ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations
v1v2v3 (latest)

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,270 papers shown
Title
SparseFool: a few pixels make a big difference
SparseFool: a few pixels make a big difference
Apostolos Modas
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
AAML
72
200
0
06 Nov 2018
One Bit Matters: Understanding Adversarial Examples as the Abuse of
  Redundancy
One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Jingkang Wang
R. Jia
Gerald Friedland
Yangqiu Song
C. Spanos
AAML
40
4
0
23 Oct 2018
Security Matters: A Survey on Adversarial Machine Learning
Security Matters: A Survey on Adversarial Machine Learning
Guofu Li
Pengjia Zhu
Jin Li
Zhemin Yang
Ning Cao
Zhiyi Chen
AAML
90
25
0
16 Oct 2018
Analyzing the Noise Robustness of Deep Neural Networks
Analyzing the Noise Robustness of Deep Neural Networks
Mengchen Liu
Shixia Liu
Hang Su
Kelei Cao
Jun Zhu
AAML
70
7
0
09 Oct 2018
The Adversarial Attack and Detection under the Fisher Information Metric
The Adversarial Attack and Detection under the Fisher Information Metric
Chenxiao Zhao
P. T. Fletcher
Mixue Yu
Chaomin Shen
Guixu Zhang
Yaxin Peng
AAML
76
47
0
09 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
74
67
0
30 Sep 2018
Adversarial Defense via Data Dependent Activation Function and Total
  Variation Minimization
Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization
Bao Wang
A. Lin
Weizhi Zhu
Penghang Yin
Andrea L. Bertozzi
Stanley J. Osher
AAML
41
20
0
23 Sep 2018
Adversarial Recommendation: Attack of the Learned Fake Users
Adversarial Recommendation: Attack of the Learned Fake Users
Konstantina Christakopoulou
A. Banerjee
AAML
47
12
0
21 Sep 2018
Playing the Game of Universal Adversarial Perturbations
Playing the Game of Universal Adversarial Perturbations
Julien Perolat
Mateusz Malinowski
Bilal Piot
Olivier Pietquin
AAML
69
25
0
20 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors
  via Imperceptible Background Patches
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAMLObjD
78
31
0
16 Sep 2018
Robust Adversarial Perturbation on Deep Proposal-based Models
Robust Adversarial Perturbation on Deep Proposal-based Models
Yuezun Li
Dan Tian
Ming-Ching Chang
Xiao Bian
Siwei Lyu
AAML
72
106
0
16 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
57
234
0
13 Sep 2018
A Less Biased Evaluation of Out-of-distribution Sample Detectors
A Less Biased Evaluation of Out-of-distribution Sample Detectors
Alireza Shafaei
Mark Schmidt
James J. Little
OODD
129
58
0
13 Sep 2018
On the Structural Sensitivity of Deep Convolutional Networks to the
  Directions of Fourier Basis Functions
On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions
Yusuke Tsuzuku
Issei Sato
AAML
82
62
0
11 Sep 2018
Why Do Adversarial Attacks Transfer? Explaining Transferability of
  Evasion and Poisoning Attacks
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
SILMAAML
64
11
0
08 Sep 2018
Query Attack via Opposite-Direction Feature:Towards Robust Image
  Retrieval
Query Attack via Opposite-Direction Feature:Towards Robust Image Retrieval
Zhedong Zheng
Liang Zheng
Yi Yang
Zhilan Hu
AAML
75
24
0
07 Sep 2018
Adversarial Reprogramming of Text Classification Neural Networks
Adversarial Reprogramming of Text Classification Neural Networks
Paarth Neekhara
Shehzeen Samarah Hussain
Shlomo Dubnov
F. Koushanfar
AAMLSILM
98
9
0
06 Sep 2018
Bridging machine learning and cryptography in defence against
  adversarial attacks
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Svyatoslav Voloshynovskiy
AAML
57
22
0
05 Sep 2018
Backdoor Embedding in Convolutional Neural Network Models via Invisible
  Perturbation
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
C. Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
SILM
100
317
0
30 Aug 2018
Targeted Nonlinear Adversarial Perturbations in Images and Videos
Targeted Nonlinear Adversarial Perturbations in Images and Videos
R. Rey-de-Castro
H. Rabitz
AAML
81
10
0
27 Aug 2018
Generalized Capsule Networks with Trainable Routing Procedure
Generalized Capsule Networks with Trainable Routing Procedure
Zhenhua Chen
David J. Crandall
3DPCMedIm
65
31
0
27 Aug 2018
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Meysam Sadeghi
Erik G. Larsson
AAML
58
261
0
23 Aug 2018
Are You Tampering With My Data?
Are You Tampering With My Data?
