ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.00553
  4. Cited By
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A
  Survey
v1v2v3 (latest)

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

2 January 2018
Naveed Akhtar
Ajmal Mian
    AAML
ArXiv (abs)PDFHTML

Papers citing "Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey"

50 / 462 papers shown
Title
On the Loss Landscape of Adversarial Training: Identifying Challenges
  and How to Overcome Them
On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them
Chen Liu
Mathieu Salzmann
Tao R. Lin
Ryota Tomioka
Sabine Süsstrunk
AAML
136
82
0
15 Jun 2020
Defensive Approximation: Securing CNNs using Approximate Computing
Defensive Approximation: Securing CNNs using Approximate Computing
Amira Guesmi
Ihsen Alouani
Khaled N. Khasawneh
M. Baklouti
T. Frikha
Mohamed Abid
Nael B. Abu-Ghazaleh
AAML
93
38
0
13 Jun 2020
Adversarial Attacks and Defense on Texts: A Survey
Adversarial Attacks and Defense on Texts: A Survey
A. Huq
Mst. Tasnim Pervin
AAML
158
21
0
28 May 2020
A Protection against the Extraction of Neural Network Models
A Protection against the Extraction of Neural Network Models
H. Chabanne
Vincent Despiegel
Linda Guiga
FedML
83
5
0
26 May 2020
Increasing-Margin Adversarial (IMA) Training to Improve Adversarial
  Robustness of Neural Networks
Increasing-Margin Adversarial (IMA) Training to Improve Adversarial Robustness of Neural Networks
Linhai Ma
Liang Liang
AAML
149
19
0
19 May 2020
Data-Free Network Quantization With Adversarial Knowledge Distillation
Data-Free Network Quantization With Adversarial Knowledge Distillation
Yoojin Choi
Jihwan P. Choi
Mostafa El-Khamy
Jungwon Lee
MQ
76
121
0
08 May 2020
A Review of Computer Vision Methods in Network Security
A Review of Computer Vision Methods in Network Security
Jiawei Zhao
Rahat Masood
Suranga Seneviratne
AAML
52
48
0
07 May 2020
Adversarial Training against Location-Optimized Adversarial Patches
Adversarial Training against Location-Optimized Adversarial Patches
Sukrut Rao
David Stutz
Bernt Schiele
AAML
84
93
0
05 May 2020
Depth-2 Neural Networks Under a Data-Poisoning Attack
Depth-2 Neural Networks Under a Data-Poisoning Attack
Sayar Karmakar
Anirbit Mukherjee
Ramchandran Muthukumar
68
7
0
04 May 2020
Generative Adversarial Networks (GANs Survey): Challenges, Solutions,
  and Future Directions
Generative Adversarial Networks (GANs Survey): Challenges, Solutions, and Future Directions
Divya Saxena
Jiannong Cao
AAMLAI4CE
165
308
0
30 Apr 2020
Adversarial Machine Learning in Network Intrusion Detection Systems
Adversarial Machine Learning in Network Intrusion Detection Systems
Elie Alhajjar
P. Maxwell
Nathaniel D. Bastian
GANSILMAAML
105
141
0
23 Apr 2020
Certifiable Robustness to Adversarial State Uncertainty in Deep
  Reinforcement Learning
Certifiable Robustness to Adversarial State Uncertainty in Deep Reinforcement Learning
Michael Everett
Bjorn Lutjens
Jonathan P. How
AAML
55
42
0
11 Apr 2020
Blind Adversarial Training: Balance Accuracy and Robustness
Blind Adversarial Training: Balance Accuracy and Robustness
Haidong Xie
Xueshuang Xiang
Naijin Liu
Bin Dong
AAML
34
2
0
10 Apr 2020
Learning to fool the speaker recognition
Learning to fool the speaker recognition
Jiguo Li
Xinfeng Zhang
Jizheng Xu
Li Zhang
Y. Wang
Siwei Ma
Wen Gao
AAML
56
21
0
07 Apr 2020
TensorFI: A Flexible Fault Injection Framework for TensorFlow
  Applications
TensorFI: A Flexible Fault Injection Framework for TensorFlow Applications
Zitao Chen
Niranjhana Narayanan
Bo Fang
Guanpeng Li
Karthik Pattabiraman
Nathan Debardeleben
48
71
0
03 Apr 2020
