ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1702.02284
  4. Cited By
Adversarial Attacks on Neural Network Policies

Adversarial Attacks on Neural Network Policies

8 February 2017
Sandy Huang
Nicolas Papernot
Ian Goodfellow
Yan Duan
Pieter Abbeel
    MLAUAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Attacks on Neural Network Policies"

50 / 434 papers shown
Title
Investigating Generalisation in Continuous Deep Reinforcement Learning
Investigating Generalisation in Continuous Deep Reinforcement Learning
Chenyang Zhao
Olivier Sigaud
F. Stulp
Timothy M. Hospedales
OffRL
89
48
0
19 Feb 2019
Obstacle Tower: A Generalization Challenge in Vision, Control, and
  Planning
Obstacle Tower: A Generalization Challenge in Vision, Control, and Planning
Arthur Juliani
Ahmed Khalifa
Vincent-Pierre Berges
Jonathan Harper
Ervin Teng
Hunter Henry
A. Crespi
Julian Togelius
Danny Lange
75
144
0
04 Feb 2019
Augmenting Model Robustness with Transformation-Invariant Attacks
Augmenting Model Robustness with Transformation-Invariant Attacks
Houpu Yao
Zhe Wang
Guangyu Nie
Yassine Mazboudi
Yezhou Yang
Yi Ren
AAMLOOD
31
3
0
31 Jan 2019
Theoretically Principled Trade-off between Robustness and Accuracy
Theoretically Principled Trade-off between Robustness and Accuracy
Hongyang R. Zhang
Yaodong Yu
Jiantao Jiao
Eric Xing
L. Ghaoui
Michael I. Jordan
175
2,566
0
24 Jan 2019
Multi-Label Adversarial Perturbations
Multi-Label Adversarial Perturbations
Qingquan Song
Haifeng Jin
Xiao Huang
Helen Zhou
AAML
63
37
0
02 Jan 2019
A Survey of Safety and Trustworthiness of Deep Neural Networks:
  Verification, Testing, Adversarial Attack and Defence, and Interpretability
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability
Xiaowei Huang
Daniel Kroening
Wenjie Ruan
Marta Kwiatkowska
Youcheng Sun
Emese Thamo
Min Wu
Xinping Yi
AAML
130
51
0
18 Dec 2018
Measuring and Characterizing Generalization in Deep Reinforcement
  Learning
Measuring and Characterizing Generalization in Deep Reinforcement Learning
Sam Witty
Jun Ki Lee
Emma Tosch
Akanksha Atrey
Michael Littman
David D. Jensen
OffRL
68
60
0
07 Dec 2018
Rigorous Agent Evaluation: An Adversarial Approach to Uncover
  Catastrophic Failures
Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Junhui Yin
Jiayan Qiu
Csaba Szepesvári
Siqing Zhang
Avraham Ruderman
Jiyang Xie
Krishnamurthy Dvijotham
Zhanyu Ma
N. Heess
Pushmeet Kohli
AAML
102
82
0
04 Dec 2018
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAMLOOD
276
285
0
03 Dec 2018
Ensemble Bayesian Decision Making with Redundant Deep Perceptual Control
  Policies
Ensemble Bayesian Decision Making with Redundant Deep Perceptual Control Policies
Keuntaek Lee
Ziyi Wang
Bogdan I. Vlahov
Harleen K. Brar
Evangelos A. Theodorou
BDLUQCV
92
29
0
30 Nov 2018
Bilateral Adversarial Training: Towards Fast Training of More Robust
  Models Against Adversarial Attacks
Bilateral Adversarial Training: Towards Fast Training of More Robust Models Against Adversarial Attacks
Jianyu Wang
Haichao Zhang
OODAAML
87
119
0
26 Nov 2018
Strength in Numbers: Trading-off Robustness and Computation via
  Adversarially-Trained Ensembles
Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Edward Grefenstette
Robert Stanforth
Brendan O'Donoghue
J. Uesato
G. Swirszcz
Pushmeet Kohli
AAML
80
18
0
22 Nov 2018
Scalable agent alignment via reward modeling: a research direction
Scalable agent alignment via reward modeling: a research direction
Jan Leike
David M. Krueger
Tom Everitt
Miljan Martic
Vishal Maini
Shane Legg
124
420
0
19 Nov 2018
A Statistical Approach to Assessing Neural Network Robustness
A Statistical Approach to Assessing Neural Network Robustness
Stefan Webb
Tom Rainforth
Yee Whye Teh
