ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.07945
  4. Cited By
Maximal Jacobian-based Saliency Map Attack

Maximal Jacobian-based Saliency Map Attack

23 August 2018
R. Wiyatno
Anqi Xu
    AAML
ArXivPDFHTML

Papers citing "Maximal Jacobian-based Saliency Map Attack"

17 / 17 papers shown
Title
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Shashank Kapoor
Sanjay Surendranath Girija
Lakshit Arora
Dipen Pradhan
Ankit Shetgaonkar
Aman Raj
AAML
77
0
0
06 May 2025
NeuralSentinel: Safeguarding Neural Network Reliability and
  Trustworthiness
NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness
Xabier Echeberria-Barrio
Mikel Gorricho
Selene Valencia
Francesco Zola
AAML
31
1
0
12 Feb 2024
Impact of Light and Shadow on Robustness of Deep Neural Networks
Impact of Light and Shadow on Robustness of Deep Neural Networks
Chen-Hao Hu
Weiwen Shi
Chaoxian Li
Jialiang Sun
Donghua Wang
Jun Wu
Guijian Tang
AAML
25
1
0
23 May 2023
Towards Understanding and Boosting Adversarial Transferability from a
  Distribution Perspective
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Yao Zhu
YueFeng Chen
Xiaodan Li
Kejiang Chen
Yuan He
Xiang Tian
Bo Zheng
Yao-wu Chen
Qingming Huang
AAML
33
58
0
09 Oct 2022
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Adversarial Color Projection: A Projector-based Physical Attack to DNNs
Chen-Hao Hu
Weiwen Shi
Ling Tian
AAML
38
3
0
19 Sep 2022
Impact of Colour Variation on Robustness of Deep Neural Networks
Impact of Colour Variation on Robustness of Deep Neural Networks
Chen-Hao Hu
Weiwen Shi
AAML
OOD
25
1
0
02 Sep 2022
A Tutorial on Adversarial Learning Attacks and Countermeasures
A Tutorial on Adversarial Learning Attacks and Countermeasures
Cato Pauling
Michael Gimson
Muhammed Qaid
Ahmad Kida
Basel Halak
AAML
25
11
0
21 Feb 2022
Sparse Adversarial Video Attacks with Spatial Transformations
Sparse Adversarial Video Attacks with Spatial Transformations
Ronghui Mu
Wenjie Ruan
Leandro Soriano Marcolino
Q. Ni
AAML
32
18
0
10 Nov 2021
Adversarial Token Attacks on Vision Transformers
Adversarial Token Attacks on Vision Transformers
Ameya Joshi
Gauri Jagatap
C. Hegde
ViT
30
19
0
08 Oct 2021
Signal Transformer: Complex-valued Attention and Meta-Learning for
  Signal Recognition
Signal Transformer: Complex-valued Attention and Meta-Learning for Signal Recognition
Yihong Dong
Ying Peng
Muqiao Yang
Songtao Lu
Qingjiang Shi
49
9
0
05 Jun 2021
Launching Adversarial Attacks against Network Intrusion Detection
  Systems for IoT
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Pavlos Papadopoulos
Oliver Thornewill von Essen
Nikolaos Pitropakis
C. Chrysoulas
Alexios Mylonas
William J. Buchanan
AAML
33
50
0
26 Apr 2021
Class-Aware Robust Adversarial Training for Object Detection
Class-Aware Robust Adversarial Training for Object Detection
Pin-Chun Chen
Bo-Han Kung
Jun-Cheng Chen
AAML
ObjD
26
48
0
30 Mar 2021
Detecting Adversarial Examples by Input Transformations, Defense
  Perturbations, and Voting
Detecting Adversarial Examples by Input Transformations, Defense Perturbations, and Voting
F. Nesti
Alessandro Biondi
Giorgio Buttazzo
AAML
15
39
0
27 Jan 2021
Robust Machine Learning Systems: Challenges, Current Trends,
  Perspectives, and the Road Ahead
Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead
Mohamed Bennai
Mahum Naseer
T. Theocharides
C. Kyrkou
O. Mutlu
Lois Orosa
Jungwook Choi
OOD
81
100
0
04 Jan 2021
Probabilistic Jacobian-based Saliency Maps Attacks
Probabilistic Jacobian-based Saliency Maps Attacks
Théo Combey
António Loison
Maxime Faucher
H. Hajri
AAML
21
19
0
12 Jul 2020
Breaking certified defenses: Semantic adversarial examples with spoofed
  robustness certificates
Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Amin Ghiasi
Ali Shafahi
Tom Goldstein
33
55
0
19 Mar 2020
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
332
5,849
0
08 Jul 2016
1