
Amitangshu Mukherjee
Soumik Sarkar
Chinmay Hegde
AAML
8
99
0
17 Apr 2019
LiveSketch: Query Perturbations for Guided Sketch-based Visual Search
LiveSketch: Query Perturbations for Guided Sketch-based Visual Search
John Collomosse
Tu Bui
Hailin Jin
22
56
0
14 Apr 2019
Adversarial Learning in Statistical Classification: A Comprehensive
  Review of Defenses Against Attacks
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks
David J. Miller
Zhen Xiang
G. Kesidis
AAML
19
35
0
12 Apr 2019
Generating Minimal Adversarial Perturbations with Integrated Adaptive Gradients
Yatie Xiao
Chi-Man Pun
AAML
GAN
TTA
19
0
0
12 Apr 2019
Evaluating Robustness of Deep Image Super-Resolution against Adversarial
  Attacks
Evaluating Robustness of Deep Image Super-Resolution against Adversarial Attacks
Jun-Ho Choi
Huan Zhang
Jun-Hyuk Kim
Cho-Jui Hsieh
Jong-Seok Lee
AAML
SupR
24
70
0
12 Apr 2019
Black-box Adversarial Attacks on Video Recognition Models
Black-box Adversarial Attacks on Video Recognition Models
Linxi Jiang
Xingjun Ma
Shaoxiang Chen
James Bailey
Yu-Gang Jiang
AAML
MLAU
14
143
0
10 Apr 2019
Towards Safety Verification of Direct Perception Neural Networks
Towards Safety Verification of Direct Perception Neural Networks
Chih-Hong Cheng
Chung-Hao Huang
Thomas Brunner
Vahid Hashemi
11
14
0
09 Apr 2019
Towards Analyzing Semantic Robustness of Deep Neural Networks
Towards Analyzing Semantic Robustness of Deep Neural Networks
Abdullah Hamdi
Guohao Li
AAML
33
17
0
09 Apr 2019
Efficient Decision-based Black-box Adversarial Attacks on Face
  Recognition
Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
Yinpeng Dong
Hang Su
Baoyuan Wu
Zhifeng Li
Wen Liu
Tong Zhang
Jun Zhu
CVBM
AAML
28
405
0
09 Apr 2019
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
N. Benjamin Erichson
Z. Yao
Michael W. Mahoney
AAML
27
21
0
07 Apr 2019
Evading Defenses to Transferable Adversarial Examples by
  Translation-Invariant Attacks
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
SILM
AAML
49
830
0
05 Apr 2019
Minimum Uncertainty Based Detection of Adversaries in Deep Neural
  Networks
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks
Fatemeh Sheikholeslami
Swayambhoo Jain
G. Giannakis
AAML
22
25
0
05 Apr 2019
Regional Homogeneity: Towards Learning Transferable Universal
  Adversarial Perturbations Against Defenses
Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses
Yingwei Li
S. Bai
Cihang Xie
Zhenyu A. Liao
Xiaohui Shen
Alan Yuille
AAML
47
50
0
01 Apr 2019
A Provable Defense for Deep Residual Networks
A Provable Defense for Deep Residual Networks
M. Mirman
Gagandeep Singh
Martin Vechev
27
26
0
29 Mar 2019
IMAE for Noise-Robust Learning: Mean Absolute Error Does Not Treat
  Examples Equally and Gradient Magnitude's Variance Matters
IMAE for Noise-Robust Learning: Mean Absolute Error Does Not Treat Examples Equally and Gradient Magnitude's Variance Matters
Xinshao Wang
Yang Hua
Elyor Kodirov
David Clifton
N. Robertson
NoLa
24
62
0
28 Mar 2019
Addressing Model Vulnerability to Distributional Shifts over Image
  Transformation Sets
Addressing Model Vulnerability to Distributional Shifts over Image Transformation Sets
Riccardo Volpi
Vittorio Murino
39
29
0
28 Mar 2019
Adversarial camera stickers: A physical camera-based attack on deep
  learning systems
Adversarial camera stickers: A physical camera-based attack on deep learning systems
Juncheng Billy Li
Frank R. Schmidt
J. Zico Kolter
AAML
16
164
0
21 Mar 2019
On Certifying Non-uniform Bound against Adversarial Attacks
On Certifying Non-uniform Bound against Adversarial Attacks
Chen Liu
Ryota Tomioka
V. Cevher
AAML
50
19
0
15 Mar 2019
Attribution-driven Causal Analysis for Detection of Adversarial Examples
Attribution-driven Causal Analysis for Detection of Adversarial Examples
Susmit Jha