A Survey of Convolutional Neural Networks: Analysis, Applications, and
  Prospects
A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects
Zewen Li
Wenjie Yang
Shouheng Peng
Fan Liu
HAI3DV
167
2,794
0
01 Apr 2020
An Overview of Federated Deep Learning Privacy Attacks and Defensive
  Strategies
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies
David Enthoven
Zaid Al-Ars
FedML
93
51
0
01 Apr 2020
Adversarial Attacks on Multivariate Time Series
Adversarial Attacks on Multivariate Time Series
Samuel Harford
Fazle Karim
H. Darabi
AI4TSAAML
55
22
0
31 Mar 2020
Code Prediction by Feeding Trees to Transformers
Code Prediction by Feeding Trees to Transformers
Seohyun Kim
Jinman Zhao
Yuchi Tian
S. Chandra
150
220
0
30 Mar 2020
Challenging the adversarial robustness of DNNs based on error-correcting
  output codes
Challenging the adversarial robustness of DNNs based on error-correcting output codes
Bowen Zhang
B. Tondi
Xixiang Lv
Mauro Barni
AAML
25
2
0
26 Mar 2020
Heat and Blur: An Effective and Fast Defense Against Adversarial
  Examples
Heat and Blur: An Effective and Fast Defense Against Adversarial Examples
Haya Brama
Tal Grinshpoun
AAML
88
6
0
17 Mar 2020
Double Backpropagation for Training Autoencoders against Adversarial
  Attack
Double Backpropagation for Training Autoencoders against Adversarial Attack
Chengjin Sun
Sizhe Chen
Xiaolin Huang
SILMAAML
81
5
0
04 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
  Adversarial Robustness
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OODAAML
129
67
0
02 Mar 2020
Dam Burst: A region-merging-based image segmentation method
Dam Burst: A region-merging-based image segmentation method
Rui Tang
Wenlong Song
Xiao-Yu Guan
Huibin Ge
Deke Kong
23
1
0
26 Feb 2020
Automatic Shortcut Removal for Self-Supervised Representation Learning
Automatic Shortcut Removal for Self-Supervised Representation Learning
Matthias Minderer
Olivier Bachem
N. Houlsby
Michael Tschannen
SSL
94
73
0
20 Feb 2020
Identifying Audio Adversarial Examples via Anomalous Pattern Detection
Identifying Audio Adversarial Examples via Anomalous Pattern Detection
Victor Akinwande
C. Cintas
Skyler Speakman
Srihari Sridharan
AAML
73
17
0
13 Feb 2020
AI safety: state of the field through quantitative lens
AI safety: state of the field through quantitative lens
Mislav Juric
A. Sandic
Mario Brčič
100
24
0
12 Feb 2020
From Data to Actions in Intelligent Transportation Systems: a
  Prescription of Functional Requirements for Model Actionability
From Data to Actions in Intelligent Transportation Systems: a Prescription of Functional Requirements for Model Actionability
I. Laña
J. S. Medina
E. Vlahogianni
Javier Del Ser
108
52
0
06 Feb 2020
Challenges and Countermeasures for Adversarial Attacks on Deep
  Reinforcement Learning
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
Inaam Ilahi
Muhammad Usama
Junaid Qadir
M. Janjua
Ala I. Al-Fuqaha
D. Hoang
Dusit Niyato
AAML
147
137
0
27 Jan 2020
Analyzing the Noise Robustness of Deep Neural Networks
Analyzing the Noise Robustness of Deep Neural Networks
Kelei Cao
Mengchen Liu
Hang Su
Jing Wu
Jun Zhu
Shixia Liu
AAML
140
91
0
26 Jan 2020
On the human evaluation of audio adversarial examples
On the human evaluation of audio adversarial examples
Jon Vadillo
Roberto Santana
AAML
55
3
0
23 Jan 2020
A Review on Generative Adversarial Networks: Algorithms, Theory, and
  Applications
A Review on Generative Adversarial Networks: Algorithms, Theory, and Applications
Jie Gui
Zhenan Sun
Yonggang Wen
Dacheng Tao
Jieping Ye
EGVM
111
847
0
20 Jan 2020
A Little Fog for a Large Turn
