ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations
v1v2v3 (latest)

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,270 papers shown
Title
Verifying Learning-Based Robotic Navigation Systems
Verifying Learning-Based Robotic Navigation Systems
Guy Amir
Davide Corsi
Raz Yerushalmi
Luca Marzari
D. Harel
Alessandro Farinelli
Guy Katz
162
37
0
26 May 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
80
34
0
24 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
65
0
0
21 May 2022
On Trace of PGD-Like Adversarial Attacks
On Trace of PGD-Like Adversarial Attacks
Mo Zhou
Vishal M. Patel
AAML
75
4
0
19 May 2022
Verifying Neural Networks Against Backdoor Attacks
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
66
5
0
14 May 2022
A Study of the Attention Abnormality in Trojaned BERTs
A Study of the Attention Abnormality in Trojaned BERTs
Weimin Lyu
Songzhu Zheng
Teng Ma
Chao Chen
86
59
0
13 May 2022
The Different Faces of AI Ethics Across the World: A
  Principle-Implementation Gap Analysis
The Different Faces of AI Ethics Across the World: A Principle-Implementation Gap Analysis
L. Tidjon
Foutse Khomh
41
8
0
12 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
89
7
0
05 May 2022
Software Testing for Machine Learning
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
60
29
0
30 Apr 2022
GRIT: General Robust Image Task Benchmark
GRIT: General Robust Image Task Benchmark
Tanmay Gupta
Ryan Marten
Aniruddha Kembhavi
Derek Hoiem
VLMOODObjD
75
33
0
28 Apr 2022
Defending Person Detection Against Adversarial Patch Attack by using
  Universal Defensive Frame
Defending Person Detection Against Adversarial Patch Attack by using Universal Defensive Frame
Youngjoon Yu
Hong Joo Lee
Hakmin Lee
Yong Man Ro
AAML
44
11
0
27 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICVAAML
67
49
0
26 Apr 2022
VITA: A Multi-Source Vicinal Transfer Augmentation Method for
  Out-of-Distribution Generalization
VITA: A Multi-Source Vicinal Transfer Augmentation Method for Out-of-Distribution Generalization
Minghui Chen
Cheng Wen
Feng Zheng
Fengxiang He
Ling Shao
OODD
46
5
0
25 Apr 2022
Riemannian Hamiltonian methods for min-max optimization on manifolds
Riemannian Hamiltonian methods for min-max optimization on manifolds
Andi Han
Bamdev Mishra
Pratik Jawanpuria
Pawan Kumar
Junbin Gao
94
17
0
25 Apr 2022
GFCL: A GRU-based Federated Continual Learning Framework against Data
  Poisoning Attacks in IoV
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV
Anum Talpur
M. Gurusamy
AAML
113
0
0
23 Apr 2022
GUARD: Graph Universal Adversarial Defense
GUARD: Graph Universal Adversarial Defense
Jintang Li
Jie Liao
Ruofan Wu
Liang Chen
Zibin Zheng
Jiawang Dan
Changhua Meng
Weiqiang Wang
AAML
76
8
0
20 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
79
5
0
20 Apr 2022
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Kenneth T. Co
David Martínez-Rego
Zhongyuan Hau
Emil C. Lupu
AAML
36
5
0
19 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile
  Edge
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
44
2
0
18 Apr 2022
Residue-Based Natural Language Adversarial Attack Detection
Residue-Based Natural Language Adversarial Attack Detection
Vyas Raina
Mark Gales
AAML
72
12
0
17 Apr 2022
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Xinqiao Zhang
Huili Chen
Ke Huang
F. Koushanfar
AAML
76
1
0
08 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
105
19
0
07 Apr 2022
Optimization Models and Interpretations for Three Types of Adversarial
  Perturbations against Support Vector Machines
Optimization Models and Interpretations for Three Types of Adversarial Perturbations against Support Vector Machines
Wen Su
Qingna Li
Chunfeng Cui
AAML
48
1
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
79
5
0
06 Apr 2022
Aligning Silhouette Topology for Self-Adaptive 3D Human Pose Recovery
Aligning Silhouette Topology for Self-Adaptive 3D Human Pose Recovery
M. Rakesh
Jogendra Nath Kundu
