ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1706.06083
  4. Cited By
Towards Deep Learning Models Resistant to Adversarial Attacks

Towards Deep Learning Models Resistant to Adversarial Attacks

19 June 2017
A. Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
    SILM
    OOD
ArXivPDFHTML

Papers citing "Towards Deep Learning Models Resistant to Adversarial Attacks"

50 / 6,508 papers shown
Title
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems
S. Mandelli
Vinod Puthuvath
Anderson Rocha
Rafidha Rehiman K. A.
Mauro Conti
AAML
35
0
0
06 Apr 2025
Embedding Hidden Adversarial Capabilities in Pre-Trained Diffusion Models
Embedding Hidden Adversarial Capabilities in Pre-Trained Diffusion Models
Lucas Beerens
D. Higham
DiffM
WIGM
60
0
0
05 Apr 2025
Bridging the Theoretical Gap in Randomized Smoothing
Bridging the Theoretical Gap in Randomized Smoothing
Blaise Delattre
Paul Caillon
Quentin Barthélemy
Erwan Fagnou
Alexandre Allauzen
AAML
58
0
0
03 Apr 2025
A Study on Adversarial Robustness of Discriminative Prototypical Learning
A Study on Adversarial Robustness of Discriminative Prototypical Learning
Ramin Zarei-Sabzevar
Hamed Mohammadzadeh
Tahmineh Tavakoli
Ahad Harati
AAML
21
0
0
03 Apr 2025
Randomized Pairwise Learning with Adaptive Sampling: A PAC-Bayes Analysis
Randomized Pairwise Learning with Adaptive Sampling: A PAC-Bayes Analysis
Sijia Zhou
Yunwen Lei
Ata Kabán
34
0
0
03 Apr 2025
Properties of Fixed Points of Generalised Extra Gradient Methods Applied to Min-Max Problems
Properties of Fixed Points of Generalised Extra Gradient Methods Applied to Min-Max Problems
Amir Ali Farzin
Yuen-Man Pun
Philipp Braun
Iman Shames
28
0
0
03 Apr 2025
Multifaceted Evaluation of Audio-Visual Capability for MLLMs: Effectiveness, Efficiency, Generalizability and Robustness
Multifaceted Evaluation of Audio-Visual Capability for MLLMs: Effectiveness, Efficiency, Generalizability and Robustness
Yusheng Zhao
Junyu Luo
Zhiyuan Ning
Weizhi Zhang
Zhiping Xiao
Wei Ju
Philip S. Yu
Ming Zhang
AuLLM
49
0
0
03 Apr 2025
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
Chaohu Liu
Tianyi Gui
Yu Liu
Linli Xu
VLM
AAML
68
1
0
02 Apr 2025
One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image
One Pic is All it Takes: Poisoning Visual Document Retrieval Augmented Generation with a Single Image
Ezzeldin Shereen
Dan Ristea
Burak Hasircioglu
Shae McFadden
V. Mavroudis
Chris Hicks
49
0
0
02 Apr 2025
LightDefense: A Lightweight Uncertainty-Driven Defense against Jailbreaks via Shifted Token Distribution
LightDefense: A Lightweight Uncertainty-Driven Defense against Jailbreaks via Shifted Token Distribution
Zhuoran Yang
Jie Peng
Zhen Tan
Tianlong Chen
Yanyong Zhang
AAML
44
0
0
02 Apr 2025
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Haibo Zhang
Zhihua Yao
Kouichi Sakurai
Takeshi Saitoh
AAML
60
0
0
02 Apr 2025
Robust Unsupervised Domain Adaptation for 3D Point Cloud Segmentation Under Source Adversarial Attacks
Robust Unsupervised Domain Adaptation for 3D Point Cloud Segmentation Under Source Adversarial Attacks
Yiming Li
Junjie Chen
Yuecong Xu
Kemi Ding
3DPC
44
0
0
02 Apr 2025
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
AAML
57
0
0
01 Apr 2025
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection
Yinghe Zhang
Chi Liu
S. Kevin Zhou
Sheng Shen
Peng Gui
AAML
51
0
0
01 Apr 2025
Geometric Median Matching for Robust k-Subset Selection from Noisy Data
Geometric Median Matching for Robust k-Subset Selection from Noisy Data
Anish Acharya
Sujay Sanghavi
Alexandros G. Dimakis
Inderjit S Dhillon
AAML
62
0
0
01 Apr 2025
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios
Jingzheng Li
X. Liu
Shikui Wei
Zhijun Chen
Yangqiu Song
Qing Guo
Xianqi Yang
Yanjun Pu
Jiakai Wang
AAML
ELM
74
0
0
31 Mar 2025
A Survey on Unlearnable Data
A Survey on Unlearnable Data
Jiahao Li
Yiqiang Chen
Yunbing Xing
Yang Gu
Xiangyuan Lan
AAML
58
0
0
30 Mar 2025
