ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXivPDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,266 papers shown
Title
The Adversarial Attack and Detection under the Fisher Information Metric
The Adversarial Attack and Detection under the Fisher Information Metric
Chenxiao Zhao
P. T. Fletcher
Mixue Yu
Chaomin Shen
Guixu Zhang
Yaxin Peng
AAML
26
47
0
09 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILM
AAML
33
49
0
02 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
22
67
0
30 Sep 2018
Adversarial Defense via Data Dependent Activation Function and Total
  Variation Minimization
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Bao Wang
A. Lin
Weizhi Zhu
Penghang Yin
Andrea L. Bertozzi
Stanley J. Osher
AAML
39
21
0
23 Sep 2018
Adversarial Recommendation: Attack of the Learned Fake Users
Adversarial Recommendation: Attack of the Learned Fake Users
Konstantina Christakopoulou
A. Banerjee
AAML
16
12
0
21 Sep 2018
Playing the Game of Universal Adversarial Perturbations
Playing the Game of Universal Adversarial Perturbations
Julien Perolat
Mateusz Malinowski
Bilal Piot
Olivier Pietquin
AAML
13
24
0
20 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors
  via Imperceptible Background Patches
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAML
ObjD
25
31
0
16 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
14
105
0
16 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
17
233
0
13 Sep 2018
A Less Biased Evaluation of Out-of-distribution Sample Detectors
A Less Biased Evaluation of Out-of-distribution Sample Detectors
Alireza Shafaei
Mark Schmidt
James J. Little
OODD
35
58
0
13 Sep 2018
On the Structural Sensitivity of Deep Convolutional Networks to the
  Directions of Fourier Basis Functions
On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions
Yusuke Tsuzuku
Issei Sato
AAML
24
62
0
11 Sep 2018
Why Do Adversarial Attacks Transfer? Explaining Transferability of
  Evasion and Poisoning Attacks
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
SILM
AAML
19
11
0
08 Sep 2018
Query Attack via Opposite-Direction Feature:Towards Robust Image
  Retrieval
Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval
Zhedong Zheng
Liang Zheng
Yi Yang
Zhilan Hu
AAML
20
24
0
07 Sep 2018
Adversarial Reprogramming of Text Classification Neural Networks
Adversarial Reprogramming of Text Classification Neural Networks
Paarth Neekhara
Shehzeen Samarah Hussain
Shlomo Dubnov
F. Koushanfar
AAML
SILM
29
9
0
06 Sep 2018
Bridging machine learning and cryptography in defence against
  adversarial attacks
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Slava Voloshynovskiy
AAML
15
22
0
05 Sep 2018
Backdoor Embedding in Convolutional Neural Network Models via Invisible
  Perturbation
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
C. Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
SILM
34
311
0
30 Aug 2018
Targeted Nonlinear Adversarial Perturbations in Images and Videos
Targeted Nonlinear Adversarial Perturbations in Images and Videos
R. Rey-de-Castro
H. Rabitz
AAML
19
10
0
27 Aug 2018
Generalized Capsule Networks with Trainable Routing Procedure
Generalized Capsule Networks with Trainable Routing Procedure
Zhenhua Chen
David J. Crandall
3DPC
MedIm
13
31
0
27 Aug 2018
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Meysam Sadeghi
Erik G. Larsson
AAML
24
255
0
23 Aug 2018
Are You Tampering With My Data?
Are You Tampering With My Data?
Michele Alberti
Vinaychandran Pondenkandath
Marcel Würsch
Manuel Bouillon
Mathias Seuret
Rolf Ingold
Marcus Liwicki
AAML
37
19
0
21 Aug 2018
zoNNscan : a boundary-entropy index for zone inspection of neural models
zoNNscan : a boundary-entropy index for zone inspection of neural models
Adel Jaouen
Erwan Le Merrer
UQCV
20
3
0
21 Aug 2018
Reinforcement Learning for Autonomous Defence in Software-Defined
  Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Yi Han
Benjamin I. P. Rubinstein
Tamas Abraham
T. Alpcan
O. Vel
S. Erfani
David Hubczenko
C. Leckie
Paul Montague
AAML
22
68
0
17 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
17
1
0
16 Aug 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
33
287
0
16 Aug 2018
Adversarial Personalized Ranking for Recommendation
Adversarial Personalized Ranking for Recommendation
Xiangnan He
Zhankui He
Xiaoyu Du
Tat-Seng Chua
32
395
0
12 Aug 2018
Out of the Black Box: Properties of deep neural networks and their
  applications
Out of the Black Box: Properties of deep neural networks and their applications
Nizar Ouarti
D. Carmona
FAtt
AAML
14
3
0
10 Aug 2018
VerIDeep: Verifying Integrity of Deep Neural Networks through
  Sensitive-Sample Fingerprinting
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Zecheng He
Tianwei Zhang
R. Lee
FedML
AAML
MLAU
22
18
0
09 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
39
13
0
08 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-man Cheung
C.-C. Jay Kuo
20
24
0
06 Aug 2018
On Lipschitz Bounds of General Convolutional Neural Networks
On Lipschitz Bounds of General Convolutional Neural Networks
Dongmian Zou
R. Balan
Maneesh Kumar Singh
24
54
0
04 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class
  Impressions
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
13
85
0
03 Aug 2018
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILM
MIACV
48
77
0
31 Jul 2018
Contrastive Video Representation Learning via Adversarial Perturbations
Contrastive Video Representation Learning via Adversarial Perturbations
Jue Wang
A. Cherian
19
1
0
24 Jul 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based
  Approach
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
43
346
0
12 Jul 2018
With Friends Like These, Who Needs Adversaries?