Varun Jampani
R. Venkatesh Babu
3DH
62
10
0
04 Apr 2022
Adversarially robust segmentation models learn perceptually-aligned
  gradients
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
26
0
0
03 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
93
9
0
02 Apr 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
85
43
0
30 Mar 2022
Origins of Low-dimensional Adversarial Perturbations
Origins of Low-dimensional Adversarial Perturbations
Elvis Dohmatob
Chuan Guo
Morgane Goibert
AAML
74
4
0
25 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
112
5
0
25 Mar 2022
A Perturbation-Constrained Adversarial Attack for Evaluating the
  Robustness of Optical Flow
A Perturbation-Constrained Adversarial Attack for Evaluating the Robustness of Optical Flow
Jenny Schmalfuss
Philipp Scholze
Andrés Bruhn
AAML
81
19
0
24 Mar 2022
On Adversarial Robustness of Large-scale Audio Visual Learning
On Adversarial Robustness of Large-scale Audio Visual Learning
Juncheng Billy Li
Shuhui Qu
Xinjian Li
Po-Yao (Bernie) Huang
Florian Metze
AAML
47
7
0
23 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAMLMLAU
141
25
0
16 Mar 2022
Defending From Physically-Realizable Adversarial Attacks Through
  Internal Over-Activation Analysis
Defending From Physically-Realizable Adversarial Attacks Through Internal Over-Activation Analysis
Giulio Rossolini
F. Nesti
Fabio Brau
Alessandro Biondi
Giorgio Buttazzo
AAML
61
10
0
14 Mar 2022
Efficient universal shuffle attack for visual object tracking
Efficient universal shuffle attack for visual object tracking
Siao Liu
Zhaoyu Chen
Wei Li
Jiwei Zhu
Jiafeng Wang
Wenqiang Zhang
Zhongxue Gan
AAML
59
34
0
14 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
107
1
0
04 Mar 2022
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Changhong Fu
Sihang Li
Xinnan Yuan
Junjie Ye
Ziang Cao
Fangqiang Ding
AAML
83
20
0
03 Mar 2022
Detecting Adversarial Perturbations in Multi-Task Perception
Detecting Adversarial Perturbations in Multi-Task Perception
Marvin Klingner
V. Kumar
S. Yogamani
Andreas Bär
Tim Fingscheidt
AAML
74
15
0
02 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial
  Training
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
48
2
0
28 Feb 2022
Fourier-Based Augmentations for Improved Robustness and Uncertainty
  Calibration
Fourier-Based Augmentations for Improved Robustness and Uncertainty Calibration
Ryan Soklaski
Michael Yee
Theodoros Tsiligkaridis
AAML
128
16
0
24 Feb 2022
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Spyridon Mouselinos
Henryk Michalewski
Mateusz Malinowski
69
3
0
24 Feb 2022
Towards User-Centered Metrics for Trustworthy AI in Immersive Cyberspace
Towards User-Centered Metrics for Trustworthy AI in Immersive Cyberspace
Pengyuan Zhou
Benjamin Finley
Lik-Hang Lee
Yong Liao
Haiyong Xie
Pan Hui
31
0
0
22 Feb 2022
Universal adversarial perturbation for remote sensing images
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
57
5
0
22 Feb 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
90
11
0
21 Feb 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
92
37
0
21 Feb 2022
Real-time Over-the-air Adversarial Perturbations for Digital
  Communications using Deep Neural Networks
Real-time Over-the-air Adversarial Perturbations for Digital Communications using Deep Neural Networks
R. Sandler
Peter K. Relich
Cloud Cho
Sean Holloway
AAML
36
5
0
20 Feb 2022
Developing Imperceptible Adversarial Patches to Camouflage Military
  Assets From Computer Vision Enabled Technologies
Developing Imperceptible Adversarial Patches to Camouflage Military Assets From Computer Vision Enabled Technologies
Christopher Wise
Jo Plested
AAML
65
7
0
17 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAMLFedML
117
68
0
17 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
72
7
0
15 Feb 2022
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks
Q. Hu
Daizong Liu
Wei Hu
AAML3DPC
151
23
0
15 Feb 2022
Previous
123...8910...242526
Next