ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.01236
  4. Cited By
Adversarial Machine Learning at Scale
v1v2 (latest)

Adversarial Machine Learning at Scale

4 November 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Machine Learning at Scale"

50 / 1,610 papers shown
Title
Machine Learning in Access Control: A Taxonomy and Survey
Machine Learning in Access Control: A Taxonomy and Survey
M. N. Nobi
Maanak Gupta
Lopamudra Praharaj
Mahmoud Abdelsalam
R. Krishnan
Ravi Sandhu
OOD
39
6
0
04 Jul 2022
Eliciting and Learning with Soft Labels from Every Annotator
Eliciting and Learning with Soft Labels from Every Annotator
Katherine M. Collins
Umang Bhatt
Adrian Weller
88
47
0
02 Jul 2022
Defending Multimodal Fusion Models against Single-Source Adversaries
Defending Multimodal Fusion Models against Single-Source Adversaries
Karren D. Yang
Wan-Yi Lin
M. Barman
Filipe Condessa
Zico Kolter
AAML
65
32
0
25 Jun 2022
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail
  Problems
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
Wen-ming Hou
Qianqian Xu
Zhiyong Yang
Shilong Bao
Yuan He
Qingming Huang
AAML
82
6
0
24 Jun 2022
BERT Rankers are Brittle: a Study using Adversarial Document
  Perturbations
BERT Rankers are Brittle: a Study using Adversarial Document Perturbations
Yumeng Wang
Lijun Lyu
Avishek Anand
AAML
34
22
0
23 Jun 2022
Existence and Minimax Theorems for Adversarial Surrogate Risks in Binary
  Classification
Existence and Minimax Theorems for Adversarial Surrogate Risks in Binary Classification
Natalie Frank
Jonathan Niles-Weed
AAML
109
15
0
18 Jun 2022
Catastrophic overfitting can be induced with discriminative non-robust
  features
Catastrophic overfitting can be induced with discriminative non-robust features
Guillermo Ortiz-Jiménez
Pau de Jorge
Amartya Sanyal
Adel Bibi
P. Dokania
P. Frossard
Grégory Rogez
Philip Torr
AAML
61
3
0
16 Jun 2022
Analysis and Extensions of Adversarial Training for Video Classification
Analysis and Extensions of Adversarial Training for Video Classification
K. A. Kinfu
René Vidal
AAML
88
13
0
16 Jun 2022
Queried Unlabeled Data Improves and Robustifies Class-Incremental
  Learning
Queried Unlabeled Data Improves and Robustifies Class-Incremental Learning
Tianlong Chen
Sijia Liu
Shiyu Chang
Lisa Amini
Zhangyang Wang
CLL
89
4
0
15 Jun 2022
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by
  Out-of-Distribution Detection
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Abderrahmen Amich
Ata Kaboudi
Birhanu Eshete
AAMLOODD
32
2
0
15 Jun 2022
Proximal Splitting Adversarial Attacks for Semantic Segmentation
Proximal Splitting Adversarial Attacks for Semantic Segmentation
Jérôme Rony
J. Pesquet
Ismail Ben Ayed
AAML
68
23
0
14 Jun 2022
Downlink Power Allocation in Massive MIMO via Deep Learning: Adversarial
  Attacks and Training
Downlink Power Allocation in Massive MIMO via Deep Learning: Adversarial Attacks and Training
B. Manoj
Meysam Sadeghi
Erik G. Larsson
AAML
64
11
0
14 Jun 2022
LIFT: Language-Interfaced Fine-Tuning for Non-Language Machine Learning
  Tasks
LIFT: Language-Interfaced Fine-Tuning for Non-Language Machine Learning Tasks
Tuan Dinh
Yuchen Zeng
Ruisu Zhang
Ziqian Lin
Michael Gira
Shashank Rajput
Jy-yong Sohn
Dimitris Papailiopoulos
Kangwook Lee
LMTD
178
139
0
14 Jun 2022
An Efficient Method for Sample Adversarial Perturbations against
