ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.00553
  4. Cited By
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A
  Survey
v1v2v3 (latest)

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

2 January 2018
Naveed Akhtar
Ajmal Mian
    AAML
ArXiv (abs)PDFHTML

Papers citing "Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey"

50 / 462 papers shown
Title
Bayesian Anomaly Detection and Classification
Bayesian Anomaly Detection and Classification
E. Roberts
Bruce A. Bassett
Michelle Lochner
45
12
0
22 Feb 2019
Going Deep in Medical Image Analysis: Concepts, Methods, Challenges and
  Future Directions
Going Deep in Medical Image Analysis: Concepts, Methods, Challenges and Future Directions
F. Altaf
Syed Mohammed Shamsul Islam
Naveed Akhtar
N. Janjua
OOD
113
201
0
15 Feb 2019
A Comprehensive Overview of Biometric Fusion
A Comprehensive Overview of Biometric Fusion
Maneet Singh
Richa Singh
Arun Ross
88
190
0
08 Feb 2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via
  Adversarial Examples
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Derui Wang
Chaoran Li
S. Wen
Qing-Long Han
Surya Nepal
Xiangyu Zhang
Yang Xiang
AAML
84
41
0
06 Feb 2019
Augmenting Model Robustness with Transformation-Invariant Attacks
Augmenting Model Robustness with Transformation-Invariant Attacks
Houpu Yao
Zhe Wang
Guangyu Nie
Yassine Mazboudi
Yezhou Yang
Yi Ren
AAMLOOD
33
3
0
31 Jan 2019
Defense Methods Against Adversarial Examples for Recurrent Neural
  Networks
Defense Methods Against Adversarial Examples for Recurrent Neural Networks
Ishai Rosenberg
A. Shabtai
Yuval Elovici
Lior Rokach
AAMLGAN
81
42
0
28 Jan 2019
An Information-Theoretic Explanation for the Adversarial Fragility of AI
  Classifiers
An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers
Hui Xie
Jirong Yi
Weiyu Xu
R. Mudumbai
AAML
49
3
0
27 Jan 2019
Sensitivity Analysis of Deep Neural Networks
Sensitivity Analysis of Deep Neural Networks
Hai Shu
Hongtu Zhu
AAML
46
53
0
22 Jan 2019
Adversarial Attacks on Deep Learning Models in Natural Language
  Processing: A Survey
Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey
W. Zhang
Quan Z. Sheng
A. Alhazmi
Chenliang Li
AAML
125
57
0
21 Jan 2019
Image Super-Resolution as a Defense Against Adversarial Attacks
Image Super-Resolution as a Defense Against Adversarial Attacks
Aamir Mustafa
Salman H. Khan
Munawar Hayat
Jianbing Shen
Ling Shao
AAMLSupR
102
176
0
07 Jan 2019
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical
  Study
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study
Xurong Li
S. Ji
Men Han
Juntao Ji
Zhenyu Ren
Yushan Liu
Chunming Wu
AAML
96
31
0
04 Jan 2019
Adversarial CAPTCHAs
Adversarial CAPTCHAs
Chenghui Shi
Xiaogang Xu
S. Ji
Kai Bu
Jianhai Chen
R. Beyah
Ting Wang
AAML
51
53
0
04 Jan 2019
A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for
  Deep Neural Networks
A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for Deep Neural Networks
Long Zhang
Xuechao Sun
Yong Li
Zhenyu Zhang
AAML
53
22
0
01 Jan 2019
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased
  robustness in adversarial settings
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings
François Menet
Paul Berthier
José M. Fernandez
M. Gagnon
AAML
27
10
0
17 Dec 2018
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on
  Generation of Adversarial Examples
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples
E. Balda
Arash Behboodi
R. Mathar
AAML
34
5
0
15 Dec 2018
Disentangling Adversarial Robustness and Generalization
Disentangling Adversarial Robustness and Generalization
David Stutz
Matthias Hein
Bernt Schiele
AAMLOOD
319
285
0
03 Dec 2018
Universal Perturbation Attack Against Image Retrieval
Universal Perturbation Attack Against Image Retrieval
Jie Li
Rongrong Ji
Hong Liu
Xiaopeng Hong
Yue Gao
Q. Tian
AAML
110
100
0
03 Dec 2018
SentiNet: Detecting Localized Universal Attacks Against Deep Learning
  Systems
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
Edward Chou
Florian Tramèr
Giancarlo Pellegrino
AAML
242
295
0
02 Dec 2018
Transferable Adversarial Attacks for Image and Video Object Detection
Transferable Adversarial Attacks for Image and Video Object Detection
Xingxing Wei
Siyuan Liang
Ning Chen
Xiaochun Cao
AAML
166
225
0
30 Nov 2018
Attacks on State-of-the-Art Face Recognition using Attentional
  Adversarial Attack Generative Network
Attacks on State-of-the-Art Face Recognition using Attentional Adversarial Attack Generative Network
Q. Song
Yingqi Wu
Lu Yang
AAMLCVBMGAN
127
98
0
29 Nov 2018
Parametric Noise Injection: Trainable Randomness to Improve Deep Neural
  Network Robustness against Adversarial Attack
Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness against Adversarial Attack
Adnan Siraj Rakin
Zhezhi He
Deliang Fan
AAML
69
292
0
22 Nov 2018
Strength in Numbers: Trading-off Robustness and Computation via
  Adversarially-Trained Ensembles
Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Edward Grefenstette
Robert Stanforth
Brendan O'Donoghue
J. Uesato
G. Swirszcz
Pushmeet Kohli
AAML
80
18
0
22 Nov 2018