M. P. Kumar
AAML
72
83
0
17 Nov 2018
An Optimal Control View of Adversarial Machine Learning
An Optimal Control View of Adversarial Machine Learning
Xiaojin Zhu
AAML
47
25
0
11 Nov 2018
Semidefinite relaxations for certifying robustness to adversarial
  examples
Semidefinite relaxations for certifying robustness to adversarial examples
Aditi Raghunathan
Jacob Steinhardt
Percy Liang
AAML
111
439
0
02 Nov 2018
Adversarial Attacks on Stochastic Bandits
Adversarial Attacks on Stochastic Bandits
Kwang-Sung Jun
Lihong Li
Yuzhe Ma
Xiaojin Zhu
AAML
373
124
0
29 Oct 2018
Towards Robust Deep Neural Networks
Towards Robust Deep Neural Networks
Timothy E. Wang
Jack Gu
D. Mehta
Xiaojun Zhao
Edgar A. Bernal
OOD
90
11
0
27 Oct 2018
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep
  Reinforcement Learning
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep Reinforcement Learning
Vahid Behzadan
Arslan Munir
80
27
0
23 Oct 2018
One Bit Matters: Understanding Adversarial Examples as the Abuse of
  Redundancy
One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Jingkang Wang
R. Jia
Gerald Friedland
Yangqiu Song
C. Spanos
AAML
32
4
0
23 Oct 2018
A Training-based Identification Approach to VIN Adversarial Examples
A Training-based Identification Approach to VIN Adversarial Examples
Yingdi Wang
Wenjia Niu
Tong Chen
Yingxiao Xiang
Jingjing Liu
Gang Li
Jiqiang Liu
AAMLGAN
33
0
0
18 Oct 2018
Security Matters: A Survey on Adversarial Machine Learning
Security Matters: A Survey on Adversarial Machine Learning
Guofu Li
Pengjia Zhu
Jin Li
Zhemin Yang
Ning Cao
Zhiyi Chen
AAML
90
25
0
16 Oct 2018
Deep Reinforcement Learning
Deep Reinforcement Learning
Yuxi Li
VLMOffRL
191
144
0
15 Oct 2018
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert
  Inspection System
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System
Ankit Shah
Arunesh Sinha
R. Ganesan
S. Jajodia
H. Çam
AAML
14
5
0
13 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
Reinforcement Learning with Perturbed Rewards
Reinforcement Learning with Perturbed Rewards
Jingkang Wang
Yang Liu
Yue Liu
NoLa
93
131
0
02 Oct 2018
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep
  Convolutional Networks
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth T. Co
Luis Muñoz-González
Sixte de Maupeou
Emil C. Lupu
AAML
74
67
0
30 Sep 2018
Knowledge-guided Semantic Computing Network
Knowledge-guided Semantic Computing Network
Guangming Shi
Zhongqiang Zhang
Dahua Gao
Xuemei Xie
Yihao Feng
Xinrui Ma
Danhua Liu
39
10
0
29 Sep 2018
Adversarial Reinforcement Learning for Observer Design in Autonomous
  Systems under Cyber Attacks
Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks
Abhishek Gupta
Zhaoyuan Yang
AAML
30
7
0
15 Sep 2018
Towards Better Interpretability in Deep Q-Networks
Towards Better Interpretability in Deep Q-Networks
Raghuram Mandyam Annasamy
Katia Sycara
FAtt
52
59
0
15 Sep 2018
Coordination-driven learning in multi-agent problem spaces
Coordination-driven learning in multi-agent problem spaces
Sean L. Barton
Nicholas R. Waytowich
Derrik E. Asher
26
5
0
13 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
57
234
0
13 Sep 2018
Metamorphic Relation Based Adversarial Attacks on Differentiable Neural
  Computer
Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Alvin Chan
Lei Ma
Felix Juefei Xu
Xiaofei Xie
Yang Liu
Yew-Soon Ong
OODAAML
59
17
0
07 Sep 2018
Reinforcement Learning under Threats
Reinforcement Learning under Threats
Víctor Gallego
Roi Naveiro
D. Insua
AAML
80
26
0
05 Sep 2018
Data Poisoning Attacks against Online Learning
Data Poisoning Attacks against Online Learning
Yizhen Wang
Kamalika Chaudhuri
AAML
76
93
0
27 Aug 2018
Are You Tampering With My Data?
