Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1610.08401
Cited By
v1
v2
v3 (latest)
Universal adversarial perturbations
26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Universal adversarial perturbations"
50 / 1,270 papers shown
Title
Verifying Learning-Based Robotic Navigation Systems
Guy Amir
Davide Corsi
Raz Yerushalmi
Luca Marzari
D. Harel
Alessandro Farinelli
Guy Katz
162
37
0
26 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
65
0
0
21 May 2022
On Trace of PGD-Like Adversarial Attacks
Mo Zhou
Vishal M. Patel
AAML
75
4
0
19 May 2022
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
66
5
0
14 May 2022
A Study of the Attention Abnormality in Trojaned BERTs
Weimin Lyu
Songzhu Zheng
Teng Ma
Chao Chen
86
59
0
13 May 2022
The Different Faces of AI Ethics Across the World: A Principle-Implementation Gap Analysis
L. Tidjon
Foutse Khomh
41
8
0
12 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
89
7
0
05 May 2022
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
60
29
0
30 Apr 2022
GRIT: General Robust Image Task Benchmark
Tanmay Gupta
Ryan Marten
Aniruddha Kembhavi
Derek Hoiem
VLM
OOD
ObjD
75
33
0
28 Apr 2022
Defending Person Detection Against Adversarial Patch Attack by using Universal Defensive Frame
Youngjoon Yu
Hong Joo Lee
Hakmin Lee
Yong Man Ro
AAML
44
11
0
27 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICV
AAML
67
49
0
26 Apr 2022
VITA: A Multi-Source Vicinal Transfer Augmentation Method for Out-of-Distribution Generalization
Minghui Chen
Cheng Wen
Feng Zheng
Fengxiang He
Ling Shao
OODD
46
5
0
25 Apr 2022
Riemannian Hamiltonian methods for min-max optimization on manifolds
Andi Han
Bamdev Mishra
Pratik Jawanpuria
Pawan Kumar
Junbin Gao
94
17
0
25 Apr 2022
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV
Anum Talpur
M. Gurusamy
AAML
113
0
0
23 Apr 2022
GUARD: Graph Universal Adversarial Defense
Jintang Li
Jie Liao
Ruofan Wu
Liang Chen
Zibin Zheng
Jiawang Dan
Changhua Meng
Weiqiang Wang
AAML
76
8
0
20 Apr 2022
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
79
5
0
20 Apr 2022
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Kenneth T. Co
David Martínez-Rego
Zhongyuan Hau
Emil C. Lupu
AAML
36
5
0
19 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
44
2
0
18 Apr 2022
Residue-Based Natural Language Adversarial Attack Detection
Vyas Raina
Mark Gales
AAML
72
12
0
17 Apr 2022
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Xinqiao Zhang
Huili Chen
Ke Huang
F. Koushanfar
AAML
76
1
0
08 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Optimization Models and Interpretations for Three Types of Adversarial Perturbations against Support Vector Machines
Wen Su
Qingna Li
Chunfeng Cui
AAML
48
1
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
79
5
0
06 Apr 2022
Aligning Silhouette Topology for Self-Adaptive 3D Human Pose Recovery
M. Rakesh
Jogendra Nath Kundu
Varun Jampani
R. Venkatesh Babu
3DH
62
10
0
04 Apr 2022
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
26
0
0
03 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
93
9
0
02 Apr 2022
Investigating Top-
k
k
k
White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
85
43
0
30 Mar 2022
Origins of Low-dimensional Adversarial Perturbations
Elvis Dohmatob
Chuan Guo
Morgane Goibert
AAML
74
4
0
25 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
112
5
0
25 Mar 2022
A Perturbation-Constrained Adversarial Attack for Evaluating the Robustness of Optical Flow
Jenny Schmalfuss
Philipp Scholze
Andrés Bruhn
AAML
81
19
0
24 Mar 2022
On Adversarial Robustness of Large-scale Audio Visual Learning
Juncheng Billy Li
Shuhui Qu
Xinjian Li
Po-Yao (Bernie) Huang
Florian Metze
AAML
47
7
0
23 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
141
25
0
16 Mar 2022
Defending From Physically-Realizable Adversarial Attacks Through Internal Over-Activation Analysis
Giulio Rossolini
F. Nesti
Fabio Brau
Alessandro Biondi
Giorgio Buttazzo
AAML
61
10
0
14 Mar 2022
Efficient universal shuffle attack for visual object tracking
Siao Liu
Zhaoyu Chen
Wei Li
Jiwei Zhu
Jiafeng Wang
Wenqiang Zhang
Zhongxue Gan
AAML
59
34
0
14 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
107
1
0
04 Mar 2022
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Changhong Fu
Sihang Li
Xinnan Yuan
Junjie Ye
Ziang Cao
Fangqiang Ding
AAML
83
20
0
03 Mar 2022
Detecting Adversarial Perturbations in Multi-Task Perception
Marvin Klingner
V. Kumar
S. Yogamani
Andreas Bär
Tim Fingscheidt
AAML
74
15
0
02 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
48
2
0
28 Feb 2022
Fourier-Based Augmentations for Improved Robustness and Uncertainty Calibration
Ryan Soklaski
Michael Yee
Theodoros Tsiligkaridis
AAML
128
16
0
24 Feb 2022
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Spyridon Mouselinos
Henryk Michalewski
Mateusz Malinowski
69
3
0
24 Feb 2022
Towards User-Centered Metrics for Trustworthy AI in Immersive Cyberspace
Pengyuan Zhou
Benjamin Finley
Lik-Hang Lee
Yong Liao
Haiyong Xie
Pan Hui
31
0
0
22 Feb 2022
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
57
5
0
22 Feb 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
90
11
0
21 Feb 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
92
37
0
21 Feb 2022
Real-time Over-the-air Adversarial Perturbations for Digital Communications using Deep Neural Networks
R. Sandler
Peter K. Relich
Cloud Cho
Sean Holloway
AAML
36
5
0
20 Feb 2022
Developing Imperceptible Adversarial Patches to Camouflage Military Assets From Computer Vision Enabled Technologies
Christopher Wise
Jo Plested
AAML
65
7
0
17 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
117
68
0
17 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
72
7
0
15 Feb 2022
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks
Q. Hu
Daizong Liu
Wei Hu
AAML
3DPC
151
23
0
15 Feb 2022
Previous
1
2
3
...
8
9
10
...
24
25
26
Next