ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.02610
  4. Cited By
Generating Adversarial Examples with Adversarial Networks

Generating Adversarial Examples with Adversarial Networks

8 January 2018
Chaowei Xiao
Bo-wen Li
Jun-Yan Zhu
Warren He
M. Liu
D. Song
    GAN
    AAML
ArXivPDFHTML

Papers citing "Generating Adversarial Examples with Adversarial Networks"

50 / 135 papers shown
Title
Towards Assessing Deep Learning Test Input Generators
Towards Assessing Deep Learning Test Input Generators
Seif Mzoughi
Ahmed Hajyahmed
Mohamed Elshafei
Foutse Khomh anb Diego Elias Costa
D. Costa
AAML
40
0
0
03 Apr 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
192
0
0
28 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
52
0
0
16 Feb 2025
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Dual-Flow: Transferable Multi-Target, Instance-Agnostic Attacks via In-the-wild Cascading Flow Optimization
Yixiao Chen
Shikun Sun
Jianshu Li
Ruoyu Li
Zhe Li
Junliang Xing
AAML
109
0
0
04 Feb 2025
Transferable Adversarial Face Attack with Text Controlled Attribute
Transferable Adversarial Face Attack with Text Controlled Attribute
Wenyun Li
Zheng Zhang
X. Lan
D. Jiang
AAML
83
1
0
16 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffM
AAML
95
1
0
16 Dec 2024
Deep generative models as an adversarial attack strategy for tabular
  machine learning
Deep generative models as an adversarial attack strategy for tabular machine learning
Salijona Dyrmishi
Mihaela C. Stoian
Eleonora Giunchiglia
Maxime Cordy
AAML
LMTD
31
0
0
19 Sep 2024
Exploiting the Layered Intrinsic Dimensionality of Deep Models for
  Practical Adversarial Training
Exploiting the Layered Intrinsic Dimensionality of Deep Models for Practical Adversarial Training
Enes Altinisik
Safa Messaoud
Husrev Taha Sencar
Hassan Sajjad
Sanjay Chawla
AAML
48
0
0
27 May 2024
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement
  Learning
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
40
3
0
21 Feb 2024
DTA: Distribution Transform-based Attack for Query-Limited Scenario
DTA: Distribution Transform-based Attack for Query-Limited Scenario
Renyang Liu
Wei Zhou
Xin Jin
Song Gao
Yuanyu Wang
Ruxin Wang
18
0
0
12 Dec 2023
A Survey of Adversarial CAPTCHAs on its History, Classification and
  Generation
A Survey of Adversarial CAPTCHAs on its History, Classification and Generation
Zisheng Xu
Qiao Yan
Fei Yu
Victor C.M. Leung
AAML
29
1
0
22 Nov 2023
Evading Detection Actively: Toward Anti-Forensics against Forgery
  Localization
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Long Zhuo
Shenghai Luo
Shunquan Tan
Han Chen
Bin Li
Jiwu Huang
AAML
32
0
0
16 Oct 2023
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models
  Against Adversarial Attacks
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks
Yanjie Li
Bin Xie
Songtao Guo
Yuanyuan Yang
Bin Xiao
AAML
40
16
0
01 Oct 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
52
50
0
18 May 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
52
18
0
20 Apr 2023
Generating Adversarial Attacks in the Latent Space
Generating Adversarial Attacks in the Latent Space
Nitish Shukla
Sudipta Banerjee
33
8
0
10 Apr 2023
D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation
  Operators
D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation Operators
Xin Zhang
Yuqi Song
Xiang Wang
Fei Zuo
MedIm
DiffM
15
2
0
03 Apr 2023
Physically Adversarial Infrared Patches with Learnable Shapes and
  Locations
Physically Adversarial Infrared Patches with Learnable Shapes and Locations
Xingxing Wei
Jie Yu
Yao Huang
AAML
39
38
0
24 Mar 2023
Boosting Verified Training for Robust Image Classifications via
  Abstraction
Boosting Verified Training for Robust Image Classifications via Abstraction
Zhaodi Zhang
Zhiyi Xue
Yang Chen
Si Liu
Yueling Zhang
Qingbin Liu
Min Zhang
51
4
0
21 Mar 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the
  Generation of Adversarial Examples
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples
Jinwei Wang
Hao Wu
Haihua Wang
Jiawei Zhang
X. Luo
Bin Ma
AAML
28
0
0
08 Mar 2023
Less is More: Data Pruning for Faster Adversarial Training
Less is More: Data Pruning for Faster Adversarial Training
Yize Li
Pu Zhao
X. Lin
B. Kailkhura
Ryan Goldh
AAML
15
9
0
23 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Semantic Adversarial Attacks on Face Recognition through Significant
  Attributes
Semantic Adversarial Attacks on Face Recognition through Significant Attributes
Yasmeen M. Khedr
Yifeng Xiong
Kun He
AAML
31
2
0
28 Jan 2023
Meta Generative Attack on Person Reidentification
