ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations
v1v2v3 (latest)

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,270 papers shown
Title
NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video
  Compression
NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression
Jung-Woo Chang
Nojan Sheybani
Shehzeen Samarah Hussain
Mojan Javaheripi
Seira Hidano
F. Koushanfar
AAML
64
1
0
04 Apr 2023
Fooling Polarization-based Vision using Locally Controllable Polarizing
  Projection
Fooling Polarization-based Vision using Locally Controllable Polarizing Projection
Zhuoxiao Li
Zhihang Zhong
S. Nobuhara
Ko Nishino
Yinqiang Zheng
AAML
91
1
0
31 Mar 2023
Adversarial Attack and Defense for Medical Image Analysis: Methods and
  Applications
Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Junhao Dong
Junxi Chen
Xiaohua Xie
Jianhuang Lai
Hechang Chen
AAMLMedIm
129
19
0
24 Mar 2023
AdaptGuard: Defending Against Universal Attacks for Model Adaptation
AdaptGuard: Defending Against Universal Attacks for Model Adaptation
Lijun Sheng
Jian Liang
Ran He
Zilei Wang
Tien-Ping Tan
AAML
117
5
0
19 Mar 2023
Adversarial Counterfactual Visual Explanations
Adversarial Counterfactual Visual Explanations
Guillaume Jeanneret
Loïc Simon
F. Jurie
DiffM
102
29
0
17 Mar 2023
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
  Contemporary Survey
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Yulong Wang
Tong Sun
Shenghong Li
Xinnan Yuan
W. Ni
Ekram Hossain
H. Vincent Poor
AAML
107
18
0
11 Mar 2023
Do we need entire training data for adversarial training?
Do we need entire training data for adversarial training?
Vipul Gupta
Apurva Narayan
AAML
70
1
0
10 Mar 2023
Accurate Real-time Polyp Detection in Videos from Concatenation of
  Latent Features Extracted from Consecutive Frames
Accurate Real-time Polyp Detection in Videos from Concatenation of Latent Features Extracted from Consecutive Frames
H. Qadir
Younghak Shin
Jacob Bergsland
I. Balasingham
MedIm
72
3
0
10 Mar 2023
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional
  Gradient Estimation
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional Gradient Estimation
Geunhyeok Yu
Minwoo Jeon
Hyoseok Hwang
AAML
80
1
0
09 Mar 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the
  Generation of Adversarial Examples
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
Jinwei Wang
Hao Wu
Haihua Wang
Jiawei Zhang
X. Luo
Bin Ma
AAML
55
0
0
08 Mar 2023
Consistent Valid Physically-Realizable Adversarial Attack against
  Crowd-flow Prediction Models
Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models
Hassan Ali
M. A. Butt
F. Filali
Ala I. Al-Fuqaha
Junaid Qadir
AAML
61
2
0
05 Mar 2023
The Double-Edged Sword of Implicit Bias: Generalization vs. Robustness
  in ReLU Networks
The Double-Edged Sword of Implicit Bias: Generalization vs. Robustness in ReLU Networks
Spencer Frei
Gal Vardi
Peter L. Bartlett
Nathan Srebro
83
17
0
02 Mar 2023
Feature Extraction Matters More: Universal Deepfake Disruption through
  Attacking Ensemble Feature Extractors
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors
Long Tang
Dengpan Ye
Zhenhao Lu
Yunming Zhang
Shengshan Hu
Yue Xu
Chuanxi Chen
AAML
86
9
0
01 Mar 2023
Harnessing the Speed and Accuracy of Machine Learning to Advance
  Cybersecurity
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity
Khatoon Mohammed
AAML
109
10
0
24 Feb 2023
Detecting software vulnerabilities using Language Models
