ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1706.06083
  4. Cited By
Towards Deep Learning Models Resistant to Adversarial Attacks
v1v2v3v4 (latest)

Towards Deep Learning Models Resistant to Adversarial Attacks

19 June 2017
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
    SILMOOD
ArXiv (abs)PDFHTMLGithub (752★)

Papers citing "Towards Deep Learning Models Resistant to Adversarial Attacks"

50 / 6,612 papers shown
Title
TPN: Transferable Proto-Learning Network towards Few-shot Document-Level
  Relation Extraction
TPN: Transferable Proto-Learning Network towards Few-shot Document-Level Relation Extraction
Yu Zhang
Zhao Kang
ViT
79
1
0
01 Oct 2024
VLMGuard: Defending VLMs against Malicious Prompts via Unlabeled Data
VLMGuard: Defending VLMs against Malicious Prompts via Unlabeled Data
Xuefeng Du
Reshmi Ghosh
Robert Sim
Ahmed Salem
Vitor Carvalho
Emily Lawton
Yixuan Li
Jack W. Stokes
VLMAAML
99
7
0
01 Oct 2024
Lipschitz-Driven Noise Robustness in VQ-AE for High-Frequency Texture Repair in ID-Specific Talking Heads
Lipschitz-Driven Noise Robustness in VQ-AE for High-Frequency Texture Repair in ID-Specific Talking Heads
Jian Yang
Xukun Wang
Wentao Wang
Guoming Li
Qihang Fang
Ruihong Yuan
Tianyang Wang
Jason Zhaoxin Fan
Yeying Jin
Zhaoxin Fan
VGen
156
1
0
01 Oct 2024
SMLE: Safe Machine Learning via Embedded Overapproximation
SMLE: Safe Machine Learning via Embedded Overapproximation
Matteo Francobaldi
Michele Lombardi
AAML
47
0
0
30 Sep 2024
Characterizing Model Robustness via Natural Input Gradients
Characterizing Model Robustness via Natural Input Gradients
Adrian Rodriguez-Munoz
Tongzhou Wang
Antonio Torralba
AAML
87
1
0
30 Sep 2024
Robust LLM safeguarding via refusal feature adversarial training
Robust LLM safeguarding via refusal feature adversarial training
L. Yu
Virginie Do
Karen Hambardzumyan
Nicola Cancedda
AAML
150
19
0
30 Sep 2024
Crafting Distribution Shifts for Validation and Training in Single
  Source Domain Generalization
Crafting Distribution Shifts for Validation and Training in Single Source Domain Generalization
Nikos Efthymiadis
Giorgos Tolias
Ondřej Chum
OOD
88
2
0
29 Sep 2024
Discerning the Chaos: Detecting Adversarial Perturbations while
  Disentangling Intentional from Unintentional Noises
Discerning the Chaos: Detecting Adversarial Perturbations while Disentangling Intentional from Unintentional Noises
Anubhooti Jain
Susim Roy
Kwanit Gupta
Mayank Vatsa
Richa Singh
AAML
85
0
0
29 Sep 2024
MASKDROID: Robust Android Malware Detection with Masked Graph
  Representations
MASKDROID: Robust Android Malware Detection with Masked Graph Representations
Jingnan Zheng
Jiaohao Liu
An Zhang
Jun Zeng
Ziqi Yang
Zhenkai Liang
Tat-Seng Chua
AAML
62
2
0
29 Sep 2024
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of
  Artificial Mental Imagery
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery
Ching-Chun Chang
Kai Gao
Shuying Xu
Anastasia Kordoni
Christopher Leckie
Isao Echizen
65
0
0
29 Sep 2024
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
97
0
0
27 Sep 2024
Entropy, concentration, and learning: a statistical mechanics primer