Meta Generative Attack on Person Reidentification
M. I. A V Subramanyam
AAML
28
8
0
16 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
34
27
0
01 Jan 2023
Learning When to Use Adaptive Adversarial Image Perturbations against
  Autonomous Vehicles
Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles
Hyung-Jin Yoon
H. Jafarnejadsani
P. Voulgaris
AAML
19
5
0
28 Dec 2022
Learning Antidote Data to Individual Unfairness
Learning Antidote Data to Individual Unfairness
Peizhao Li
Ethan Xia
Hongfu Liu
FedML
FaML
24
9
0
29 Nov 2022
Localized Shortcut Removal
Localized Shortcut Removal
Nicolas M. Muller
Jochen Jacobs
Jennifer Williams
Konstantin Böttinger
25
0
0
24 Nov 2022
Flexible Android Malware Detection Model based on Generative Adversarial
  Networks with Code Tensor
Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor
Zhao Yang
Fengyang Deng
Linxi Han
13
2
0
25 Oct 2022
Towards Generating Adversarial Examples on Mixed-type Data
Towards Generating Adversarial Examples on Mixed-type Data
Han Xu
Menghai Pan
Zhimeng Jiang
Huiyuan Chen
Xiaoting Li
Mahashweta Das
Hao Yang
AAML
SILM
18
0
0
17 Oct 2022
On the Robustness of Deep Clustering Models: Adversarial Attacks and
  Defenses
On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses
Anshuman Chhabra
Ashwin Sekhari
P. Mohapatra
OOD
AAML
45
8
0
04 Oct 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
Ulugbek S. Kamilov
A. Roy-Chowdhury
AAML
51
17
0
20 Sep 2022
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Yulong Cao
Chaowei Xiao
Anima Anandkumar
Danfei Xu
Marco Pavone
AAML
32
64
0
19 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud
  Recognition
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition
Qidong Huang
Xiaoyi Dong
Dongdong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
32
12
0
16 Sep 2022
CARE: Certifiably Robust Learning with Reasoning via Variational
  Inference
CARE: Certifiably Robust Learning with Reasoning via Variational Inference
Jiawei Zhang
Linyi Li
Ce Zhang
Bo-wen Li
AAML
OOD
43
8
0
12 Sep 2022
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters
  Substitution
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
16
0
0
31 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for
  Image Classifier Models
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
18
15
0
19 Aug 2022
Discovering Bugs in Vision Models using Off-the-shelf Image Generation
  and Captioning
Discovering Bugs in Vision Models using Off-the-shelf Image Generation and Captioning
Olivia Wiles
Isabela Albuquerque
Sven Gowal
VLM
43
47
0
18 Aug 2022
Adversarial Camouflage for Node Injection Attack on Graphs
Adversarial Camouflage for Node Injection Attack on Graphs
Shuchang Tao
Qi Cao
Huawei Shen
Yunfan Wu
Liang Hou
Fei Sun
Xueqi Cheng
AAML
GNN
30
21
0
03 Aug 2022
Decorrelative Network Architecture for Robust Electrocardiogram
  Classification
Decorrelative Network Architecture for Robust Electrocardiogram Classification
Christopher Wiedeman
Ge Wang
OOD
13
2
0
19 Jul 2022
Edge Security: Challenges and Issues
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
47
8
0
14 Jun 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple
  Angles in Real World
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
25
55
0
12 May 2022
Software Testing for Machine Learning
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
22
27
0
30 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection
  Mechanism in Social Networks
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
25
28
0
26 Apr 2022
A Survey of Robust Adversarial Training in Pattern Recognition:
  Fundamental, Theory, and Methodologies
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
Zhuang Qian
Kaizhu Huang
Qiufeng Wang
Xu-Yao Zhang
OOD
AAML
ObjD
54
72
0
26 Mar 2022
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated
  Learning
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning
Gorka Abad
Servio Paguada
Oguzhan Ersoy
S. Picek
Víctor Julio Ramírez-Durán
A. Urbieta
FedML
29
6
0
16 Mar 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GAN
AAML
17
14
0
13 Mar 2022
Universal adversarial perturbation for remote sensing images
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
25
5
0
22 Feb 2022
Robust Reinforcement Learning via Genetic Curriculum
Robust Reinforcement Learning via Genetic Curriculum
Yeeho Song
J. Schneider
29
9
0
17 Feb 2022
Similarity-based Gray-box Adversarial Attack Against Deep Face
  Recognition
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition
Hanrui Wang
Shuo Wang
Zhe Jin
Yandan Wang
Cunjian Chen
Massimo Tistarelli
AAML
24
16
0
11 Jan 2022
123
Next