Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1610.08401
Cited By
Universal adversarial perturbations
26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Universal adversarial perturbations"
50 / 1,267 papers shown
Title
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
26
5
0
14 May 2022
A Study of the Attention Abnormality in Trojaned BERTs
Weimin Lyu
Songzhu Zheng
Teng Ma
Chao Chen
54
56
0
13 May 2022
The Different Faces of AI Ethics Across the World: A Principle-Implementation Gap Analysis
L. Tidjon
Foutse Khomh
22
7
0
12 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
24
7
0
05 May 2022
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
24
27
0
30 Apr 2022
GRIT: General Robust Image Task Benchmark
Tanmay Gupta
Ryan Marten
Aniruddha Kembhavi
Derek Hoiem
VLM
OOD
ObjD
19
31
0
28 Apr 2022
Defending Person Detection Against Adversarial Patch Attack by using Universal Defensive Frame
Youngjoon Yu
Hong Joo Lee
Hakmin Lee
Yong Man Ro
AAML
26
10
0
27 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICV
AAML
21
45
0
26 Apr 2022
VITA: A Multi-Source Vicinal Transfer Augmentation Method for Out-of-Distribution Generalization
Minghui Chen
Cheng Wen
Feng Zheng
Fengxiang He
Ling Shao
OODD
19
3
0
25 Apr 2022
Riemannian Hamiltonian methods for min-max optimization on manifolds
Andi Han
Bamdev Mishra
Pratik Jawanpuria
Pawan Kumar
Junbin Gao
40
17
0
25 Apr 2022
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV
Anum Talpur
M. Gurusamy
AAML
30
0
0
23 Apr 2022
GUARD: Graph Universal Adversarial Defense
Jintang Li
Jie Liao
Ruofan Wu
Liang Chen
Zibin Zheng
Jiawang Dan
Changhua Meng
Weiqiang Wang
AAML
28
8
0
20 Apr 2022
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
23
5
0
20 Apr 2022
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Kenneth T. Co
David Martínez-Rego
Zhongyuan Hau
Emil C. Lupu
AAML
32
4
0
19 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
31
2
0
18 Apr 2022
Residue-Based Natural Language Adversarial Attack Detection
Vyas Raina
Mark Gales
AAML
35
11
0
17 Apr 2022
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Xinqiao Zhang
Huili Chen
Ke Huang
F. Koushanfar
AAML
41
1
0
08 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
35
19
0
07 Apr 2022
Optimization Models and Interpretations for Three Types of Adversarial Perturbations against Support Vector Machines
Wen Su
Qingna Li
Chunfeng Cui
AAML
20
1
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
45
5
0
06 Apr 2022
Aligning Silhouette Topology for Self-Adaptive 3D Human Pose Recovery
M. Rakesh
Jogendra Nath Kundu
Varun Jampani
R. Venkatesh Babu
3DH
23
10
0
04 Apr 2022
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
14
0
0
03 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
45
8
0
02 Apr 2022
Investigating Top-
k
k
k
White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
38
43
0
30 Mar 2022
Origins of Low-dimensional Adversarial Perturbations
Elvis Dohmatob
Chuan Guo
Morgane Goibert
AAML
46
4
0
25 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
25
4
0
25 Mar 2022
A Perturbation-Constrained Adversarial Attack for Evaluating the Robustness of Optical Flow
Jenny Schmalfuss
Philipp Scholze
Andrés Bruhn
AAML
32
19
0
24 Mar 2022
On Adversarial Robustness of Large-scale Audio Visual Learning
Juncheng Billy Li
Shuhui Qu
Xinjian Li
Po-Yao (Bernie) Huang
Florian Metze
AAML
20
7
0
23 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
25
0
16 Mar 2022
Defending From Physically-Realizable Adversarial Attacks Through Internal Over-Activation Analysis
Giulio Rossolini
F. Nesti
Fabio Brau
Alessandro Biondi
Giorgio Buttazzo
AAML
27
8
0
14 Mar 2022
Efficient universal shuffle attack for visual object tracking
Siao Liu
Zhaoyu Chen
Wei Li
Jiwei Zhu
Jiafeng Wang
Wenqiang Zhang
Zhongxue Gan
AAML
22
32
0
14 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
39
1
0
04 Mar 2022
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Changhong Fu
Sihang Li
Xinnan Yuan
Junjie Ye
Ziang Cao
Fangqiang Ding
AAML
27
20
0
03 Mar 2022
Detecting Adversarial Perturbations in Multi-Task Perception
Marvin Klingner
V. Kumar
S. Yogamani
Andreas Bär
Tim Fingscheidt
AAML
37
15
0
02 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
31
2
0
28 Feb 2022
Fourier-Based Augmentations for Improved Robustness and Uncertainty Calibration
Ryan Soklaski
Michael Yee
Theodoros Tsiligkaridis
AAML
22
14
0
24 Feb 2022
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Spyridon Mouselinos
Henryk Michalewski
Mateusz Malinowski
26
3
0
24 Feb 2022
Towards User-Centered Metrics for Trustworthy AI in Immersive Cyberspace
Pengyuan Zhou
Benjamin Finley
Lik-Hang Lee
Yong Liao
Haiyong Xie
Pan Hui
19
0
0
22 Feb 2022
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
30
5
0
22 Feb 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
25
11
0
21 Feb 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
25
37
0
21 Feb 2022
Real-time Over-the-air Adversarial Perturbations for Digital Communications using Deep Neural Networks
R. Sandler
Peter K. Relich
Cloud Cho
Sean Holloway
AAML
8
4
0
20 Feb 2022
Developing Imperceptible Adversarial Patches to Camouflage Military Assets From Computer Vision Enabled Technologies
Christopher Wise
Jo Plested
AAML
15
7
0
17 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
36
66
0
17 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
26
6
0
15 Feb 2022
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks
Q. Hu
Daizong Liu
Wei Hu
AAML
3DPC
33
21
0
15 Feb 2022
Holistic Adversarial Robustness of Deep Learning Models
Pin-Yu Chen
Sijia Liu
AAML
54
16
0
15 Feb 2022
Adversarial Attacks and Defense Methods for Power Quality Recognition
Jiwei Tian
Buhong Wang
Jing Li
Zhen Wang
Mete Ozay
AAML
28
0
0
11 Feb 2022
Gradient Methods Provably Converge to Non-Robust Networks
Gal Vardi
Gilad Yehudai
Ohad Shamir
35
27
0
09 Feb 2022
Backdoor Defense via Decoupling the Training Process
Kunzhe Huang
Yiming Li
Baoyuan Wu
Zhan Qin
Kui Ren
AAML
FedML
29
187
0
05 Feb 2022
Previous
1
2
3
...
8
9
10
...
24
25
26
Next