Michele Alberti
Vinaychandran Pondenkandath
Marcel Würsch
Manuel Bouillon
Mathias Seuret
Rolf Ingold
Marcus Liwicki
AAML
107
19
0
21 Aug 2018
zoNNscan : a boundary-entropy index for zone inspection of neural models
zoNNscan : a boundary-entropy index for zone inspection of neural models
Adel Jaouen
Erwan Le Merrer
UQCV
62
3
0
21 Aug 2018
Reinforcement Learning for Autonomous Defence in Software-Defined
  Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Yi Han
Benjamin I. P. Rubinstein
Tamas Abraham
T. Alpcan
O. Vel
S. Erfani
David Hubczenko
C. Leckie
Paul Montague
AAML
55
69
0
17 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
44
1
0
16 Aug 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
89
291
0
16 Aug 2018
Adversarial Personalized Ranking for Recommendation
Adversarial Personalized Ranking for Recommendation
Xiangnan He
Zhankui He
Xiaoyu Du
Tat-Seng Chua
116
398
0
12 Aug 2018
Out of the Black Box: Properties of deep neural networks and their
  applications
Out of the Black Box: Properties of deep neural networks and their applications
Nizar Ouarti
D. Carmona
FAttAAML
28
3
0
10 Aug 2018
VerIDeep: Verifying Integrity of Deep Neural Networks through
  Sensitive-Sample Fingerprinting
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Zecheng He
Tianwei Zhang
R. Lee
FedMLAAMLMLAU
62
19
0
09 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
84
13
0
08 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
69
24
0
06 Aug 2018
On Lipschitz Bounds of General Convolutional Neural Networks
On Lipschitz Bounds of General Convolutional Neural Networks
Dongmian Zou
R. Balan
Maneesh Kumar Singh
70
55
0
04 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class
  Impressions
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
83
85
0
03 Aug 2018
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILMMIACV
145
79
0
31 Jul 2018
Contrastive Video Representation Learning via Adversarial Perturbations
Contrastive Video Representation Learning via Adversarial Perturbations
Jue Wang
A. Cherian
21
1
0
24 Jul 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based
  Approach
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
112
348
0
12 Jul 2018
With Friends Like These, Who Needs Adversaries?
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Philip Torr
AAML
116
70
0
11 Jul 2018
Attack and defence in cellular decision-making: lessons from machine
  learning
Attack and defence in cellular decision-making: lessons from machine learning
Thomas J. Rademaker
Emmanuel Bengio
P. Franccois
AAML
49
4
0
10 Jul 2018
A Game-Based Approximate Verification of Deep Neural Networks with
  Provable Guarantees
A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees
Min Wu
Matthew Wicker
Wenjie Ruan
Xiaowei Huang
Marta Kwiatkowska
AAML
91
111
0
10 Jul 2018
Adversarial Robustness Toolbox v1.0.0
Adversarial Robustness Toolbox v1.0.0
Maria-Irina Nicolae
M. Sinn
Minh-Ngoc Tran
Beat Buesser
Ambrish Rawat
...
Nathalie Baracaldo
Bryant Chen
Heiko Ludwig
Ian Molloy
Ben Edwards
AAMLVLM
91
462
0
03 Jul 2018
Adversarial Perturbations Against Real-Time Video Classification Systems
Adversarial Perturbations Against Real-Time Video Classification Systems
Shasha Li
Ajaya Neupane
S. Paul
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
A. Swami
AAML
93
121
0
02 Jul 2018
Adversarial Reprogramming of Neural Networks
Adversarial Reprogramming of Neural Networks
Gamaleldin F. Elsayed
Ian Goodfellow
Jascha Narain Sohl-Dickstein
OODAAML
55
183
0
28 Jun 2018
Gradient Similarity: An Explainable Approach to Detect Adversarial
  Attacks against Deep Learning
Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
J. Dhaliwal
S. Shintre
AAML
49
15
0
27 Jun 2018
Gradient Adversarial Training of Neural Networks
Gradient Adversarial Training of Neural Networks
Ayan Sinha
Zhao Chen
Vijay Badrinarayanan
Andrew Rabinovich
AAML
63
33
0
21 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
73
7
0
19 Jun 2018
On Machine Learning and Structure for Mobile Robots
On Machine Learning and Structure for Mobile Robots
Markus Wulfmeier
39
6
0
15 Jun 2018
Hardware Trojan Attacks on Neural Networks
Hardware Trojan Attacks on Neural Networks
Joseph Clements
Yingjie Lao
AAML
78
89
0
14 Jun 2018
Overfitting or perfect fitting? Risk bounds for classification and
  regression rules that interpolate
Overfitting or perfect fitting? Risk bounds for classification and regression rules that interpolate
M. Belkin
Daniel J. Hsu
P. Mitra
AI4CE
164
259
0
13 Jun 2018
Previous
123...2223242526
Next