ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1611.01236
  4. Cited By
Adversarial Machine Learning at Scale
v1v2 (latest)

Adversarial Machine Learning at Scale

4 November 2016
Alexey Kurakin
Ian Goodfellow
Samy Bengio
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Machine Learning at Scale"

50 / 1,610 papers shown
Title
Efficient Two-Step Adversarial Defense for Deep Neural Networks
Efficient Two-Step Adversarial Defense for Deep Neural Networks
Ting-Jui Chang
Yukun He
Peng Li
AAML
69
11
0
08 Oct 2018
Combinatorial Attacks on Binarized Neural Networks
Combinatorial Attacks on Binarized Neural Networks
Elias Boutros Khalil
Amrita Gupta
B. Dilkina
AAML
89
40
0
08 Oct 2018
Security Analysis of Deep Neural Networks Operating in the Presence of
  Cache Side-Channel Attacks
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
Sanghyun Hong
Michael Davinroy
Yigitcan Kaya
S. Locke
Ian Rackow
Kevin Kulda
Dana Dachman-Soled
Tudor Dumitras
MIACV
84
90
0
08 Oct 2018
Feature Prioritization and Regularization Improve Standard Accuracy and
  Adversarial Robustness
Feature Prioritization and Regularization Improve Standard Accuracy and Adversarial Robustness
Chihuang Liu
Joseph Jaja
AAML
69
12
0
04 Oct 2018
Improved Generalization Bounds for Adversarially Robust Learning
Improved Generalization Bounds for Adversarially Robust Learning
Idan Attias
A. Kontorovich
Yishay Mansour
82
20
0
04 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
Improving the Generalization of Adversarial Training with Domain
  Adaptation
Improving the Generalization of Adversarial Training with Domain Adaptation
Chuanbiao Song
Kun He
Liwei Wang
John E. Hopcroft
AAMLOOD
112
132
0
01 Oct 2018
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural
  Network
Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Xuanqing Liu
Yao Li
Chongruo Wu
Cho-Jui Hsieh
AAMLOOD
93
171
0
01 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
74
67
0
30 Sep 2018
Training Machine Learning Models by Regularizing their Explanations
Training Machine Learning Models by Regularizing their Explanations
A. Ross
FaML
63
0
0
29 Sep 2018
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
148
684
0
28 Sep 2018
Neural Networks with Structural Resistance to Adversarial Attacks
Neural Networks with Structural Resistance to Adversarial Attacks
Luca de Alfaro
AAML
45
5
0
25 Sep 2018
On The Utility of Conditional Generation Based Mutual Information for
  Characterizing Adversarial Subspaces
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces
Chia-Yi Hsu
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
70
1
0
24 Sep 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial Perturbation
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
86
168
0
24 Sep 2018
Is Ordered Weighted $\ell_1$ Regularized Regression Robust to
  Adversarial Perturbation? A Case Study on OSCAR
Is Ordered Weighted ℓ1\ell_1ℓ1​ Regularized Regression Robust to Adversarial Perturbation? A Case Study on OSCAR
Pin-Yu Chen
B. Vinzamuri
Sijia Liu
AAMLOOD
69
7
0
24 Sep 2018
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural
  Networks against Adversarial Malware Samples
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples
Deqiang Li
Ramesh Baral
Tao Li
Han Wang
Qianmu Li
Shouhuai Xu
AAML
63
21
0
18 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
68
235
0
13 Sep 2018
Layerwise Perturbation-Based Adversarial Training for Hard Drive Health
  Degree Prediction
Layerwise Perturbation-Based Adversarial Training for Hard Drive Health Degree Prediction
Jianguo Zhang
Ji Wang
Lifang He
Zhao Li
Philip S. Yu
74
31
0
11 Sep 2018
On the Structural Sensitivity of Deep Convolutional Networks to the
  Directions of Fourier Basis Functions
On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions
Yusuke Tsuzuku
Issei Sato
AAML
84
62
0
11 Sep 2018
Certified Adversarial Robustness with Additive Noise
Certified Adversarial Robustness with Additive Noise
Bai Li
Changyou Chen
Wenlin Wang
Lawrence Carin
AAML
121
350
0
10 Sep 2018
Structure-Preserving Transformation: Generating Diverse and Transferable
  Adversarial Examples
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples
Dan Peng
Zizhan Zheng
Xiaofeng Zhang
AAML
57
5
0
08 Sep 2018
Bridging machine learning and cryptography in defence against
  adversarial attacks
Bridging machine learning and cryptography in defence against adversarial attacks
O. Taran
Shideh Rezaeifar
Svyatoslav Voloshynovskiy
AAML
57
22
0
05 Sep 2018
Controlling Over-generalization and its Effect on Adversarial Examples
  Generation and Detection