Sunny Raj
S. Fernandes
Sumit Kumar Jha
S. Jha
Gunjan Verma
B. Jalaeian
A. Swami
AAML
25
17
0
14 Mar 2019
Neural Network Model Extraction Attacks in Edge Devices by Hearing
  Architectural Hints
Neural Network Model Extraction Attacks in Edge Devices by Hearing Architectural Hints
Xing Hu
Ling Liang
Lei Deng
Shuangchen Li
Xinfeng Xie
Yu Ji
Yufei Ding
Chang Liu
T. Sherwood
Yuan Xie
AAML
MLAU
23
36
0
10 Mar 2019
Semantics Preserving Adversarial Learning
Semantics Preserving Adversarial Learning
Ousmane Amadou Dia
Elnaz Barshan
Reza Babanezhad
AAML
GAN
36
2
0
10 Mar 2019
Safety Verification and Robustness Analysis of Neural Networks via
  Quadratic Constraints and Semidefinite Programming
Safety Verification and Robustness Analysis of Neural Networks via Quadratic Constraints and Semidefinite Programming
Mahyar Fazlyab
M. Morari
George J. Pappas
AAML
22
227
0
04 Mar 2019
Evaluating Adversarial Evasion Attacks in the Context of Wireless
  Communications
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Bryse Flowers
R. M. Buehrer
William C. Headley
AAML
40
123
0
01 Mar 2019
Adversarial Reinforcement Learning under Partial Observability in
  Autonomous Computer Network Defence
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence
Yi Han
David Hubczenko
Paul Montague
O. Vel
Tamas Abraham
Benjamin I. P. Rubinstein
C. Leckie
T. Alpcan
S. Erfani
AAML
16
6
0
25 Feb 2019
Physical Adversarial Attacks Against End-to-End Autoencoder
  Communication Systems
Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems
Meysam Sadeghi
Erik G. Larsson
AAML
22
112
0
22 Feb 2019
Graph Adversarial Training: Dynamically Regularizing Based on Graph
  Structure
Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure
Fuli Feng
Xiangnan He
Jie Tang
Tat-Seng Chua
OOD
AAML
34
219
0
20 Feb 2019
Mockingbird: Defending Against Deep-Learning-Based Website
  Fingerprinting Attacks with Adversarial Traces
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
Mohammad Saidur Rahman
Mohsen Imani
Nate Mathews
M. Wright
AAML
14
80
0
18 Feb 2019
On instabilities of deep learning in image reconstruction - Does AI come
  at a cost?
On instabilities of deep learning in image reconstruction - Does AI come at a cost?
Vegard Antun
F. Renna
C. Poon
Ben Adcock
A. Hansen
24
597
0
14 Feb 2019
Adversarial Samples on Android Malware Detection Systems for IoT Systems
Adversarial Samples on Android Malware Detection Systems for IoT Systems
Xiaolei Liu
Xiaojiang Du
Xiaosong Zhang
Qingxin Zhu
Mohsen Guizani
AAML
8
60
0
12 Feb 2019
Towards a Robust Deep Neural Network in Texts: A Survey
Towards a Robust Deep Neural Network in Texts: A Survey
Wenqi Wang
Benxiao Tang
Run Wang
Lina Wang
Aoshuang Ye
AAML
26
39
0
12 Feb 2019
Understanding the One-Pixel Attack: Propagation Maps and Locality
  Analysis
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis
Danilo Vasconcellos Vargas
Jiawei Su
FAtt
AAML
11
36
0
08 Feb 2019
A Comprehensive Overview of Biometric Fusion
A Comprehensive Overview of Biometric Fusion
Maneet Singh
Richa Singh
Arun Ross
18
185
0
08 Feb 2019
Analyzing and Improving Representations with the Soft Nearest Neighbor
  Loss
Analyzing and Improving Representations with the Soft Nearest Neighbor Loss
Nicholas Frosst
Nicolas Papernot
Geoffrey E. Hinton
20
157
0
05 Feb 2019
Theoretical evidence for adversarial robustness through randomization
Theoretical evidence for adversarial robustness through randomization
Rafael Pinot
Laurent Meunier
Alexandre Araujo
H. Kashima
Florian Yger
Cédric Gouy-Pailler
Jamal Atif
AAML
47
82
0
04 Feb 2019
Robustness Certificates Against Adversarial Examples for ReLU Networks
Robustness Certificates Against Adversarial Examples for ReLU Networks
Sahil Singla
S. Feizi
AAML
25
21
0
01 Feb 2019
Previous
123...202122...242526
Next