Detecting Adversarial Perturbations Through Spatial Behavior in
  Activation Spaces
Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces
Ziv Katzir
Yuval Elovici
AAML
60
26
0
22 Nov 2018
Recognizing Disguised Faces in the Wild
Recognizing Disguised Faces in the Wild
Maneet Singh
Richa Singh
Mayank Vatsa
Nalini Ratha
Rama Chellappa
CVBM
78
55
0
21 Nov 2018
Convolutional Neural Networks with Transformed Input based on Robust
  Tensor Network Decomposition
Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition
Jenn-Bing Ong
W. Ng
C.-C. Jay Kuo
AAML
59
0
0
20 Nov 2018
Mathematical Analysis of Adversarial Attacks
Mathematical Analysis of Adversarial Attacks
Zehao Dou
Stanley J. Osher
Bao Wang
AAML
67
18
0
15 Nov 2018
On the Transferability of Adversarial Examples Against CNN-Based Image
  Forensics
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
Mauro Barni
Kassem Kallas
Ehsan Nowroozi
B. Tondi
AAML
71
34
0
05 Nov 2018
Improving Adversarial Robustness by Encouraging Discriminative Features
Improving Adversarial Robustness by Encouraging Discriminative Features
Chirag Agarwal
Anh Totti Nguyen
Dan Schonfeld
OOD
70
5
0
01 Nov 2018
A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and
  Vulnerabilities
A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities
Amara Dinesh Kumar
Koti Naga
Renu Chebrolu
Kp Soman
AAML
36
31
0
03 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
150
684
0
28 Sep 2018
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge
  and the Way Forward
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward
Muhammad Usama
Junaid Qadir
Ala I. Al-Fuqaha
AAML
53
20
0
26 Sep 2018
Exploring the Vulnerability of Single Shot Module in Object Detectors
  via Imperceptible Background Patches
Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches
Yuezun Li
Xiao Bian
Ming-Ching Chang
Siwei Lyu
AAMLObjD
78
31
0
16 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
76
235
0
13 Sep 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
84
13
0
08 Aug 2018
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study
Aditya K
Slawomir Grzonkowski
NhienAn Lekhac
44
27
0
03 Aug 2018
Generalization Error in Deep Learning
Generalization Error in Deep Learning
Daniel Jakubovitz
Raja Giryes
M. Rodrigues
AI4CE
244
111
0
03 Aug 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity
  of A3C Path Finding
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Tong Chen
Wenjia Niu
Yingxiao Xiang
XiaoXuan Bai
Jiqiang Liu
Zhen Han
Gang Li
AAML
62
24
0
18 Jul 2018
Deep Learning in the Wild
Deep Learning in the Wild
Thilo Stadelmann
Mohammadreza Amirian
Ismail Arabaci
M. Arnold
G. Duivesteijn
...
Melanie Geiger
Stefan Lörwald
B. Meier
Katharina Rombach
Lukas Tuggener
67
42
0
13 Jul 2018
Attack and defence in cellular decision-making: lessons from machine
  learning
Attack and defence in cellular decision-making: lessons from machine learning
Thomas J. Rademaker
Emmanuel Bengio
P. Franccois
AAML
51
4
0
10 Jul 2018
Local Gradients Smoothing: Defense against localized adversarial attacks
Local Gradients Smoothing: Defense against localized adversarial attacks
Muzammal Naseer
Salman H. Khan
Fatih Porikli
AAML
106
163
0
03 Jul 2018
Hardware Trojan Attacks on Neural Networks
Hardware Trojan Attacks on Neural Networks
Joseph Clements
Yingjie Lao
AAML
78
89
0
14 Jun 2018
Adversarial Attacks on Face Detectors using Neural Net based Constrained
  Optimization
Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization
A. Bose
P. Aarabi
AAML
70
89
0
31 May 2018
Training verified learners with learned verifiers
Training verified learners with learned verifiers
Krishnamurthy Dvijotham
Sven Gowal
Robert Stanforth
Relja Arandjelović
Brendan O'Donoghue
J. Uesato
Pushmeet Kohli
OOD
114
170
0
25 May 2018
Bidirectional Learning for Robust Neural Networks
Bidirectional Learning for Robust Neural Networks
S. Pontes-Filho
Marcus Liwicki
70
9
0
21 May 2018
Featurized Bidirectional GAN: Adversarial Defense via Adversarially
  Learned Semantic Inference
Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference
Ruying Bao
Sihang Liang
Qingcan Wang
GANAAML
71
14
0
21 May 2018
VectorDefense: Vectorization as a Defense to Adversarial Examples
VectorDefense: Vectorization as a Defense to Adversarial Examples
V. Kabilan
Brandon L. Morris
Anh Totti Nguyen
AAML
66
21
0
23 Apr 2018
ADef: an Iterative Algorithm to Construct Adversarial Deformations
ADef: an Iterative Algorithm to Construct Adversarial Deformations
Rima Alaifari
Giovanni S. Alberti
Tandri Gauksson
AAML
112
97
0
20 Apr 2018
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object
  Detector
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
Shang-Tse Chen
Cory Cornelius
Jason Martin
Duen Horng Chau
ObjD
251
429
0
16 Apr 2018
Defending against Adversarial Images using Basis Functions
  Transformations
Defending against Adversarial Images using Basis Functions Transformations
Uri Shaham
J. Garritano
Yutaro Yamada
Ethan Weinberger
A. Cloninger
Xiuyuan Cheng
Kelly P. Stanton
Y. Kluger
AAML
69
57
0
28 Mar 2018
Previous
123...1089
Next