Detecting software vulnerabilities using Language Models
Marwan Omar
55
11
0
23 Feb 2023
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
59
2
0
21 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
112
23
0
19 Feb 2023
RobustNLP: A Technique to Defend NLP Models Against Backdoor Attacks
RobustNLP: A Technique to Defend NLP Models Against Backdoor Attacks
Marwan Omar
SILMAAML
101
0
0
18 Feb 2023
Masking and Mixing Adversarial Training
Masking and Mixing Adversarial Training
Hiroki Adachi
Tsubasa Hirakawa
Takayoshi Yamashita
H. Fujiyoshi
Yasunori Ishii
Kazuki Kozuka
AAML
21
1
0
16 Feb 2023
Semantic Image Segmentation: Two Decades of Research
Semantic Image Segmentation: Two Decades of Research
G. Csurka
Riccardo Volpi
Boris Chidlovskii
3DV
94
53
0
13 Feb 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAMLMLAU
85
107
0
07 Feb 2023
Hyperbolic Contrastive Learning
Hyperbolic Contrastive Learning
Yun Yue
Fangzhou Lin
Kazunori D Yamada
Ziming Zhang
SSL
133
21
0
02 Feb 2023
Learning PDE Solution Operator for Continuous Modeling of Time-Series
Learning PDE Solution Operator for Continuous Modeling of Time-Series
Yesom Park
Jaemoo Choi
Changyeon Yoon
Changhoon Song
Myung-joo Kang
AI4TSAI4CE
43
3
0
02 Feb 2023
Universal Soldier: Using Universal Adversarial Perturbations for
  Detecting Backdoor Attacks
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks
Xiaoyun Xu
Oguzhan Ersoy
S. Picek
AAML
70
2
0
01 Feb 2023
Effectiveness of Moving Target Defenses for Adversarial Attacks in
  ML-based Malware Detection
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
60
2
0
01 Feb 2023
Fourier Sensitivity and Regularization of Computer Vision Models
Fourier Sensitivity and Regularization of Computer Vision Models
K. Krishnamachari
See-Kiong Ng
Chuan-Sheng Foo
OOD
55
2
0
31 Jan 2023
Deep networks for system identification: a Survey
Deep networks for system identification: a Survey
G. Pillonetto
Aleksandr Aravkin
Daniel Gedon
L. Ljung
Antônio H. Ribeiro
Thomas B. Schon
OOD
105
45
0
30 Jan 2023
Lateralized Learning for Multi-Class Visual Classification Tasks
Lateralized Learning for Multi-Class Visual Classification Tasks
Abubakar Siddique
Will N. Browne
Gina M. Grimshaw
39
2
0
30 Jan 2023
On the Adversarial Robustness of Camera-based 3D Object Detection
On the Adversarial Robustness of Camera-based 3D Object Detection
Shaoyuan Xie
Zichao Li
Zeyu Wang
Cihang Xie
AAML
86
20
0
25 Jan 2023
A Study on FGSM Adversarial Training for Neural Retrieval
A Study on FGSM Adversarial Training for Neural Retrieval
Simon Lupart
Stéphane Clinchant
AAML
87
7
0
25 Jan 2023
Practical Adversarial Attacks Against AI-Driven Power Allocation in a
  Distributed MIMO Network
Practical Adversarial Attacks Against AI-Driven Power Allocation in a Distributed MIMO Network
Ömer Faruk Tuna
Fehmí Emre Kadan
Leyli Karaçay
AAML
58
6
0
23 Jan 2023
Provable Unrestricted Adversarial Training without Compromise with
  Generalizability
Provable Unrestricted Adversarial Training without Compromise with Generalizability
Lili Zhang
Ning Yang
Yanchao Sun
Philip S. Yu
AAML
84
2
0
22 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based
  Systems: A Survey and Taxonomy
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
58
4
0
18 Jan 2023
Uncertainty Estimation based on Geometric Separation
Uncertainty Estimation based on Geometric Separation
Gabriella Chouraqui
L. Cohen
Gil Einziger
Liel Leman
62
0
0
11 Jan 2023
AdvBiom: Adversarial Attacks on Biometric Matchers