Entropy, concentration, and learning: a statistical mechanics primer
Akshay Balsubramani
AI4CE
61
1
0
27 Sep 2024
Robust Network Learning via Inverse Scale Variational Sparsification
Robust Network Learning via Inverse Scale Variational Sparsification
Zhiling Zhou
Zirui Liu
Chengming Xu
Yanwei Fu
Xinwei Sun
AAML
111
0
0
27 Sep 2024
Trustworthy Text-to-Image Diffusion Models: A Timely and Focused Survey
Trustworthy Text-to-Image Diffusion Models: A Timely and Focused Survey
Yi Zhang
Zhen Chen
Chih-Hong Cheng
Wenjie Ruan
Xiaowei Huang
Dezong Zhao
David Flynn
Siddartha Khastgir
Xingyu Zhao
MedIm
97
4
0
26 Sep 2024
Perturb, Attend, Detect and Localize (PADL): Robust Proactive Image
  Defense
Perturb, Attend, Detect and Localize (PADL): Robust Proactive Image Defense
Filippo Bartolucci
I. Masi
G. Lisanti
AAML
94
1
0
26 Sep 2024
DarkSAM: Fooling Segment Anything Model to Segment Nothing
DarkSAM: Fooling Segment Anything Model to Segment Nothing
Ziqi Zhou
Yufei Song
Minghui Li
Shengshan Hu
Xianlong Wang
Leo Yu Zhang
Dezhong Yao
Hai Jin
91
12
0
26 Sep 2024
Improving Fast Adversarial Training via Self-Knowledge Guidance
Improving Fast Adversarial Training via Self-Knowledge Guidance
Chengze Jiang
Junkai Wang
Minjing Dong
Jie Gui
Xinli Shi
Yuan Cao
Yuan Yan Tang
James Tin-Yau Kwok
105
1
0
26 Sep 2024
Showing Many Labels in Multi-label Classification Models: An Empirical
  Study of Adversarial Examples
Showing Many Labels in Multi-label Classification Models: An Empirical Study of Adversarial Examples
Yujiang Liu
Wenjian Luo
Zhijian Chen
Muhammad Luqman Naseem
AAML
25
0
0
26 Sep 2024
Verified Relative Safety Margins for Neural Network Twins
Verified Relative Safety Margins for Neural Network Twins
Anahita Baninajjar
Kamran Hosseini
Ahmed Rezine
A. Aminifar
AAML
60
1
0
25 Sep 2024
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Vishal Asnani
Xi Yin
Xiaoming Liu
AAML
143
1
0
24 Sep 2024
Revisiting Acoustic Features for Robust ASR
Revisiting Acoustic Features for Robust ASR
Muhammad Ahmed Shah
Bhiksha Raj
AAML
48
0
0
24 Sep 2024
Scenario of Use Scheme: Threat Model Specification for Speaker Privacy
  Protection in the Medical Domain
Scenario of Use Scheme: Threat Model Specification for Speaker Privacy Protection in the Medical Domain
Mehtab Ur Rahman
Martha Larson
Louis ten Bosch
Cristian Tejedor-García
51
0
0
24 Sep 2024
Adversarial Watermarking for Face Recognition
Adversarial Watermarking for Face Recognition
Yuguang Yao
Anil K. Jain
Sijia Liu
AAML
72
0
0
24 Sep 2024
Adversarial Backdoor Defense in CLIP
Adversarial Backdoor Defense in CLIP
Junhao Kuang
Siyuan Liang
Jiawei Liang
Kuanrong Liu
Xiaochun Cao
AAML
85
3
0
24 Sep 2024
Improving Adversarial Robustness for 3D Point Cloud Recognition at
  Test-Time through Purified Self-Training
Improving Adversarial Robustness for 3D Point Cloud Recognition at Test-Time through Purified Self-Training
Jinpeng Lin
Xulei Yang
Tianrui Li
Xun Xu
3DPC
76
0
0
23 Sep 2024
Advancing Video Quality Assessment for AIGC
Advancing Video Quality Assessment for AIGC
Xinli Yue
Jianhui Sun
Han Kong
Liangchao Yao
Tianyi Wang
...