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
74
9
0
21 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
44
1
0
16 Aug 2018
Distributionally Adversarial Attack
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
101
123
0
16 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
84
13
0
08 Aug 2018
Adversarial Vision Challenge
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
79
58
0
06 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
69
24
0
06 Aug 2018
Gray-box Adversarial Training
Gray-box Adversarial Training
S. VivekB.
Konda Reddy Mopuri
R. Venkatesh Babu
AAML
61
35
0
06 Aug 2018
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the
  Robustness of 18 Deep Image Classification Models
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D. Su
Huan Zhang
Hongge Chen
Jinfeng Yi
Pin-Yu Chen
Yupeng Gao
VLM
140
393
0
05 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better
  Interpretability
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
126
162
0
05 Aug 2018
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak
  Processes
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
Mehmet Sinan Inci
T. Eisenbarth
B. Sunar
AAML
64
8
0
03 Aug 2018
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILMMIACV
147
79
0
31 Jul 2018
Symbolic Execution for Deep Neural Networks
Symbolic Execution for Deep Neural Networks
D. Gopinath
Kaiyuan Wang
Mengshi Zhang
C. Păsăreanu
S. Khurshid
AAML
81
54
0
27 Jul 2018
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Andrew Ilyas
Logan Engstrom
Aleksander Madry
MLAUAAML
110
375
0
20 Jul 2018
Harmonic Adversarial Attack Method
Harmonic Adversarial Attack Method
Wen Heng
Shuchang Zhou
Tingting Jiang
AAML
54
6
0
18 Jul 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity
  of A3C Path Finding
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Tong Chen
Wenjia Niu
Yingxiao Xiang
XiaoXuan Bai
Jiqiang Liu
Zhen Han
Gang Li
AAML
62
24
0
18 Jul 2018
Attack and defence in cellular decision-making: lessons from machine
  learning
Attack and defence in cellular decision-making: lessons from machine learning
Thomas J. Rademaker
Emmanuel Bengio
P. Franccois
AAML
51
4
0
10 Jul 2018
Benchmarking Neural Network Robustness to Common Corruptions and Surface
  Variations
Benchmarking Neural Network Robustness to Common Corruptions and Surface Variations
Dan Hendrycks
Thomas G. Dietterich
OOD
126
202
0
04 Jul 2018
Adversarial Robustness Toolbox v1.0.0
Adversarial Robustness Toolbox v1.0.0
Maria-Irina Nicolae
M. Sinn
Minh-Ngoc Tran
Beat Buesser
Ambrish Rawat
...
Nathalie Baracaldo
Bryant Chen
Heiko Ludwig
Ian Molloy
Ben Edwards
AAMLVLM
91
463
0
03 Jul 2018
Adversarial Perturbations Against Real-Time Video Classification Systems
Adversarial Perturbations Against Real-Time Video Classification Systems
Shasha Li
Ajaya Neupane
S. Paul
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
A. Swami
AAML
94
121
0
02 Jul 2018
Adversarial Examples in Deep Learning: Characterization and Divergence
Adversarial Examples in Deep Learning: Characterization and Divergence
Wenqi Wei
Ling Liu
Margaret Loper
Stacey Truex
Lei Yu
Mehmet Emre Gursoy
Yanzhao Wu
AAMLSILM
119
18
0
29 Jun 2018
A New Angle on L2 Regularization
A New Angle on L2 Regularization
T. Tanay
Lewis D. Griffin
LLMSV
50
5
0
28 Jun 2018
Adversarial Reprogramming of Neural Networks
Adversarial Reprogramming of Neural Networks
Gamaleldin F. Elsayed
Ian Goodfellow
Jascha Narain Sohl-Dickstein
OODAAML
55
184
0
28 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
73
7
0
19 Jun 2018
Non-Negative Networks Against Adversarial Attacks
Non-Negative Networks Against Adversarial Attacks
William Fleshman
Edward Raff
Jared Sylvester
Steven Forsyth
Mark McLean
AAML
66
41
0
15 Jun 2018
Copycat CNN: Stealing Knowledge by Persuading Confession with Random
  Non-Labeled Data
Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data
Jacson Rodrigues Correia-Silva
Rodrigo Berriel
C. Badue
Alberto F. de Souza
Thiago Oliveira-Santos
MLAU
88
175
0
14 Jun 2018
Adversarial Meta-Learning
Adversarial Meta-Learning
Chengxiang Yin
Jian Tang
Zhiyuan Xu
Yanzhi Wang
95
42
0
08 Jun 2018
Monge blunts Bayes: Hardness Results for Adversarial Training
Monge blunts Bayes: Hardness Results for Adversarial Training
Zac Cranko
A. Menon
Richard Nock
Cheng Soon Ong
Zhan Shi
Christian J. Walder
AAML
73
17
0
08 Jun 2018
Training Augmentation with Adversarial Examples for Robust Speech
  Recognition
Training Augmentation with Adversarial Examples for Robust Speech Recognition
Sining Sun
Ching-Feng Yeh
Mari Ostendorf
M. Hwang
Lei Xie
AAML
82
63
0
07 Jun 2018
Previous
123...2930313233
Next