AdvBiom: Adversarial Attacks on Biometric Matchers
Debayan Deb
Vishesh Mistry
Rahul Parthe
AAMLCVBM
72
3
0
10 Jan 2023
Adversarial training with informed data selection
Adversarial training with informed data selection
Marcele O. K. Mendonça
Javier Maroto
P. Frossard
P. Diniz
AAML
55
4
0
07 Jan 2023
Silent Killer: A Stealthy, Clean-Label, Black-Box Backdoor Attack
Silent Killer: A Stealthy, Clean-Label, Black-Box Backdoor Attack
Tzvi Lederer
Gallil Maimon
Lior Rokach
AAML
41
2
0
05 Jan 2023
GUAP: Graph Universal Attack Through Adversarial Patching
GUAP: Graph Universal Attack Through Adversarial Patching
Xiao Zang
Jie Chen
Bo Yuan
AAML
64
4
0
04 Jan 2023
Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus
  on Videos
Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus on Videos
Xingxing Wei
Songping Wang
Huanqian Yan
AAML
107
20
0
03 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
102
28
0
01 Jan 2023
TextGrad: Advancing Robustness Evaluation in NLP by Gradient-Driven
  Optimization
TextGrad: Advancing Robustness Evaluation in NLP by Gradient-Driven Optimization
Bairu Hou
Jinghan Jia
Yihua Zhang
Guanhua Zhang
Yang Zhang
Sijia Liu
Shiyu Chang
SILMAAML
63
24
0
19 Dec 2022
On the Connection between Invariant Learning and Adversarial Training
  for Out-of-Distribution Generalization
On the Connection between Invariant Learning and Adversarial Training for Out-of-Distribution Generalization
Shiji Xin
Yifei Wang
Jingtong Su
Yisen Wang
OOD
92
7
0
18 Dec 2022
Adversarial Attacks and Defences for Skin Cancer Classification
Adversarial Attacks and Defences for Skin Cancer Classification
Vinay Jogani
J. Purohit
Ishaan Shivhare
Samina Attari
S. Shrawne
AAMLMedIm
57
2
0
13 Dec 2022
A Survey on Reinforcement Learning Security with Application to
  Autonomous Driving
A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Ambra Demontis
Maura Pintor
Christian Scano
Kathrin Grosse
Hsiao-Ying Lin
Chengfang Fang
Battista Biggio
Fabio Roli
AAML
73
4
0
12 Dec 2022
Carpet-bombing patch: attacking a deep network without usual
  requirements
Carpet-bombing patch: attacking a deep network without usual requirements
Pol Labarbarie
Adrien Chan-Hon-Tong
Stéphane Herbin
Milad Leyli-Abadi
AAML
56
1
0
12 Dec 2022
REAP: A Large-Scale Realistic Adversarial Patch Benchmark
REAP: A Large-Scale Realistic Adversarial Patch Benchmark
Nabeel Hingun
Chawin Sitawarin
Jerry Li
David Wagner
AAML
97
15
0
12 Dec 2022
PKDGA: A Partial Knowledge-based Domain Generation Algorithm for Botnets
PKDGA: A Partial Knowledge-based Domain Generation Algorithm for Botnets
Lihai Nie
Xiaoyang Shan
Laiping Zhao
Keqiu Li
64
5
0
08 Dec 2022
veriFIRE: Verifying an Industrial, Learning-Based Wildfire Detection
  System
veriFIRE: Verifying an Industrial, Learning-Based Wildfire Detection System
Guy Amir
Ziv Freund
Guy Katz
Elad Mandelbaum
Idan Refaeli
104
13
0
06 Dec 2022
Probabilistic Verification of ReLU Neural Networks via Characteristic
  Functions
Probabilistic Verification of ReLU Neural Networks via Characteristic Functions
Joshua Pilipovsky
Vignesh Sivaramakrishnan
Meeko Oishi
Panagiotis Tsiotras
81
5
0
03 Dec 2022
Improving Training and Inference of Face Recognition Models via Random
  Temperature Scaling
Improving Training and Inference of Face Recognition Models via Random Temperature Scaling
Lei Shang
Mou-Yue Huang
Wuxuan Shi
Yuchen Liu
Yang Liu
Fei Wang
Baigui Sun
Xuansong Xie
Yu Qiao
UQCV
81
9
0
02 Dec 2022
Previous
123...567...242526
Next