ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1707.05373
  4. Cited By
Houdini: Fooling Deep Structured Prediction Models

Houdini: Fooling Deep Structured Prediction Models

17 July 2017
Moustapha Cissé
Yossi Adi
Natalia Neverova
Joseph Keshet
    AAML
ArXiv (abs)PDFHTML

Papers citing "Houdini: Fooling Deep Structured Prediction Models"

50 / 100 papers shown
Title
Fooling a Real Car with Adversarial Traffic Signs
Fooling a Real Car with Adversarial Traffic Signs
N. Morgulis
Alexander Kreines
Shachar Mendelowitz
Yuval Weisglass
AAML
89
93
0
30 Jun 2019
SemanticAdv: Generating Adversarial Examples via Attribute-conditional
  Image Editing
SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image Editing
Haonan Qiu
Chaowei Xiao
Lei Yang
Xinchen Yan
Honglak Lee
Yue Liu
AAML
69
172
0
19 Jun 2019
Real-Time Adversarial Attacks
Real-Time Adversarial Attacks
Yuan Gong
Boyang Li
C. Poellabauer
Yiyu Shi
AAML
60
55
0
31 May 2019
High Frequency Component Helps Explain the Generalization of
  Convolutional Neural Networks
High Frequency Component Helps Explain the Generalization of Convolutional Neural Networks
Haohan Wang
Xindi Wu
Pengcheng Yin
Eric Xing
85
526
0
28 May 2019
POPQORN: Quantifying Robustness of Recurrent Neural Networks
POPQORN: Quantifying Robustness of Recurrent Neural Networks
Ching-Yun Ko
Zhaoyang Lyu
Tsui-Wei Weng
Luca Daniel
Ngai Wong
Dahua Lin
AAML
69
76
0
17 May 2019
Simple Black-box Adversarial Attacks
Simple Black-box Adversarial Attacks
Chuan Guo
Jacob R. Gardner
Yurong You
A. Wilson
Kilian Q. Weinberger
AAML
78
582
0
17 May 2019
Moving Target Defense for Deep Visual Sensing against Adversarial
  Examples
Moving Target Defense for Deep Visual Sensing against Adversarial Examples
Qun Song
Zhenyu Yan
Rui Tan
AAML
47
21
0
11 May 2019
Better the Devil you Know: An Analysis of Evasion Attacks using
  Out-of-Distribution Adversarial Examples
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Vikash Sehwag
A. Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
M. Chiang
Prateek Mittal
OODD
79
26
0
05 May 2019
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via
  Genetic Algorithm
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm
Jinyin Chen
Mengmeng Su
Shijing Shen
Hui Xiong
Haibin Zheng
AAML
124
68
0
01 May 2019
ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems
ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems
Yuan Gong
Jian Yang
Jacob Huber
Mitchell MacKnight
C. Poellabauer
AAML
82
34
0
06 Apr 2019
A geometry-inspired decision-based attack
A geometry-inspired decision-based attack
Yujia Liu
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
AAML
77
54
0
26 Mar 2019
Defending against Whitebox Adversarial Attacks via Randomized
  Discretization
Defending against Whitebox Adversarial Attacks via Randomized Discretization
Yuchen Zhang
Percy Liang
AAML
84
76
0
25 Mar 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
107
381
0
22 Mar 2019
Neural Network Model Extraction Attacks in Edge Devices by Hearing
  Architectural Hints
Neural Network Model Extraction Attacks in Edge Devices by Hearing Architectural Hints
Xing Hu
Ling Liang
Lei Deng
Shuangchen Li
Xinfeng Xie
Yu Ji
Yufei Ding
Chang Liu
T. Sherwood
Yuan Xie
AAMLMLAU
68
36
0
10 Mar 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffMAAML
51
36
0
26 Jan 2019
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
Tianyu Du
S. Ji
Jinfeng Li
Qinchen Gu
Ting Wang
R. Beyah
AAML
88
130
0
23 Jan 2019
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving
  Systems
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems
Husheng Zhou
Wei Li
Yuankun Zhu
Yuqun Zhang
Bei Yu
Lingming Zhang
Cong Liu
AAML
85
179
0
27 Dec 2018
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on
  Generation of Adversarial Examples
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples
E. Balda
Arash Behboodi
R. Mathar
AAML
32
5
0
15 Dec 2018
Defending Against Universal Perturbations With Shared Adversarial
  Training
Defending Against Universal Perturbations With Shared Adversarial Training
Chaithanya Kumar Mummadi
Thomas Brox
J. H. Metzen
AAML
84
60
0
10 Dec 2018
Bilateral Adversarial Training: Towards Fast Training of More Robust
  Models Against Adversarial Attacks
Bilateral Adversarial Training: Towards Fast Training of More Robust Models Against Adversarial Attacks
Jianyu Wang
Haichao Zhang
OODAAML
87
119
0
26 Nov 2018
Protecting Voice Controlled Systems Using Sound Source Identification
  Based on Acoustic Cues
Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
Yuan Gong
C. Poellabauer
AAML
57
27
0
16 Nov 2018
SparseFool: a few pixels make a big difference
SparseFool: a few pixels make a big difference
Apostolos Modas
Seyed-Mohsen Moosavi-Dezfooli
P. Frossard
AAML
72
200
0
06 Nov 2018
Improving Adversarial Robustness by Encouraging Discriminative Features
Improving Adversarial Robustness by Encouraging Discriminative Features
Chirag Agarwal
Anh Totti Nguyen
Dan Schonfeld
OOD
66
5
0
01 Nov 2018
Data Poisoning Attack against Unsupervised Node Embedding Methods
Data Poisoning Attack against Unsupervised Node Embedding Methods