  Nonlinear Support Vector Machines
An Efficient Method for Sample Adversarial Perturbations against Nonlinear Support Vector Machines
Wen Su
Qingna Li
AAML
35
0
0
12 Jun 2022
Defending Adversarial Examples by Negative Correlation Ensemble
Defending Adversarial Examples by Negative Correlation Ensemble
Wenjian Luo
Hongwei Zhang
Linghao Kong
Zhijian Chen
Jiaheng Zhang
AAML
32
1
0
11 Jun 2022
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Shehzeen Samarah Hussain
Todd P. Huster
Chris Mesterharm
Paarth Neekhara
Kevin R. An
Malhar Jere
Harshvardhan Digvijay Sikka
F. Koushanfar
AAML
92
6
0
09 Jun 2022
Data-Efficient Double-Win Lottery Tickets from Robust Pre-training
Data-Efficient Double-Win Lottery Tickets from Robust Pre-training
Tianlong Chen
Zhenyu Zhang
Sijia Liu
Yang Zhang
Shiyu Chang
Zhangyang Wang
AAML
79
8
0
09 Jun 2022
Adversarial Noises Are Linearly Separable for (Nearly) Random Neural
  Networks
Adversarial Noises Are Linearly Separable for (Nearly) Random Neural Networks
Huishuai Zhang
Da Yu
Yiping Lu
Di He
AAML
107
1
0
09 Jun 2022
LADDER: Latent Boundary-guided Adversarial Training
LADDER: Latent Boundary-guided Adversarial Training
Xiaowei Zhou
Ivor W. Tsang
Jie Yin
AAML
60
7
0
08 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
102
19
0
07 Jun 2022
Federated Adversarial Training with Transformers
Federated Adversarial Training with Transformers
Ahmed Aldahdooh
W. Hamidouche
Olivier Déforges
FedMLViT
83
2
0
05 Jun 2022
Gradient Obfuscation Checklist Test Gives a False Sense of Security
Gradient Obfuscation Checklist Test Gives a False Sense of Security
Nikola Popovic
D. Paudel
Thomas Probst
Luc Van Gool
AAML
81
6
0
03 Jun 2022
On the Generalization of Wasserstein Robust Federated Learning
On the Generalization of Wasserstein Robust Federated Learning
Tung Nguyen
Tuan Dung Nguyen
Long Tan Le
Canh T. Dinh
N. H. Tran
OODFedML
92
6
0
03 Jun 2022
Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Amrith Rajagopal Setlur
Benjamin Eysenbach
Virginia Smith
Sergey Levine
79
19
0
03 Jun 2022
Adaptive Adversarial Training to Improve Adversarial Robustness of DNNs
  for Medical Image Segmentation and Detection
Adaptive Adversarial Training to Improve Adversarial Robustness of DNNs for Medical Image Segmentation and Detection
Linhai Ma
Liang Liang
OOD
86
6
0
02 Jun 2022
Suggestive Annotation of Brain MR Images with Gradient-guided Sampling
Suggestive Annotation of Brain MR Images with Gradient-guided Sampling
Chengliang Dai
Shuo Wang
Yuanhan Mo
Elsa D. Angelini
Yike Guo
Wenjia Bai
DiffMMedIm
126
10
0
02 Jun 2022
On the reversibility of adversarial attacks
On the reversibility of adversarial attacks
C. Li
Ricardo Sánchez-Matilla
Ali Shahin Shamsabadi
Riccardo Mazzon
Andrea Cavallaro
AAML
50
2
0
01 Jun 2022
FETA: Fairness Enforced Verifying, Training, and Predicting Algorithms
  for Neural Networks
FETA: Fairness Enforced Verifying, Training, and Predicting Algorithms for Neural Networks
Kiarash Mohammadi
Aishwarya Sivaraman
G. Farnadi
107
5
0
01 Jun 2022
The robust way to stack and bag: the local Lipschitz way
The robust way to stack and bag: the local Lipschitz way
Thulasi Tholeti
Sheetal Kalyani
AAML
47
5
0
01 Jun 2022
What Knowledge Gets Distilled in Knowledge Distillation?
What Knowledge Gets Distilled in Knowledge Distillation?