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Philip Torr
AAML
21
70
0
11 Jul 2018
Attack and defence in cellular decision-making: lessons from machine
  learning
Attack and defence in cellular decision-making: lessons from machine learning
Thomas J. Rademaker
Emmanuel Bengio
P. Franccois
AAML
28
4
0
10 Jul 2018
A Game-Based Approximate Verification of Deep Neural Networks with
  Provable Guarantees
A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees
Min Wu
Matthew Wicker
Wenjie Ruan
Xiaowei Huang
Marta Kwiatkowska
AAML
19
111
0
10 Jul 2018
Adversarial Robustness Toolbox v1.0.0
Adversarial Robustness Toolbox v1.0.0
Maria-Irina Nicolae
M. Sinn
Minh-Ngoc Tran
Beat Buesser
Ambrish Rawat
...
Nathalie Baracaldo
Bryant Chen
Heiko Ludwig
Ian Molloy
Ben Edwards
AAML
VLM
25
453
0
03 Jul 2018
Adversarial Perturbations Against Real-Time Video Classification Systems
Adversarial Perturbations Against Real-Time Video Classification Systems
Shasha Li
Ajaya Neupane
S. Paul
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
A. Swami
AAML
29
118
0
02 Jul 2018
Adversarial Reprogramming of Neural Networks
Adversarial Reprogramming of Neural Networks
Gamaleldin F. Elsayed
Ian Goodfellow
Jascha Narain Sohl-Dickstein
OOD
AAML
16
178
0
28 Jun 2018
Gradient Similarity: An Explainable Approach to Detect Adversarial
  Attacks against Deep Learning
Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
J. Dhaliwal
S. Shintre
AAML
31
15
0
27 Jun 2018
Gradient Adversarial Training of Neural Networks
Gradient Adversarial Training of Neural Networks
Ayan Sinha
Zhao Chen
Vijay Badrinarayanan
Andrew Rabinovich
AAML
30
33
0
21 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
20
7
0
19 Jun 2018
On Machine Learning and Structure for Mobile Robots
On Machine Learning and Structure for Mobile Robots
Markus Wulfmeier
27
6
0
15 Jun 2018
Hardware Trojan Attacks on Neural Networks
Hardware Trojan Attacks on Neural Networks
Joseph Clements
Yingjie Lao
AAML
21
89
0
14 Jun 2018
Overfitting or perfect fitting? Risk bounds for classification and
  regression rules that interpolate
Overfitting or perfect fitting? Risk bounds for classification and regression rules that interpolate
M. Belkin
Daniel J. Hsu
P. Mitra
AI4CE
39
256
0
13 Jun 2018
PAC-learning in the presence of evasion adversaries
PAC-learning in the presence of evasion adversaries
Daniel Cullina
A. Bhagoji
Prateek Mittal
AAML
35
53
0
05 Jun 2018
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks
Jan Svoboda
Jonathan Masci
Federico Monti
M. Bronstein
Leonidas J. Guibas
AAML
GNN
33
41
0
31 May 2018
Explaining Explanations: An Overview of Interpretability of Machine
  Learning
Explaining Explanations: An Overview of Interpretability of Machine Learning
Leilani H. Gilpin
David Bau
Ben Z. Yuan
Ayesha Bajwa
Michael A. Specter
Lalana Kagal
XAI
40
1,842
0
31 May 2018
Sequential Attacks on Agents for Long-Term Adversarial Goals
Sequential Attacks on Agents for Long-Term Adversarial Goals
E. Tretschk
Seong Joon Oh
Mario Fritz
OnRL
329
47
1
31 May 2018
Previous
123...2223242526
Next