ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.00349
  4. Cited By
A General Framework for Adversarial Examples with Objectives
v1v2 (latest)

A General Framework for Adversarial Examples with Objectives

31 December 2017
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
    AAMLGAN
ArXiv (abs)PDFHTML

Papers citing "A General Framework for Adversarial Examples with Objectives"

48 / 48 papers shown
Title
DArFace: Deformation Aware Robustness for Low Quality Face Recognition
DArFace: Deformation Aware Robustness for Low Quality Face Recognition
Sadaf Gulshad
Abdullah Aldahlawi Thakaa
CVBM
119
0
0
13 May 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
228
1
0
20 Jan 2025
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial
  Attack against Infrared Pedestrian Detectors
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial Attack against Infrared Pedestrian Detectors
Kalibinuer Tiliwalidi
AAML
81
1
0
06 Mar 2024
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
128
12
0
21 Jun 2023
Physical Adversarial Attacks for Surveillance: A Survey
Physical Adversarial Attacks for Surveillance: A Survey
Kien Nguyen Thanh
Tharindu Fernando
Clinton Fookes
Sridha Sridharan
AAML
109
8
0
01 May 2023
Semantic Adversarial Attacks on Face Recognition through Significant
  Attributes
Semantic Adversarial Attacks on Face Recognition through Significant Attributes
Yasmeen M. Khedr
Yifeng Xiong
Kun He
AAML
81
2
0
28 Jan 2023
Simultaneously Optimizing Perturbations and Positions for Black-box
  Adversarial Patch Attacks
Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks
Xingxing Wei
Yingjie Guo
Jie Yu
Bo Zhang
AAML
106
52
0
26 Dec 2022
Unfolding Local Growth Rate Estimates for (Almost) Perfect Adversarial
  Detection
Unfolding Local Growth Rate Estimates for (Almost) Perfect Adversarial Detection
P. Lorenz
Margret Keuper
J. Keuper
AAML
97
7
0
13 Dec 2022
Advancing Deep Metric Learning Through Multiple Batch Norms And
  Multi-Targeted Adversarial Examples
Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Inderjeet Singh
Kazuya Kakizaki
Toshinori Araki
AAMLOOD
79
0
0
29 Nov 2022
Attacking Face Recognition with T-shirts: Database, Vulnerability
  Assessment and Detection
Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection
M. Ibsen
Christian Rathgeb
Fabian Brechtel
Ruben Klepp
K. Pöppelmann
Anjith George
S´ebastien Marcel
C. Busch
CVBMAAML
35
5
0
14 Nov 2022
Benchmarking Adversarial Patch Against Aerial Detection
Benchmarking Adversarial Patch Against Aerial Detection
Jiawei Lian
Shaohui Mei
Shun Zhang
Mingyang Ma
AAML
99
59
0
30 Oct 2022
Face Pasting Attack
Face Pasting Attack
Niklas Bunzel
L. Graner
AAMLCVBM
67
0
0
17 Oct 2022
Physical Adversarial Attack meets Computer Vision: A Decade Survey
Physical Adversarial Attack meets Computer Vision: A Decade Survey
Hui Wei
Hao Tang
Xuemei Jia
Zhixiang Wang
Han-Bing Yu
Zhubo Li
Shiníchi Satoh
Luc Van Gool
Zheng Wang
AAML
152
57
0
30 Sep 2022
A Survey on Physical Adversarial Attack in Computer Vision
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang
Wen Yao
Tingsong Jiang
Guijian Tang
Xiaoqian Chen
AAML
162
39
0
28 Sep 2022
LGV: Boosting Adversarial Example Transferability from Large Geometric
  Vicinity
LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity
Martin Gubri
Maxime Cordy
Mike Papadakis
Yves Le Traon
Koushik Sen
AAML
84
55
0
26 Jul 2022
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition
  using a Mobile and Compact Printer
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer
Xiaoliang Liu
S. Furao
Jian Zhao
Changhai Nie
AAMLCVBM
79
5
0
25 Jun 2022
Superclass Adversarial Attack
Superclass Adversarial Attack
Soichiro Kumano
Hiroshi Kera
T. Yamasaki
AAML
74
1
0
29 May 2022
Developing Imperceptible Adversarial Patches to Camouflage Military
  Assets From Computer Vision Enabled Technologies
Developing Imperceptible Adversarial Patches to Camouflage Military Assets From Computer Vision Enabled Technologies
Christopher Wise
Jo Plested
AAML
74
7
0
17 Feb 2022
Review of Face Presentation Attack Detection Competitions
Review of Face Presentation Attack Detection Competitions
Zitong Yu
Jukka Komulainen
Z. Boulkenafet
Zahid Akhtar
AAMLCVBM
77
11
0
21 Dec 2021
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep
  Neural Network Systems
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems
Bao Gia Doan
Minhui Xue
Shiqing Ma
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
106
57
0
19 Nov 2021
Trustworthy AI: From Principles to Practices
Trustworthy AI: From Principles to Practices
Yue Liu
Peng Qi
Bo Liu
Shuai Di
Jingen Liu
Jiquan Pei
Jinfeng Yi
Bowen Zhou
213
384
0
04 Oct 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
168
242
0
01 Aug 2021
Adversarial Attacks with Time-Scale Representations
