ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1610.08401
  4. Cited By
Universal adversarial perturbations

Universal adversarial perturbations

26 October 2016
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
    AAML
ArXivPDFHTML

Papers citing "Universal adversarial perturbations"

50 / 1,267 papers shown
Title
Verifying Neural Networks Against Backdoor Attacks
Verifying Neural Networks Against Backdoor Attacks
Long H. Pham
Jun Sun
AAML
26
5
0
14 May 2022
A Study of the Attention Abnormality in Trojaned BERTs
A Study of the Attention Abnormality in Trojaned BERTs
Weimin Lyu
Songzhu Zheng
Teng Ma
Chao Chen
54
56
0
13 May 2022
The Different Faces of AI Ethics Across the World: A
  Principle-Implementation Gap Analysis
The Different Faces of AI Ethics Across the World: A Principle-Implementation Gap Analysis
L. Tidjon
Foutse Khomh
22
7
0
12 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
24
7
0
05 May 2022
Software Testing for Machine Learning
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
24
27
0
30 Apr 2022
GRIT: General Robust Image Task Benchmark
GRIT: General Robust Image Task Benchmark
Tanmay Gupta
Ryan Marten
Aniruddha Kembhavi
Derek Hoiem
VLM
OOD
ObjD
19
31
0
28 Apr 2022
Defending Person Detection Against Adversarial Patch Attack by using
  Universal Defensive Frame
Defending Person Detection Against Adversarial Patch Attack by using Universal Defensive Frame
Youngjoon Yu
Hong Joo Lee
Hakmin Lee
Yong Man Ro
AAML
26
10
0
27 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICV
AAML
21
45
0
26 Apr 2022
VITA: A Multi-Source Vicinal Transfer Augmentation Method for
  Out-of-Distribution Generalization
VITA: A Multi-Source Vicinal Transfer Augmentation Method for Out-of-Distribution Generalization
Minghui Chen
Cheng Wen
Feng Zheng
Fengxiang He
Ling Shao
OODD
19
3
0
25 Apr 2022
Riemannian Hamiltonian methods for min-max optimization on manifolds
Riemannian Hamiltonian methods for min-max optimization on manifolds
Andi Han
Bamdev Mishra
Pratik Jawanpuria
Pawan Kumar
Junbin Gao
40
17
0
25 Apr 2022
GFCL: A GRU-based Federated Continual Learning Framework against Data
  Poisoning Attacks in IoV
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV
Anum Talpur
M. Gurusamy
AAML
30
0
0
23 Apr 2022
GUARD: Graph Universal Adversarial Defense
GUARD: Graph Universal Adversarial Defense
Jintang Li
Jie Liao
Ruofan Wu
Liang Chen
Zibin Zheng
Jiawang Dan
Changhua Meng
Weiqiang Wang
AAML
28
8
0
20 Apr 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
23
5
0
20 Apr 2022
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
Kenneth T. Co
David Martínez-Rego
Zhongyuan Hau
Emil C. Lupu
AAML
32
4
0
19 Apr 2022
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile
  Edge
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge
Qun Song
Zhenyu Yan
W. Luo
Rui Tan
AAML
31
2
0
18 Apr 2022
Residue-Based Natural Language Adversarial Attack Detection
Residue-Based Natural Language Adversarial Attack Detection
Vyas Raina
Mark Gales
AAML
35
11
0
17 Apr 2022
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Xinqiao Zhang
Huili Chen
Ke Huang
F. Koushanfar
AAML
41
1
0
08 Apr 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real
  Computer Vision Settings
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao
Chong Fu
Sai-gang Wang
S. Ji
Xuhong Zhang
Zhenguang Liu
Junfeng Zhou
A. Liu
R. Beyah
Ting Wang
AAML
35
19
0
07 Apr 2022
Optimization Models and Interpretations for Three Types of Adversarial
  Perturbations against Support Vector Machines
Optimization Models and Interpretations for Three Types of Adversarial Perturbations against Support Vector Machines
Wen Su
Qingna Li
Chunfeng Cui
AAML
20
1
0
07 Apr 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
45
5
0
06 Apr 2022
Aligning Silhouette Topology for Self-Adaptive 3D Human Pose Recovery
Aligning Silhouette Topology for Self-Adaptive 3D Human Pose Recovery
M. Rakesh
Jogendra Nath Kundu
Varun Jampani
R. Venkatesh Babu
3DH
23
10
0
04 Apr 2022
Adversarially robust segmentation models learn perceptually-aligned
  gradients
Adversarially robust segmentation models learn perceptually-aligned gradients
Pedro Sandoval-Segura
14
0
0
03 Apr 2022
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Adversarial Neon Beam: A Light-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Wen Li
AAML
45
8
0
02 Apr 2022
Investigating Top-$k$ White-Box and Transferable Black-box Attack
Investigating Top-kkk White-Box and Transferable Black-box Attack
Chaoning Zhang
Philipp Benz
Adil Karjauv