Utkarsh Ojha
Yuheng Li
Anirudh Sundara Rajan
Yingyu Liang
Yong Jae Lee
FedML
85
21
0
31 May 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
151
5
0
30 May 2022
Why Adversarial Training of ReLU Networks Is Difficult?
Why Adversarial Training of ReLU Networks Is Difficult?
Xu Cheng
Hao Zhang
Yue Xin
Wen Shen
Jie Ren
Quanshi Zhang
AAML
57
3
0
30 May 2022
CHALLENGER: Training with Attribution Maps
CHALLENGER: Training with Attribution Maps
Christian Tomani
Zorah Lähner
27
1
0
30 May 2022
CalFAT: Calibrated Federated Adversarial Training with Label Skewness
CalFAT: Calibrated Federated Adversarial Training with Label Skewness
Chen Chen
Yuchen Liu
Xingjun Ma
Lingjuan Lyu
FedML
247
34
0
30 May 2022
Superclass Adversarial Attack
Superclass Adversarial Attack
Soichiro Kumano
Hiroshi Kera
T. Yamasaki
AAML
72
1
0
29 May 2022
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial
  Training
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
Kento Hasegawa
Seira Hidano
Kohei Nozawa
S. Kiyomoto
N. Togawa
41
25
0
27 May 2022
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Tianlong Chen
Zhenyu Zhang
Yihua Zhang
Shiyu Chang
Sijia Liu
Zhangyang Wang
AAML
80
25
0
24 May 2022
Squeeze Training for Adversarial Robustness
Squeeze Training for Adversarial Robustness
Qizhang Li
Yiwen Guo
W. Zuo
Hao Chen
OOD
105
9
0
23 May 2022
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Gradient Concealment: Free Lunch for Defending Adversarial Attacks
Sen Pei
Jiaxi Sun
Xiaopeng Zhang
Gaofeng Meng
AAML
67
0
0
21 May 2022
Robust Sensible Adversarial Learning of Deep Neural Networks for Image
  Classification
Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification
Jungeum Kim
Tianlin Li
OODAAML
33
3
0
20 May 2022
Attacking and Defending Deep Reinforcement Learning Policies
Attacking and Defending Deep Reinforcement Learning Policies
Chao Wang
AAML
60
2
0
16 May 2022
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial
  Attacks
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks
Siddhartha Datta
AAML
106
5
0
15 May 2022
Exploiting the Relationship Between Kendall's Rank Correlation and
  Cosine Similarity for Attribution Protection
Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Fan Wang
A. Kong
179
10
0
15 May 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
67
56
0
12 May 2022
Using Frequency Attention to Make Adversarial Patch Powerful Against
  Person Detector
Using Frequency Attention to Make Adversarial Patch Powerful Against Person Detector
Xiaochun Lei
Chang Lu
Zetao Jiang
Zhaoting Gong
Xiang Cai
Linjun Lu
AAML
54
5
0
10 May 2022
Btech thesis report on adversarial attack detection and purification of
  adverserially attacked images
Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Dvij Kalaria
AAML
24
1
0
09 May 2022
Subverting Fair Image Search with Generative Adversarial Perturbations
Subverting Fair Image Search with Generative Adversarial Perturbations
A. Ghosh
Matthew Jagielski
Chris L. Wilson
89
7
0
05 May 2022
Adversarial Plannning
Adversarial Plannning
Valentin Vie
Ryan Sheatsley
Sophia Beyda
S. Shringarputale
Kevin S. Chan
Trent Jaeger
Patrick McDaniel
AAML
33
0
0
01 May 2022
Adversarial Fine-tune with Dynamically Regulated Adversary
Adversarial Fine-tune with Dynamically Regulated Adversary
Peng-Fei Hou
Ming Zhou
Jie Han
Petr Musílek
Xingyu Li
AAML
58
3
0
28 Apr 2022
Uncertainty-Aware Prediction of Battery Energy Consumption for Hybrid
  Electric Vehicles
Uncertainty-Aware Prediction of Battery Energy Consumption for Hybrid Electric Vehicles
Jihed Khiari
Cristina Olaverri-Monreal
56
2
0
27 Apr 2022
Previous
123...91011...313233
Next