ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1803.06978
  4. Cited By
Improving Transferability of Adversarial Examples with Input Diversity

Improving Transferability of Adversarial Examples with Input Diversity

19 March 2018
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
    AAML
ArXivPDFHTML

Papers citing "Improving Transferability of Adversarial Examples with Input Diversity"

38 / 238 papers shown
Title
Block-wise Image Transformation with Secret Key for Adversarially Robust
  Defense
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Maungmaung Aprilpyone
Hitoshi Kiya
29
57
0
02 Oct 2020
Improving Query Efficiency of Black-box Adversarial Attack
Improving Query Efficiency of Black-box Adversarial Attack
Yang Bai
Yuyuan Zeng
Yong Jiang
Yisen Wang
Shutao Xia
Weiwei Guo
AAML
MLAU
45
52
0
24 Sep 2020
Adversarial Privacy-preserving Filter
Adversarial Privacy-preserving Filter
Jiaming Zhang
Jitao Sang
Xian Zhao
Xiaowen Huang
Yanfeng Sun
Yongli Hu
PICV
39
41
0
25 Jul 2020
Patch-wise Attack for Fooling Deep Neural Network
Patch-wise Attack for Fooling Deep Neural Network
Lianli Gao
Qilong Zhang
Jingkuan Song
Xianglong Liu
Heng Tao Shen
AAML
32
138
0
14 Jul 2020
Adversarial jamming attacks and defense strategies via adaptive deep
  reinforcement learning
Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning
Feng Wang
Chen Zhong
M. C. Gursoy
Senem Velipasalar
AAML
23
8
0
12 Jul 2020
Generating Adversarial Examples with Controllable Non-transferability
Generating Adversarial Examples with Controllable Non-transferability
Renzhi Wang
Tianwei Zhang
Xiaofei Xie
Lei Ma
Cong Tian
Felix Juefei Xu
Yang Liu
SILM
AAML
17
3
0
02 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
38
51
0
01 Jul 2020
Uncovering the Connections Between Adversarial Transferability and
  Knowledge Transferability
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
38
25
0
25 Jun 2020
Stealing Deep Reinforcement Learning Models for Fun and Profit
Stealing Deep Reinforcement Learning Models for Fun and Profit
Kangjie Chen
Shangwei Guo
Tianwei Zhang
Xiaofei Xie
Yang Liu
MLAU
MIACV
OffRL
24
45
0
09 Jun 2020
A Self-supervised Approach for Adversarial Robustness
A Self-supervised Approach for Adversarial Robustness
Muzammal Naseer
Salman Khan
Munawar Hayat
Fahad Shahbaz Khan
Fatih Porikli
AAML
24
251
0
08 Jun 2020
Ensemble Generative Cleaning with Feedback Loops for Defending
  Adversarial Attacks
Ensemble Generative Cleaning with Feedback Loops for Defending Adversarial Attacks
Jianhe Yuan
Zhihai He
AAML
32
22
0
23 Apr 2020
PatchAttack: A Black-box Texture-based Attack with Reinforcement
  Learning
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning
Chenglin Yang
Adam Kortylewski
Cihang Xie
Yinzhi Cao
Alan Yuille
AAML
45
109
0
12 Apr 2020
Adversarial Light Projection Attacks on Face Recognition Systems: A
  Feasibility Study
Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study
Luan Nguyen
Sunpreet S. Arora
Yuhang Wu
Hao Yang
AAML
25
88
0
24 Mar 2020
Adversarial Attacks on Monocular Depth Estimation
Adversarial Attacks on Monocular Depth Estimation
Ziqi Zhang
Xinge Zhu
Yingwei Li
Xiangqun Chen
Yao Guo
AAML
MDE
30
25
0
23 Mar 2020
Towards Face Encryption by Generating Adversarial Identity Masks
Towards Face Encryption by Generating Adversarial Identity Masks
Xiao Yang
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
YueFeng Chen
H. Xue
AAML
PICV
44
72
0
15 Mar 2020
Adversarial Camouflage: Hiding Physical-World Attacks with Natural
  Styles
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
167
224
0
08 Mar 2020
Disrupting Deepfakes: Adversarial Attacks Against Conditional Image
  Translation Networks and Facial Manipulation Systems
Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems
Nataniel Ruiz
Sarah Adel Bargal
Stan Sclaroff
PICV
AAML
25
119
0
03 Mar 2020
