Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1801.02610
Cited By
Generating Adversarial Examples with Adversarial Networks
8 January 2018
Chaowei Xiao
Bo-wen Li
Jun-Yan Zhu
Warren He
M. Liu
D. Song
GAN
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Generating Adversarial Examples with Adversarial Networks"
50 / 135 papers shown
Title
Towards Assessing Deep Learning Test Input Generators
Seif Mzoughi
Ahmed Hajyahmed
Mohamed Elshafei
Foutse Khomh anb Diego Elias Costa
D. Costa
AAML
40
0
0
03 Apr 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
192
0
0
28 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
52
0
0
16 Feb 2025
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Yixiao Chen
Shikun Sun
Jianshu Li
Ruoyu Li
Zhe Li
Junliang Xing
AAML
109
0
0
04 Feb 2025
Transferable Adversarial Face Attack with Text Controlled Attribute
Wenyun Li
Zheng Zhang
X. Lan
D. Jiang
AAML
83
1
0
16 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffM
AAML
95
1
0
16 Dec 2024
Deep generative models as an adversarial attack strategy for tabular machine learning
Salijona Dyrmishi
Mihaela C. Stoian
Eleonora Giunchiglia
Maxime Cordy
AAML
LMTD
31
0
0
19 Sep 2024
Exploiting the Layered Intrinsic Dimensionality of Deep Models for Practical Adversarial Training
Enes Altinisik
Safa Messaoud
Husrev Taha Sencar
Hassan Sajjad
Sanjay Chawla
AAML
48
0
0
27 May 2024
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
40
3
0
21 Feb 2024
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
18
0
0
12 Dec 2023
A Survey of Adversarial CAPTCHAs on its History, Classification and Generation
Zisheng Xu
Qiao Yan
Fei Yu
Victor C.M. Leung
AAML
29
1
0
22 Nov 2023
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Long Zhuo
Shenghai Luo
Shunquan Tan
Han Chen
Bin Li
Jiwu Huang
AAML
32
0
0
16 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
52
50
0
18 May 2023
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
52
18
0
20 Apr 2023
Generating Adversarial Attacks in the Latent Space
Nitish Shukla
Sudipta Banerjee
33
8
0
10 Apr 2023
D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation Operators
Xin Zhang
Yuqi Song
Xiang Wang
Fei Zuo
MedIm
DiffM
15
2
0
03 Apr 2023
Physically Adversarial Infrared Patches with Learnable Shapes and Locations
Xingxing Wei
Jie Yu
Yao Huang
AAML
39
38
0
24 Mar 2023
Boosting Verified Training for Robust Image Classifications via Abstraction
Zhaodi Zhang
Zhiyi Xue
Yang Chen
Si Liu
Yueling Zhang
Qingbin Liu
Min Zhang
51
4
0
21 Mar 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
Jinwei Wang
Hao Wu
Haihua Wang
Jiawei Zhang
X. Luo
Bin Ma
AAML
28
0
0
08 Mar 2023
Less is More: Data Pruning for Faster Adversarial Training
Yize Li
Pu Zhao
X. Lin
B. Kailkhura
Ryan Goldh
AAML
15
9
0
23 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Semantic Adversarial Attacks on Face Recognition through Significant Attributes
Yasmeen M. Khedr
Yifeng Xiong
Kun He
AAML
31
2
0
28 Jan 2023
Meta Generative Attack on Person Reidentification
M. I. A V Subramanyam
AAML
28
8
0
16 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
34
27
0
01 Jan 2023
Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles
Hyung-Jin Yoon
H. Jafarnejadsani
P. Voulgaris
AAML
19
5
0
28 Dec 2022
Learning Antidote Data to Individual Unfairness
Peizhao Li
Ethan Xia
Hongfu Liu
FedML
FaML
24
9
0
29 Nov 2022
Localized Shortcut Removal
Nicolas M. Muller
Jochen Jacobs
Jennifer Williams
Konstantin Böttinger
25
0
0
24 Nov 2022
Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor
Zhao Yang
Fengyang Deng
Linxi Han
13
2
0
25 Oct 2022
Towards Generating Adversarial Examples on Mixed-type Data
Han Xu
Menghai Pan
Zhimeng Jiang
Huiyuan Chen
Xiaoting Li
Mahashweta Das
Hao Yang
AAML
SILM
18
0
0
17 Oct 2022
On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses
Anshuman Chhabra
Ashwin Sekhari
P. Mohapatra
OOD
AAML
45
8
0
04 Oct 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
Ulugbek S. Kamilov
A. Roy-Chowdhury
AAML
51
17
0
20 Sep 2022
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Yulong Cao
Chaowei Xiao
Anima Anandkumar
Danfei Xu
Marco Pavone
AAML
32
64
0
19 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition
Qidong Huang
Xiaoyi Dong
Dongdong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
32
12
0
16 Sep 2022
CARE: Certifiably Robust Learning with Reasoning via Variational Inference
Jiawei Zhang
Linyi Li
Ce Zhang
Bo-wen Li
AAML
OOD
43
8
0
12 Sep 2022
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
16
0
0
31 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
18
15
0
19 Aug 2022
Discovering Bugs in Vision Models using Off-the-shelf Image Generation and Captioning
Olivia Wiles
Isabela Albuquerque
Sven Gowal
VLM
43
47
0
18 Aug 2022
Adversarial Camouflage for Node Injection Attack on Graphs
Shuchang Tao
Qi Cao
Huawei Shen
Yunfan Wu
Liang Hou
Fei Sun
Xueqi Cheng
AAML
GNN
30
21
0
03 Aug 2022
Decorrelative Network Architecture for Robust Electrocardiogram Classification
Christopher Wiedeman
Ge Wang
OOD
13
2
0
19 Jul 2022
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
47
8
0
14 Jun 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
25
55
0
12 May 2022
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
22
27
0
30 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
25
28
0
26 Apr 2022
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
Zhuang Qian
Kaizhu Huang
Qiufeng Wang
Xu-Yao Zhang
OOD
AAML
ObjD
54
72
0
26 Mar 2022
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning
Gorka Abad
Servio Paguada
Oguzhan Ersoy
S. Picek
Víctor Julio Ramírez-Durán
A. Urbieta
FedML
29
6
0
16 Mar 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GAN
AAML
17
14
0
13 Mar 2022
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
25
5
0
22 Feb 2022
Robust Reinforcement Learning via Genetic Curriculum
Yeeho Song
J. Schneider
29
9
0
17 Feb 2022
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition
Hanrui Wang
Shuo Wang
Zhe Jin
Yandan Wang
Cunjian Chen
Massimo Tistarelli
AAML
24
16
0
11 Jan 2022
1
2
3
Next