Are You Tampering With My Data?
Michele Alberti
Vinaychandran Pondenkandath
Marcel Würsch
Manuel Bouillon
Mathias Seuret
Rolf Ingold
Marcus Liwicki
AAML
107
19
0
21 Aug 2018
Reinforcement Learning for Autonomous Defence in Software-Defined
  Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Yi Han
Benjamin I. P. Rubinstein
Tamas Abraham
T. Alpcan
O. Vel
S. Erfani
David Hubczenko
C. Leckie
Paul Montague
AAML
55
69
0
17 Aug 2018
Security and Privacy Issues in Deep Learning
Security and Privacy Issues in Deep Learning
Ho Bae
Jaehee Jang
Dahuin Jung
Hyemi Jang
Heonseok Ha
Hyungyu Lee
Sungroh Yoon
SILMMIACV
143
79
0
31 Jul 2018
One-Shot Generation of Near-Optimal Topology through Theory-Driven
  Machine Learning
One-Shot Generation of Near-Optimal Topology through Theory-Driven Machine Learning
Ruijin Cang
Hope Yao
Yi Ren
42
0
0
27 Jul 2018
Recent Advances in Deep Learning: An Overview
Recent Advances in Deep Learning: An Overview
Matiur Rahman Minar
Jibon Naher
VLM
104
117
0
21 Jul 2018
Online Robust Policy Learning in the Presence of Unknown Adversaries
Online Robust Policy Learning in the Presence of Unknown Adversaries
Aaron J. Havens
Zhanhong Jiang
Soumik Sarkar
AAML
115
44
0
16 Jul 2018
Adaptive Adversarial Attack on Scene Text Recognition
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan
Pan He
Xiaolin Li
Dapeng Oliver Wu
AAML
73
23
0
09 Jul 2018
Implicit Generative Modeling of Random Noise during Training for
  Adversarial Robustness
Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness
Priyadarshini Panda
Kaushik Roy
AAML
50
4
0
05 Jul 2018
Adversarial Reprogramming of Neural Networks
Adversarial Reprogramming of Neural Networks
Gamaleldin F. Elsayed
Ian Goodfellow
Jascha Narain Sohl-Dickstein
OODAAML
55
183
0
28 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
73
7
0
19 Jun 2018
PAC-learning in the presence of evasion adversaries
PAC-learning in the presence of evasion adversaries
Daniel Cullina
A. Bhagoji
Prateek Mittal
AAML
90
55
0
05 Jun 2018
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with
  Parameter-Space Noise
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise
Vahid Behzadan
Arslan Munir
AAML
71
21
0
04 Jun 2018
Sequential Attacks on Agents for Long-Term Adversarial Goals
Sequential Attacks on Agents for Long-Term Adversarial Goals
E. Tretschk
Seong Joon Oh
Mario Fritz
OnRL
399
48
1
31 May 2018
Multi-Layered Gradient Boosting Decision Trees
Multi-Layered Gradient Boosting Decision Trees
Ji Feng
Yang Yu
Zhi Zhou
AI4CE
184
120
0
31 May 2018
On Visual Hallmarks of Robustness to Adversarial Malware
On Visual Hallmarks of Robustness to Adversarial Malware
Alex Huang
Abdullah Al-Dujaili
Erik Hemberg
Una-May O’Reilly
AAML
69
7
0
09 May 2018
Previous
123456789
Next