Adversarial Ranking Attack and Defense
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
36
38
0
26 Feb 2020
Skip Connections Matter: On the Transferability of Adversarial Examples
  Generated with ResNets
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
AAML
SILM
25
310
0
14 Feb 2020
Universal Adversarial Attack on Attention and the Resulting Dataset
  DAmageNet
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie Yang
Xiaolin Huang
AAML
31
104
0
16 Jan 2020
Efficient Adversarial Training with Transferable Adversarial Examples
Efficient Adversarial Training with Transferable Adversarial Examples
Haizhong Zheng
Ziqi Zhang
Juncheng Gu
Honglak Lee
A. Prakash
AAML
24
108
0
27 Dec 2019
Benchmarking Adversarial Robustness
Benchmarking Adversarial Robustness
Yinpeng Dong
Qi-An Fu
Xiao Yang
Tianyu Pang
Hang Su
Zihao Xiao
Jun Zhu
AAML
31
36
0
26 Dec 2019
One Man's Trash is Another Man's Treasure: Resisting Adversarial
  Examples by Adversarial Examples
One Man's Trash is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples
Chang Xiao
Changxi Zheng
AAML
25
19
0
25 Nov 2019
Enhancing Cross-task Black-Box Transferability of Adversarial Examples
  with Dispersion Reduction
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Yantao Lu
Yunhan Jia
Jianyu Wang
Bai Li
Weiheng Chai
Lawrence Carin
Senem Velipasalar
AAML
24
81
0
22 Nov 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial
  Attacks
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
J. Hopcroft
AAML
38
555
0
17 Aug 2019
Adversarial Examples for Edge Detection: They Exist, and They Transfer
Adversarial Examples for Edge Detection: They Exist, and They Transfer
Christian Cosgrove
Alan Yuille
AAML
GAN
28
12
0
02 Jun 2019
Cross-Domain Transferability of Adversarial Perturbations
Cross-Domain Transferability of Adversarial Perturbations
Muzammal Naseer
Salman H. Khan
M. H. Khan
Fahad Shahbaz Khan
Fatih Porikli
AAML
33
145
0
28 May 2019
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template
  Updating
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
Giulio Lovisotto
Simon Eberz
Ivan Martinovic
AAML
21
35
0
22 May 2019
Evading Defenses to Transferable Adversarial Examples by
  Translation-Invariant Attacks
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
SILM
AAML
49
830
0
05 Apr 2019
Curls & Whey: Boosting Black-Box Adversarial Attacks
Curls & Whey: Boosting Black-Box Adversarial Attacks
Yucheng Shi
Siyu Wang
Yahong Han
AAML
18
116
0
02 Apr 2019
Adversarial Defense by Restricting the Hidden Space of Deep Neural
  Networks
Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks
Aamir Mustafa
Salman Khan
Munawar Hayat
Roland Göcke
Jianbing Shen
Ling Shao
AAML
17
151
0
01 Apr 2019
Adversarial Attack and Defense on Point Sets
Adversarial Attack and Defense on Point Sets
Jiancheng Yang
Qiang Zhang
Rongyao Fang
Bingbing Ni
Jinxian Liu
Qi Tian
3DPC
24
122
0
28 Feb 2019
Image Super-Resolution as a Defense Against Adversarial Attacks
Image Super-Resolution as a Defense Against Adversarial Attacks
Aamir Mustafa
Salman H. Khan
Munawar Hayat
Jianbing Shen
Ling Shao
AAML
SupR
27
168
0
07 Jan 2019
Learning Transferable Adversarial Examples via Ghost Networks
Learning Transferable Adversarial Examples via Ghost Networks
Yingwei Li
S. Bai
Yuyin Zhou
Cihang Xie
Zhishuai Zhang
Alan Yuille
AAML
42
136
0
09 Dec 2018
CAAD 2018: Generating Transferable Adversarial Examples
CAAD 2018: Generating Transferable Adversarial Examples
Yash Sharma
Tien-Dung Le
M. Alzantot
AAML
SILM
28
7
0
29 Sep 2018
Ensemble Adversarial Training: Attacks and Defenses
Ensemble Adversarial Training: Attacks and Defenses
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
76
2,701
0
19 May 2017
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
312
3,115
0
04 Nov 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
359
5,849
0
08 Jul 2016
Previous
12345