Jing Lv
Fan Xia
Yuetang Deng
Qian Wang
Lingchen Zhao
VGenEGVM
82
0
0
23 Sep 2024
Attack Atlas: A Practitioner's Perspective on Challenges and Pitfalls in
  Red Teaming GenAI
Attack Atlas: A Practitioner's Perspective on Challenges and Pitfalls in Red Teaming GenAI
Ambrish Rawat
Stefan Schoepf
Giulio Zizzo
Giandomenico Cornacchia
Muhammad Zaid Hameed
...
Elizabeth M. Daly
Mark Purcell
P. Sattigeri
Pin-Yu Chen
Kush R. Varshney
AAML
104
8
0
23 Sep 2024
Backtracking Improves Generation Safety
Backtracking Improves Generation Safety
Yiming Zhang
Jianfeng Chi
Hailey Nguyen
Kartikeya Upasani
Daniel M. Bikel
Jason Weston
Eric Michael Smith
SILM
124
8
0
22 Sep 2024
Dormant: Defending against Pose-driven Human Image Animation
Dormant: Defending against Pose-driven Human Image Animation
Jiachen Zhou
Mingsi Wang
Tianlin Li
Guozhu Meng
Kai Chen
160
5
0
22 Sep 2024
Cloud Adversarial Example Generation for Remote Sensing Image
  Classification
Cloud Adversarial Example Generation for Remote Sensing Image Classification
Fei Ma
Yuqiang Feng
Fan Zhang
Yongsheng Zhou
DiffMAAML
65
2
0
21 Sep 2024
ViTGuard: Attention-aware Detection against Adversarial Examples for
  Vision Transformer
ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer
Shihua Sun
Kenechukwu Nwodo
Shridatt Sugrim
Angelos Stavrou
Haining Wang
AAML
85
1
0
20 Sep 2024
Hidden Activations Are Not Enough: A General Approach to Neural Network
  Predictions
Hidden Activations Are Not Enough: A General Approach to Neural Network Predictions
Samuel Leblanc
Aiky Rasolomanana
Marco Armenta
74
0
0
20 Sep 2024
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
Zuomin Qu
Wei Lu
Xiangyang Luo
Qian Wang
Xiaochun Cao
AAMLPICV
164
1
0
20 Sep 2024
Revisiting Semi-supervised Adversarial Robustness via Noise-aware Online
  Robust Distillation
Revisiting Semi-supervised Adversarial Robustness via Noise-aware Online Robust Distillation
Tsung-Han Wu
Hung-Ting Su
Shang-Tse Chen
Winston H. Hsu
97
1
0
19 Sep 2024
TEAM: Temporal Adversarial Examples Attack Model against Network
  Intrusion Detection System Applied to RNN
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN
Ziyi Liu
Dengpan Ye
Long Tang
Yunming Zhang
Yueyun Shang
AI4TSAAML
16
1
0
19 Sep 2024
ITPatch: An Invisible and Triggered Physical Adversarial Patch against
  Traffic Sign Recognition
ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition
Shuai Yuan
Hongwei Li
Xingshuo Han
Guowen Xu
Wenbo Jiang
Tao Ni
Qingchuan Zhao
Yuguang Fang
77
4
0
19 Sep 2024
Enhancing 3D Robotic Vision Robustness by Minimizing Adversarial Mutual
  Information through a Curriculum Training Approach
Enhancing 3D Robotic Vision Robustness by Minimizing Adversarial Mutual Information through a Curriculum Training Approach
Nastaran Darabi
Dinithi Jayasuriya
Devashri Naik
Theja Tulabandhula
Amit Ranjan Trivedi
AAML
79
2
0
19 Sep 2024
A constrained optimization approach to improve robustness of neural
  networks
A constrained optimization approach to improve robustness of neural networks
Shudian Zhao
Jan Kronqvist
AAML
52
0
0
18 Sep 2024