Adversarial Attacks with Time-Scale Representations
Alberto Santamaria-Pang
Jia-dong Qiu
Aritra Chowdhury
James R. Kubricht
Peter Tu
Iyer Naresh
Nurali Virani
AAMLMLAU
52
0
0
26 Jul 2021
Deep Learning for Face Anti-Spoofing: A Survey
Deep Learning for Face Anti-Spoofing: A Survey
Zitong Yu
Yunxiao Qin
Xiaobai Li
Chenxu Zhao
Zhen Lei
Guoying Zhao
CVBMAAML
73
150
0
28 Jun 2021
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or
  WITHOUT Signature
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature
Binxiu Liang
Jiachun Li
Jianjun Huang
AAML
85
13
0
09 Jun 2021
On the Robustness of Domain Constraints
On the Robustness of Domain Constraints
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Yohan Beugin
Mike Weisman
Patrick McDaniel
AAMLOOD
88
26
0
18 May 2021
Adv-Makeup: A New Imperceptible and Transferable Attack on Face
  Recognition
Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
Bangjie Yin
Wenxuan Wang
Taiping Yao
Junfeng Guo
Zelun Kong
Shouhong Ding
Jilin Li
Cong Liu
AAML
129
136
0
07 May 2021
A Master Key Backdoor for Universal Impersonation Attack against
  DNN-based Face Verification
A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification
Wei Guo
B. Tondi
Mauro Barni
AAML
78
20
0
01 May 2021
Hidden Backdoors in Human-Centric Language Models
Hidden Backdoors in Human-Centric Language Models
Shaofeng Li
Hui Liu
Tian Dong
Benjamin Zi Hao Zhao
Minhui Xue
Haojin Zhu
Jialiang Lu
SILM
156
155
0
01 May 2021
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Adversarial Sticker: A Stealthy Attack Method in the Physical World
Xingxing Wei
Yingjie Guo
Jie Yu
AAML
85
125
0
14 Apr 2021
FoggySight: A Scheme for Facial Lookup Privacy
FoggySight: A Scheme for Facial Lookup Privacy
Ivan Evtimov
Pascal Sturmfels
Tadayoshi Kohno
PICVFedML
78
24
0
15 Dec 2020
Are DNNs fooled by extremely unrecognizable images?
Are DNNs fooled by extremely unrecognizable images?
Soichiro Kumano
Hiroshi Kera
T. Yamasaki
AAML
46
3
0
07 Dec 2020
Robust Attacks on Deep Learning Face Recognition in the Physical World
Robust Attacks on Deep Learning Face Recognition in the Physical World
Meng Shen
Hao Yu
Liehuang Zhu
Ke Xu
Qi Li
Xiaojiang Du
AAML
41
1
0
27 Nov 2020
Learning perturbation sets for robust machine learning
Learning perturbation sets for robust machine learning
Eric Wong
J. Zico Kolter
OOD
85
81
0
16 Jul 2020
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing
  Website Classifiers
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Yusi Lei
Sen Chen
Lingling Fan
Fu Song
Yang Liu
AAML
86
50
0
15 Apr 2020
Towards Transferable Adversarial Attack against Deep Face Recognition
Towards Transferable Adversarial Attack against Deep Face Recognition
Yaoyao Zhong
Weihong Deng
AAML
112
162
0
13 Apr 2020
Strategies for Robust Image Classification
Strategies for Robust Image Classification
Jason Stock
Andy Dolan
Tom Cavey
35
2
0
26 Mar 2020
Face-Off: Adversarial Face Obfuscation
Face-Off: Adversarial Face Obfuscation
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
PICV
93
44
0
19 Mar 2020
Design and Interpretation of Universal Adversarial Patches in Face
  Detection
Design and Interpretation of Universal Adversarial Patches in Face Detection
Xiao Yang
Fangyun Wei
Hongyang R. Zhang
Jun Zhu
AAMLCVBM
141
43
0
30 Nov 2019
Analysis of Explainers of Black Box Deep Neural Networks for Computer
  Vision: A Survey
Analysis of Explainers of Black Box Deep Neural Networks for Computer Vision: A Survey
Vanessa Buhrmester
David Münch
Michael Arens
MLAUFaMLXAIAAML
135
369
0
27 Nov 2019
Towards Large yet Imperceptible Adversarial Image Perturbations with
  Perceptual Color Distance
Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
126
151
0
06 Nov 2019
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments
Alesia Chernikova
Alina Oprea
AAML
121
40
0
23 Sep 2019
AdvHat: Real-world adversarial attack on ArcFace Face ID system
AdvHat: Real-world adversarial attack on ArcFace Face ID system
Stepan Alekseevich Komkov
Aleksandr Petiushko
AAMLCVBM
77
288
0
23 Aug 2019
AdvFaces: Adversarial Face Synthesis
AdvFaces: Adversarial Face Synthesis
Debayan Deb
Jianbang Zhang
Anil K. Jain
GANCVBMAAMLPICV
101
129
0
14 Aug 2019
Physical Adversarial Textures that Fool Visual Object Tracking
Physical Adversarial Textures that Fool Visual Object Tracking
R. Wiyatno
Anqi Xu
AAML
102
74
0
24 Apr 2019
Mockingbird: Defending Against Deep-Learning-Based Website
  Fingerprinting Attacks with Adversarial Traces
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
Mohammad Saidur Rahman
Mohsen Imani
Nate Mathews
M. Wright
AAML
86
81
0
18 Feb 2019
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
76
235
0
13 Sep 2018
Generating Natural Adversarial Examples
Generating Natural Adversarial Examples
Zhengli Zhao
Dheeru Dua
Sameer Singh
GANAAML
203
601
0
31 Oct 2017
1