Revisiting the Relationship between Adversarial and Clean Training: Why Clean Training Can Make Adversarial Training Better
Revisiting the Relationship between Adversarial and Clean Training: Why Clean Training Can Make Adversarial Training Better
MingWei Zhou
Xiaobing Pei
AAML
185
0
0
30 Mar 2025
Nested Stochastic Gradient Descent for (Generalized) Sinkhorn Distance-Regularized Distributionally Robust Optimization
Nested Stochastic Gradient Descent for (Generalized) Sinkhorn Distance-Regularized Distributionally Robust Optimization
Yuqing Yang
Yi Zhou
Zhaosong Lu
49
0
0
29 Mar 2025
Data-Free Universal Attack by Exploiting the Intrinsic Vulnerability of Deep Models
Data-Free Universal Attack by Exploiting the Intrinsic Vulnerability of Deep Models
YangTian Yan
Jinyu Tian
AAML
FedML
70
0
0
28 Mar 2025
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Adversarial Wear and Tear: Exploiting Natural Damage for Generating Physical-World Adversarial Examples
Samra Irshad
Seungkyu Lee
Nassir Navab
Hong Joo Lee
S. T. Kim
GAN
AAML
89
0
0
27 Mar 2025
Learning Data-Driven Uncertainty Set Partitions for Robust and Adaptive Energy Forecasting with Missing Data
Learning Data-Driven Uncertainty Set Partitions for Robust and Adaptive Energy Forecasting with Missing Data
Akylas Stratigakos
Panagiotis Andrianesis
68
0
0
26 Mar 2025
Feature Statistics with Uncertainty Help Adversarial Robustness
Feature Statistics with Uncertainty Help Adversarial Robustness
Ran A. Wang
Xinlei Zhou
Rihao Li
Meng Hu
Wenhui Wu
Yuheng Jia
AAML
82
0
0
26 Mar 2025
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks
Zongyuan Zhang
Tianyang Duan
Zheng Lin
Dong Huang
Zihan Fang
...
Ling Xiong
Hongbin Liang
Heming Cui
Yong Cui
Yue Gao
AAML
53
2
0
26 Mar 2025
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning
Zongyuan Zhang
Tianyang Duan
Zheng Lin
Dong Huang
Zihan Fang
Zekai Sun
Ling Xiong
Hongbin Liang
Heming Cui
Yong Cui
AAML
90
1
0
26 Mar 2025
Diffusion Counterfactuals for Image Regressors
Diffusion Counterfactuals for Image Regressors
Trung Duc Ha
Sidney Bender
DiffM
87
0
0
26 Mar 2025
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems
Chenglong Wang
Pujia Zheng
Jiaping Gui
Cunqing Hua
Wajih Ul Hassan
AAML
91
0
0
26 Mar 2025
Lipschitz Constant Meets Condition Number: Learning Robust and Compact Deep Neural Networks
Lipschitz Constant Meets Condition Number: Learning Robust and Compact Deep Neural Networks
Yangqi Feng
S. J. Lin
Baoyuan Gao
Xian Wei
AAML
78
0
0
26 Mar 2025
Protecting Your Video Content: Disrupting Automated Video-based LLM Annotations
Protecting Your Video Content: Disrupting Automated Video-based LLM Annotations
Haitong Liu
Kuofeng Gao
Yang Bai
Jinmin Li
Jinxiao Shan
Tao Dai
Shu-Tao Xia
AAML
65
1
0
26 Mar 2025
Fundamental Limits of Perfect Concept Erasure
Fundamental Limits of Perfect Concept Erasure
Somnath Basu Roy Chowdhury
Avinava Dubey
Ahmad Beirami
Rahul Kidambi
Nicholas Monath
Amr Ahmed
Snigdha Chaturvedi
66
0
0
25 Mar 2025
Geometric Meta-Learning via Coupled Ricci Flow: Unifying Knowledge Representation and Quantum Entanglement
Geometric Meta-Learning via Coupled Ricci Flow: Unifying Knowledge Representation and Quantum Entanglement
Ming Lei
Christophe Baehr
AI4CE
38
0
0
25 Mar 2025
Quality-focused Active Adversarial Policy for Safe Grasping in Human-Robot Interaction
Quality-focused Active Adversarial Policy for Safe Grasping in Human-Robot Interaction
Chenghao Li
Razvan Beuran
Nak Young Chong
AAML
46
0
0
25 Mar 2025
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent
Philip Doldo
Derek Everett
Amol Khanna
A. Nguyen
Edward Raff
AAML
46
0
0
25 Mar 2025
Towards Imperceptible Adversarial Attacks for Time Series Classification with Local Perturbations and Frequency Analysis
Towards Imperceptible Adversarial Attacks for Time Series Classification with Local Perturbations and Frequency Analysis
Wenwei Gu
Renyi Zhong
Jianping Zhang
Michael R. Lyu
AAML
38
0
0
25 Mar 2025
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation
SITA: Structurally Imperceptible and Transferable Adversarial Attacks for Stylized Image Generation
Jingdan Kang
Haoxin Yang
Yan Cai
Huaidong Zhang
Xuemiao Xu
Yong Du
Shengfeng He
AAML
49
0
0
25 Mar 2025
Bitstream Collisions in Neural Image Compression via Adversarial Perturbations
Bitstream Collisions in Neural Image Compression via Adversarial Perturbations
Jordan Madden
Lhamo Dorje
Xiaohua Li
AAML
47
0
0
25 Mar 2025
LLaVAction: evaluating and training multi-modal large language models for action recognition
LLaVAction: evaluating and training multi-modal large language models for action recognition
Shaokai Ye
Haozhe Qi
Alexander Mathis
Mackenzie W. Mathis
70
1
0
24 Mar 2025
STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models
STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models
Xunguang Wang
Wenxuan Wang
Zhenlan Ji
Zongjie Li
Pingchuan Ma
Daoyuan Wu
Shuai Wang
50
0
0
23 Mar 2025
EasyRobust: A Comprehensive and Easy-to-use Toolkit for Robust and Generalized Vision
EasyRobust: A Comprehensive and Easy-to-use Toolkit for Robust and Generalized Vision
Xiaofeng Mao
YueFeng Chen
Rong Zhang
Hui Xue
Zhao Li
Hang Su
AAML
VLM
43
0
0
21 Mar 2025
Robustness of deep learning classification to adversarial input on GPUs: asynchronous parallel accumulation is a source of vulnerability
Robustness of deep learning classification to adversarial input on GPUs: asynchronous parallel accumulation is a source of vulnerability
Sanjif Shanmugavelu
Mathieu Taillefumier
Christopher Culver
Vijay Ganesh
Oscar Hernandez
Ada Sedova
AAML
38
0
0
21 Mar 2025
Principal Eigenvalue Regularization for Improved Worst-Class Certified Robustness of Smoothed Classifiers
Principal Eigenvalue Regularization for Improved Worst-Class Certified Robustness of Smoothed Classifiers
Gaojie Jin
Tianjin Huang
Ronghui Mu
Xiaowei Huang
AAML
51
0
0
21 Mar 2025
Beyond Accuracy: What Matters in Designing Well-Behaved Models?
Beyond Accuracy: What Matters in Designing Well-Behaved Models?
Robin Hesse
Doğukan Bağcı
Bernt Schiele
Simone Schaub-Meyer
Stefan Roth
VLM
62
0
0
21 Mar 2025
Opportunities and Challenges of Frontier Data Governance With Synthetic Data
Opportunities and Challenges of Frontier Data Governance With Synthetic Data
Madhavendra Thakur
Jason Hausenloy
51
0
0
21 Mar 2025
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
João B. S. Carvalho
Alessandro Torcinovich
Victor Jimenez Rodriguez
Antonio Emanuele Cinà
Carlos Cotrini
Lea Schönherr
J. M. Buhmann
OOD
68
0
0
20 Mar 2025
REVAL: A Comprehension Evaluation on Reliability and Values of Large Vision-Language Models
REVAL: A Comprehension Evaluation on Reliability and Values of Large Vision-Language Models
Jie M. Zhang
Zheng Yuan
Ziyi Wang
Bei Yan
Sibo Wang
Xiangkui Cao
Zonghui Guo
Shiguang Shan
Xilin Chen
ELM
47
0
0
20 Mar 2025
SpiLiFormer: Enhancing Spiking Transformers with Lateral Inhibition
SpiLiFormer: Enhancing Spiking Transformers with Lateral Inhibition
Zeqi Zheng
Yanchen Huang
Yingchao Yu
Zizheng Zhu
Junfeng Tang
Zhaofei Yu
Yaochu Jin
39
0
0
20 Mar 2025
Narrowing Class-Wise Robustness Gaps in Adversarial Training
Narrowing Class-Wise Robustness Gaps in Adversarial Training
Fatemeh Amerehi
Patrick Healy
45
0
0
20 Mar 2025
Unified Enhancement of the Generalization and Robustness of Language Models via Bi-Stage Optimization
Unified Enhancement of the Generalization and Robustness of Language Models via Bi-Stage Optimization
Yizhou Sun
Juan Yin
Juan Zhao
Fan Zhang
Yongheng Liu
Hongji Chen
42
0
0
19 Mar 2025
On the Robustness Tradeoff in Fine-Tuning
On the Robustness Tradeoff in Fine-Tuning
Kunyang Li
Jean-Charles Noirot Ferrand
Ryan Sheatsley
Blaine Hoak
Yohan Beugin
Eric Pauley
Patrick McDaniel
64
0
0
19 Mar 2025
LipShiFT: A Certifiably Robust Shift-based Vision Transformer
LipShiFT: A Certifiably Robust Shift-based Vision Transformer
Rohan Menon
Nicola Franco
Stephan Günnemann
53
0
0
18 Mar 2025
Previous
123456...129130131
Next