Mingjie Sun
Jian Tang
Huichen Li
Yue Liu
Chaowei Xiao
Yao-Liang Chen
Basel Alomair
GNNAAML
50
67
0
30 Oct 2018
Characterizing Adversarial Examples Based on Spatial Consistency
  Information for Semantic Segmentation
Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Chaowei Xiao
Ruizhi Deng
Yue Liu
Feng Yu
M. Liu
Basel Alomair
AAML
59
99
0
11 Oct 2018
Characterizing Audio Adversarial Examples Using Temporal Dependency
Characterizing Audio Adversarial Examples Using Temporal Dependency
Zhuolin Yang
Yue Liu
Pin-Yu Chen
Basel Alomair
AAML
69
165
0
28 Sep 2018
Low Frequency Adversarial Perturbation
Low Frequency Adversarial Perturbation
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
AAML
84
168
0
24 Sep 2018
Adversarial Attacks on Node Embeddings via Graph Poisoning
Adversarial Attacks on Node Embeddings via Graph Poisoning
Aleksandar Bojchevski
Stephan Günnemann
AAML
89
307
0
04 Sep 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
89
291
0
16 Aug 2018
Adaptive Adversarial Attack on Scene Text Recognition
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan
Pan He
Xiaolin Li
Dapeng Oliver Wu
AAML
73
23
0
09 Jul 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GANAAML
218
307
0
21 May 2018
Targeted Adversarial Examples for Black Box Audio Systems
Targeted Adversarial Examples for Black Box Audio Systems
Rohan Taori
Amog Kamsetty
Brenton Chu
N. Vemuri
AAML
65
186
0
20 May 2018
Towards Fast Computation of Certified Robustness for ReLU Networks
Towards Fast Computation of Certified Robustness for ReLU Networks
Tsui-Wei Weng
Huan Zhang
Hongge Chen
Zhao Song
Cho-Jui Hsieh
Duane S. Boning
Inderjit S. Dhillon
Luca Daniel
AAML
136
695
0
25 Apr 2018
An Overview of Vulnerabilities of Voice Controlled Systems
An Overview of Vulnerabilities of Voice Controlled Systems
Yuan Gong
C. Poellabauer
51
32
0
24 Mar 2018
Improving Transferability of Adversarial Examples with Input Diversity
Improving Transferability of Adversarial Examples with Input Diversity
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
AAML
119
1,132
0
19 Mar 2018
DARTS: Deceiving Autonomous Cars with Toxic Signs
DARTS: Deceiving Autonomous Cars with Toxic Signs
Chawin Sitawarin
A. Bhagoji
Arsalan Mosenia
M. Chiang
Prateek Mittal
AAML
117
236
0
18 Feb 2018
Fooling End-to-end Speaker Verification by Adversarial Examples
Fooling End-to-end Speaker Verification by Adversarial Examples
Felix Kreuk
Yossi Adi
Moustapha Cissé
Joseph Keshet
AAML
89
203
0
10 Jan 2018
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini
D. Wagner
AAML
101
1,083
0
05 Jan 2018
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A
  Survey
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
Naveed Akhtar
Ajmal Mian
AAML
146
1,877
0
02 Jan 2018
A General Framework for Adversarial Examples with Objectives
A General Framework for Adversarial Examples with Objectives
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
AAMLGAN
84
196
0
31 Dec 2017
Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks
Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks
Siqi Yang
Arnold Wiliem
Shaokang Chen
Brian C. Lovell
CVBMAAML
61
3
0
22 Dec 2017
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box
  Machine Learning Models
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models
Wieland Brendel
Jonas Rauber
Matthias Bethge
AAML
103
1,352
0
12 Dec 2017
Generative Adversarial Perturbations
Generative Adversarial Perturbations
Omid Poursaeed
Isay Katsman
Bicheng Gao
Serge J. Belongie
AAMLGANWIGM
88
356
0
06 Dec 2017
ConvNets and ImageNet Beyond Accuracy: Understanding Mistakes and
  Uncovering Biases
ConvNets and ImageNet Beyond Accuracy: Understanding Mistakes and Uncovering Biases
Pierre Stock
Moustapha Cissé
FaML
94
46
0
30 Nov 2017
On the Robustness of Semantic Segmentation Models to Adversarial Attacks
On the Robustness of Semantic Segmentation Models to Adversarial Attacks
Anurag Arnab
O. Mikšík
Philip Torr
AAML
124
308
0
27 Nov 2017
Crafting Adversarial Examples For Speech Paralinguistics Applications
Crafting Adversarial Examples For Speech Paralinguistics Applications
Yuan Gong
C. Poellabauer
AAML
96
122
0
09 Nov 2017
Mitigating Adversarial Effects Through Randomization
Mitigating Adversarial Effects Through Randomization
Cihang Xie
Jianyu Wang
Zhishuai Zhang
Zhou Ren
Alan Yuille
AAML
164
1,068
0
06 Nov 2017
Countering Adversarial Images using Input Transformations
Countering Adversarial Images using Input Transformations
Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
AAML
151
1,409
0
31 Oct 2017
Detecting Adversarial Attacks on Neural Network Policies with Visual
  Foresight
Detecting Adversarial Attacks on Neural Network Policies with Visual Foresight
Yen-Chen Lin
Ming-Yuan Liu
Min Sun
Jia-Bin Huang
AAML
99
49
0
02 Oct 2017
Robust Physical-World Attacks on Deep Learning Models
Robust Physical-World Attacks on Deep Learning Models
Kevin Eykholt
Ivan Evtimov
Earlence Fernandes
Yue Liu
Amir Rahmati
Chaowei Xiao
Atul Prakash
Tadayoshi Kohno
Basel Alomair
AAML
145
595
0
27 Jul 2017
Previous
12