NPAT Null-Space Projected Adversarial Training Towards Zero
  Deterioration
NPAT Null-Space Projected Adversarial Training Towards Zero Deterioration
Hanyi Hu
Qiao Han
Kui Chen
Yao Yang
AAML
69
0
0
18 Sep 2024
LLM-Agent-UMF: LLM-based Agent Unified Modeling Framework for Seamless
  Integration of Multi Active/Passive Core-Agents
LLM-Agent-UMF: LLM-based Agent Unified Modeling Framework for Seamless Integration of Multi Active/Passive Core-Agents
Amine B. Hassouna
Hana Chaari
Ines Belhaj
LLMAG
95
1
0
17 Sep 2024
Golden Ratio Search: A Low-Power Adversarial Attack for Deep Learning
  based Modulation Classification
Golden Ratio Search: A Low-Power Adversarial Attack for Deep Learning based Modulation Classification
Deepsayan Sadhukhan
N. Shankar
Sheetal Kalyani
AAML
48
0
0
17 Sep 2024
DRIVE: Dependable Robust Interpretable Visionary Ensemble Framework in
  Autonomous Driving
DRIVE: Dependable Robust Interpretable Visionary Ensemble Framework in Autonomous Driving
Songning Lai
Tianlang Xue
Hongru Xiao
Lijie Hu
Jiemin Wu
Ninghui Feng
Runwei Guan
Haicheng Liao
Zhenning Li
Yutao Yue
83
4
0
16 Sep 2024
Revisiting Physical-World Adversarial Attack on Traffic Sign
  Recognition: A Commercial Systems Perspective
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective
Ningfei Wang
Shaoyuan Xie
Takami Sato
Yunpeng Luo
Kaidi Xu
Qi Alfred Chen
AAML
69
1
0
15 Sep 2024
Real-world Adversarial Defense against Patch Attacks based on Diffusion
  Model
Real-world Adversarial Defense against Patch Attacks based on Diffusion Model
Xingxing Wei
Caixin Kang
Yinpeng Dong
Ziyi Wang
Shouwei Ruan
Yubo Chen
Hang Su
AAMLDiffM
69
3
0
14 Sep 2024
Are Sparse Neural Networks Better Hard Sample Learners?
Are Sparse Neural Networks Better Hard Sample Learners?
Q. Xiao
Boqian Wu
Lu Yin
Christopher Neil Gadzinski
Tianjin Huang
Mykola Pechenizkiy
Decebal Constantin Mocanu
87
1
0
13 Sep 2024
Clean Label Attacks against SLU Systems
Clean Label Attacks against SLU Systems
Lin Zhang
Sonal Joshi
Thomas Thebaud
Jesus Villalba
Najim Dehak
Sanjeev Khudanpur
AAML
61
0
0
13 Sep 2024
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers
  via Feature Substitution
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers via Feature Substitution
Kiana Vu
Phung Lai
Truc D. T. Nguyen
AAML
74
0
0
13 Sep 2024
Exploiting Supervised Poison Vulnerability to Strengthen Self-Supervised
  Defense
Exploiting Supervised Poison Vulnerability to Strengthen Self-Supervised Defense
Jeremy A. Styborski
Mingzhi Lyu
Yunpeng Huang
Adams Kong
113
0
0
13 Sep 2024
LoRID: Low-Rank Iterative Diffusion for Adversarial Purification
LoRID: Low-Rank Iterative Diffusion for Adversarial Purification
Geigh Zollicoffer
Minh Vu
Ben Nebgen
Juan Castorena
Boian S. Alexandrov
Manish Bhattarai
68
2
0
12 Sep 2024
A Cost-Aware Approach to Adversarial Robustness in Neural Networks
A Cost-Aware Approach to Adversarial Robustness in Neural Networks
Charles Meyers
Mohammad Reza Saleh Sedghpour
Tommy Löfstedt
Erik Elmroth
OODAAML
71
0
0
11 Sep 2024
Previous
123...131415...131132133
Next