A Little Fog for a Large Turn
Harshitha Machiraju
V. Balasubramanian
AAML
69
10
0
16 Jan 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie Yang
Xiaolin Huang
AAML
121
105
0
16 Jan 2020
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning
R. Schuster
Tal Schuster
Yoav Meri
Vitaly Shmatikov
AAML
73
39
0
14 Jan 2020
Guess First to Enable Better Compression and Adversarial Robustness
Guess First to Enable Better Compression and Adversarial Robustness
Sicheng Zhu
Bang An
Shiyu Niu
AAML
44
0
0
10 Jan 2020
PaRoT: A Practical Framework for Robust Deep Neural Network Training
PaRoT: A Practical Framework for Robust Deep Neural Network Training
Edward W. Ayers
Francisco Eiras
Majd Hawasly
I. Whiteside
OOD
97
19
0
07 Jan 2020
PrivacyNet: Semi-Adversarial Networks for Multi-attribute Face Privacy
PrivacyNet: Semi-Adversarial Networks for Multi-attribute Face Privacy
Vahid Mirjalili
S. Raschka
Arun Ross
PICVCVBM
97
104
0
02 Jan 2020
Deep Representation Learning in Speech Processing: Challenges, Recent
  Advances, and Future Trends
Deep Representation Learning in Speech Processing: Challenges, Recent Advances, and Future Trends
S. Latif
R. Rana
Sara Khalifa
Raja Jurdak
Junaid Qadir
Björn W. Schuller
AI4TS
104
82
0
02 Jan 2020
Explainability and Adversarial Robustness for RNNs
Explainability and Adversarial Robustness for RNNs
Alexander Hartl
Maximilian Bachl
J. Fabini
Tanja Zseby
AAML
59
32
0
20 Dec 2019
What Else Can Fool Deep Learning? Addressing Color Constancy Errors on
  Deep Neural Network Performance
What Else Can Fool Deep Learning? Addressing Color Constancy Errors on Deep Neural Network Performance
Mahmoud Afifi
M. Brown
AAML
86
115
0
15 Dec 2019
Deep Learning-Based Feature-Aware Data Modeling for Complex Physics
  Simulations
Deep Learning-Based Feature-Aware Data Modeling for Complex Physics Simulations
Qun Liu
Subhashis Hazarika
J. Patchett
J. Ahrens
Ayan Biswas
AI4CE
38
3
0
08 Dec 2019
A Survey of Black-Box Adversarial Attacks on Computer Vision Models
A Survey of Black-Box Adversarial Attacks on Computer Vision Models
Siddhant Bhambri
Sumanyu Muku
Avinash Tulasi
Arun Balaji Buduru
AAMLVLM
83
79
0
03 Dec 2019
Square Attack: a query-efficient black-box adversarial attack via random
  search
Square Attack: a query-efficient black-box adversarial attack via random search
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
Matthias Hein
AAML
195
997
0
29 Nov 2019
Universal adversarial examples in speech command classification
Universal adversarial examples in speech command classification
Jon Vadillo
Roberto Santana
AAML
91
30
0
22 Nov 2019
Analysis of Deep Networks for Monocular Depth Estimation Through
  Adversarial Attacks with Proposal of a Defense Method
Analysis of Deep Networks for Monocular Depth Estimation Through Adversarial Attacks with Proposal of a Defense Method
Junjie Hu
Takayuki Okatani
AAMLMDE
67
17
0
20 Nov 2019
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
127
105
0
13 Nov 2019
The Threat of Adversarial Attacks on Machine Learning in Network
  Security -- A Survey
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Olakunle Ibitoye
Rana Abou-Khamis
Mohamed el Shehaby
Ashraf Matrawy
M. O. Shafiq
AAML
104
70
0
06 Nov 2019
DLA: Dense-Layer-Analysis for Adversarial Example Detection
DLA: Dense-Layer-Analysis for Adversarial Example Detection
Philip Sperl
Ching-yu Kao
Peng Chen
Konstantin Böttinger
AAML
61
34
0
05 Nov 2019
Adversarial Example in Remote Sensing Image Recognition
Adversarial Example in Remote Sensing Image Recognition
Li Chen
Guowei Zhu
Qi Li
Haifeng Li
AAML
60
27
0
29 Oct 2019
Previous
123...106789
Next