Jae-Won Cho
Kang Zhang
In So Kweon
38
43
0
30 Mar 2022
Origins of Low-dimensional Adversarial Perturbations
Origins of Low-dimensional Adversarial Perturbations
Elvis Dohmatob
Chuan Guo
Morgane Goibert
AAML
46
4
0
25 Mar 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
25
4
0
25 Mar 2022
A Perturbation-Constrained Adversarial Attack for Evaluating the
  Robustness of Optical Flow
A Perturbation-Constrained Adversarial Attack for Evaluating the Robustness of Optical Flow
Jenny Schmalfuss
Philipp Scholze
Andrés Bruhn
AAML
32
19
0
24 Mar 2022
On Adversarial Robustness of Large-scale Audio Visual Learning
On Adversarial Robustness of Large-scale Audio Visual Learning
Juncheng Billy Li
Shuhui Qu
Xinjian Li
Po-Yao (Bernie) Huang
Florian Metze
AAML
20
7
0
23 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
25
0
16 Mar 2022
Defending From Physically-Realizable Adversarial Attacks Through
  Internal Over-Activation Analysis
Defending From Physically-Realizable Adversarial Attacks Through Internal Over-Activation Analysis
Giulio Rossolini
F. Nesti
Fabio Brau
Alessandro Biondi
Giorgio Buttazzo
AAML
27
8
0
14 Mar 2022
Efficient universal shuffle attack for visual object tracking
Efficient universal shuffle attack for visual object tracking
Siao Liu
Zhaoyu Chen
Wei Li
Jiwei Zhu
Jiafeng Wang
Wenqiang Zhang
Zhongxue Gan
AAML
22
32
0
14 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal
Nidhi Rastogi
AAML
39
1
0
04 Mar 2022
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Changhong Fu
Sihang Li
Xinnan Yuan
Junjie Ye
Ziang Cao
Fangqiang Ding
AAML
27
20
0
03 Mar 2022
Detecting Adversarial Perturbations in Multi-Task Perception
Detecting Adversarial Perturbations in Multi-Task Perception
Marvin Klingner
V. Kumar
S. Yogamani
Andreas Bär
Tim Fingscheidt
AAML
37
15
0
02 Mar 2022
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial
  Training
Towards Robust Stacked Capsule Autoencoder with Hybrid Adversarial Training
Jiazhu Dai
Siwei Xiong
AAML
31
2
0
28 Feb 2022
Fourier-Based Augmentations for Improved Robustness and Uncertainty
  Calibration
Fourier-Based Augmentations for Improved Robustness and Uncertainty Calibration
Ryan Soklaski
Michael Yee
Theodoros Tsiligkaridis
AAML
22
14
0
24 Feb 2022
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Measuring CLEVRness: Blackbox testing of Visual Reasoning Models
Spyridon Mouselinos
Henryk Michalewski
Mateusz Malinowski
26
3
0
24 Feb 2022
Towards User-Centered Metrics for Trustworthy AI in Immersive Cyberspace
Towards User-Centered Metrics for Trustworthy AI in Immersive Cyberspace
Pengyuan Zhou
Benjamin Finley
Lik-Hang Lee
Yong Liao
Haiyong Xie
Pan Hui
19
0
0
22 Feb 2022
Universal adversarial perturbation for remote sensing images
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
30
5
0
22 Feb 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
25
11
0
21 Feb 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
25
37
0
21 Feb 2022
Real-time Over-the-air Adversarial Perturbations for Digital
  Communications using Deep Neural Networks
Real-time Over-the-air Adversarial Perturbations for Digital Communications using Deep Neural Networks
R. Sandler
Peter K. Relich
Cloud Cho
Sean Holloway
AAML
8
4
0
20 Feb 2022
Developing Imperceptible Adversarial Patches to Camouflage Military
  Assets From Computer Vision Enabled Technologies
Developing Imperceptible Adversarial Patches to Camouflage Military Assets From Computer Vision Enabled Technologies
Christopher Wise
Jo Plested
AAML
15
7
0
17 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
36
66
0
17 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
26
6
0
15 Feb 2022
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks
Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks
Q. Hu
Daizong Liu
Wei Hu
AAML
3DPC
33
21
0
15 Feb 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning Models
Pin-Yu Chen
Sijia Liu
AAML
54
16
0
15 Feb 2022
Adversarial Attacks and Defense Methods for Power Quality Recognition
Adversarial Attacks and Defense Methods for Power Quality Recognition
Jiwei Tian
Buhong Wang
Jing Li
Zhen Wang
Mete Ozay
AAML
28
0
0
11 Feb 2022
Gradient Methods Provably Converge to Non-Robust Networks
Gradient Methods Provably Converge to Non-Robust Networks
Gal Vardi
Gilad Yehudai
Ohad Shamir
35
27
0
09 Feb 2022
Backdoor Defense via Decoupling the Training Process
Backdoor Defense via Decoupling the Training Process
Kunzhe Huang
Yiming Li
Baoyuan Wu
Zhan Qin
Kui Ren
AAML
FedML
29
187
0
05 Feb 2022
Previous
123...8910...242526
Next