ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.08352
  4. Cited By
Unrestricted Adversarial Examples

Unrestricted Adversarial Examples

22 September 2018
Tom B. Brown
Nicholas Carlini
Chiyuan Zhang
Catherine Olsson
Paul Christiano
Ian Goodfellow
    AAML
ArXivPDFHTML

Papers citing "Unrestricted Adversarial Examples"

28 / 28 papers shown
Title
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
Zihao Pan
Weibin Wu
Yuhang Cao
Zibin Zheng
DiffM
AAML
65
1
0
03 Oct 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
36
6
0
11 Feb 2024
Sparse and Transferable Universal Singular Vectors Attack
Sparse and Transferable Universal Singular Vectors Attack
Kseniia Kuvshinova
Olga Tsymboi
Ivan V. Oseledets
AAML
38
0
0
25 Jan 2024
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake
  Detection
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Weijie Wang
Zhengyu Zhao
N. Sebe
Bruno Lepri
AAML
37
2
0
03 Sep 2023
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A
  Survey
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey
Hanieh Naderi
Ivan V. Bajić
3DPC
31
7
0
01 Jul 2023
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters
  Substitution
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
16
0
0
31 Aug 2022
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Dongbin Na
Sangwoo Ji
Jong Kim
AAML
35
17
0
24 Aug 2022
Adversarial Training for High-Stakes Reliability
Adversarial Training for High-Stakes Reliability
Daniel M. Ziegler
Seraphina Nix
Lawrence Chan
Tim Bauman
Peter Schmidt-Nielsen
...
Noa Nabeshima
Benjamin Weinstein-Raun
D. Haas
Buck Shlegeris
Nate Thomas
AAML
32
59
0
03 May 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
24
0
16 Mar 2022
LTD: Low Temperature Distillation for Robust Adversarial Training
LTD: Low Temperature Distillation for Robust Adversarial Training
Erh-Chung Chen
Che-Rung Lee
AAML
24
26
0
03 Nov 2021
Adversarial Attack by Limited Point Cloud Surface Modifications
Adversarial Attack by Limited Point Cloud Surface Modifications
Atrin Arya
Hanieh Naderi
S. Kasaei
AAML
3DPC
37
4
0
07 Oct 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Generating Unrestricted Adversarial Examples via Three Parameters
Generating Unrestricted Adversarial Examples via Three Parameters
Hanieh Naderi
Leili Goli
S. Kasaei
38
8
0
13 Mar 2021
Composite Adversarial Attacks
Composite Adversarial Attacks
Xiaofeng Mao
YueFeng Chen
Shuhui Wang
Hang Su
Yuan He
Hui Xue
AAML
30
47
0
10 Dec 2020
Adversarial Training against Location-Optimized Adversarial Patches
Adversarial Training against Location-Optimized Adversarial Patches
Sukrut Rao
David Stutz
Bernt Schiele
AAML
13
91
0
05 May 2020
Adversarial Attacks and Defenses: An Interpretation Perspective
Adversarial Attacks and Defenses: An Interpretation Perspective
Ninghao Liu
Mengnan Du
Ruocheng Guo
Huan Liu
Xia Hu
AAML
26
8
0
23 Apr 2020
Breaking certified defenses: Semantic adversarial examples with spoofed
  robustness certificates
Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Amin Ghiasi
Ali Shafahi
Tom Goldstein
33
55
0
19 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
  Adversarial Robustness
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OOD
AAML
58
63
0
02 Mar 2020
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Ziwen He
Wei Wang
Jing Dong
Tieniu Tan
AAML
22
23
0
22 Feb 2020
Random Smoothing Might be Unable to Certify $\ell_\infty$ Robustness for
  High-Dimensional Images
Random Smoothing Might be Unable to Certify ℓ∞\ell_\inftyℓ∞​ Robustness for High-Dimensional Images
Avrim Blum
Travis Dick
N. Manoj
Hongyang R. Zhang
AAML
18
79
0
10 Feb 2020
Fine-grained Synthesis of Unrestricted Adversarial Examples
Fine-grained Synthesis of Unrestricted Adversarial Examples
Omid Poursaeed
Tianxing Jiang
Yordanos Goshu
Harry Yang
Serge J. Belongie
Ser-Nam Lim
AAML
35
13
0
20 Nov 2019
Natural Adversarial Examples
Natural Adversarial Examples
Dan Hendrycks
Kevin Zhao
Steven Basart
Jacob Steinhardt
D. Song
OODD
53
1,419
0
16 Jul 2019
Collaborative Sampling in Generative Adversarial Networks
Collaborative Sampling in Generative Adversarial Networks
Yuejiang Liu
Parth Kothari
Alexandre Alahi
TTA
28
16
0
02 Feb 2019
Rigorous Agent Evaluation: An Adversarial Approach to Uncover
  Catastrophic Failures
Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Junhui Yin
Jiayan Qiu
Csaba Szepesvári
Siqing Zhang
Avraham Ruderman
Jiyang Xie
Krishnamurthy Dvijotham
Zhanyu Ma
N. Heess
Pushmeet Kohli
AAML
15
80
0
04 Dec 2018
Scalable agent alignment via reward modeling: a research direction
Scalable agent alignment via reward modeling: a research direction
Jan Leike
David M. Krueger
Tom Everitt
Miljan Martic
Vishal Maini
Shane Legg
34
395
0
19 Nov 2018
Excessive Invariance Causes Adversarial Vulnerability
Excessive Invariance Causes Adversarial Vulnerability
J. Jacobsen
Jens Behrmann
R. Zemel
Matthias Bethge
AAML
20
166
0
01 Nov 2018
Certified Adversarial Robustness with Additive Noise
Certified Adversarial Robustness with Additive Noise
Bai Li
Changyou Chen
Wenlin Wang
Lawrence Carin
AAML
28
341
0
10 Sep 2018
Google's Neural Machine Translation System: Bridging the Gap between
  Human and Machine Translation
Google's Neural Machine Translation System: Bridging the Gap between Human and Machine Translation
Yonghui Wu
M. Schuster
Z. Chen
Quoc V. Le
Mohammad Norouzi
...
Alex Rudnick
Oriol Vinyals
G. Corrado
Macduff Hughes
J. Dean
AIMat
716
6,746
0
26 Sep 2016
1