ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.08758
  4. Cited By
Low Frequency Adversarial Perturbation

Low Frequency Adversarial Perturbation

24 September 2018
Chuan Guo
Jared S. Frank
Kilian Q. Weinberger
    AAML
ArXivPDFHTML

Papers citing "Low Frequency Adversarial Perturbation"

37 / 37 papers shown
Title
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
47
0
0
17 Mar 2025
Nearly Zero-Cost Protection Against Mimicry by Personalized Diffusion Models
Nearly Zero-Cost Protection Against Mimicry by Personalized Diffusion Models
Namhyuk Ahn
Kiyoon Yoo
Wonhyuk Ahn
Daesik Kim
Seung-Hun Nam
AAML
WIGM
DiffM
94
0
0
16 Dec 2024
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Towards a Novel Perspective on Adversarial Examples Driven by Frequency
Zhun Zhang
Yi Zeng
Qihe Liu
Shijie Zhou
AAML
39
0
0
16 Apr 2024
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm
Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm
Yanqi Qiao
Dazhuang Liu
Rui Wang
Kaitai Liang
AAML
30
1
0
23 Feb 2024
Towards Transferable Adversarial Attacks with Centralized Perturbation
Towards Transferable Adversarial Attacks with Centralized Perturbation
Shangbo Wu
Yu-an Tan
Yajie Wang
Ruinan Ma
Wencong Ma
Yuan-zhang Li
AAML
35
9
0
11 Dec 2023
Frequency Domain-based Dataset Distillation
Frequency Domain-based Dataset Distillation
DongHyeok Shin
Seungjae Shin
Il-Chul Moon
DD
40
19
0
15 Nov 2023
Understanding the robustness difference between stochastic gradient
  descent and adaptive gradient methods
Understanding the robustness difference between stochastic gradient descent and adaptive gradient methods
A. Ma
Yangchen Pan
Amir-massoud Farahmand
AAML
25
5
0
13 Aug 2023
Exploiting Frequency Spectrum of Adversarial Images for General
  Robustness
Exploiting Frequency Spectrum of Adversarial Images for General Robustness
Chun Yang Tan
K. Kawamoto
Hiroshi Kera
AAML
OOD
34
1
0
15 May 2023
Frequency Decomposition to Tap the Potential of Single Domain for
  Generalization
Frequency Decomposition to Tap the Potential of Single Domain for Generalization
Qing-sheng Yang
Hongjing Niu
Pengfei Xia
Wei Zhang
Bin Li
OOD
39
0
0
14 Apr 2023
Robustmix: Improving Robustness by Regularizing the Frequency Bias of
  Deep Nets
Robustmix: Improving Robustness by Regularizing the Frequency Bias of Deep Nets
Jonas Ngnawé
Marianne Abémgnigni Njifon
Jonathan Heek
Yann N. Dauphin
OOD
24
4
0
06 Apr 2023
Similarity of Neural Architectures using Adversarial Attack
  Transferability
Similarity of Neural Architectures using Adversarial Attack Transferability
Jaehui Hwang
Dongyoon Han
Byeongho Heo
Song Park
Sanghyuk Chun
Jong-Seok Lee
AAML
37
1
0
20 Oct 2022
Testing predictions of representation cost theory with CNNs
Testing predictions of representation cost theory with CNNs
Charles Godfrey
Elise Bishoff
Myles Mckay
Davis Brown
Grayson Jorgenson
Henry Kvinge
E. Byler
28
0
0
03 Oct 2022
Exploring Adversarial Robustness of Vision Transformers in the Spectral
  Perspective
Exploring Adversarial Robustness of Vision Transformers in the Spectral Perspective
Gihyun Kim
Juyeop Kim
Jong-Seok Lee
AAML
ViT
24
4
0
20 Aug 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
34
155
0
12 Jul 2022
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Zeyu Dai
Shengcai Liu
Jiaheng Zhang
Qing Li
AAML
37
11
0
04 Jun 2022
Exploring Frequency Adversarial Attacks for Face Forgery Detection
Exploring Frequency Adversarial Attacks for Face Forgery Detection
Shuai Jia
Chao Ma
Taiping Yao
Bangjie Yin
Shouhong Ding
Xiaokang Yang
AAML
31
62
0
29 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAML
MLAU
19
25
0
16 Mar 2022
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Qilong Zhang
Chaoning Zhang
Chaoning Zhang
Chaoqun Li
Xuanhan Wang
Jingkuan Song
Lianli Gao
AAML
41
21
0
09 Mar 2022
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art
P. Williams
Ke Li
AAML
27
2
0
07 Mar 2022
LPF-Defense: 3D Adversarial Defense based on Frequency Analysis
LPF-Defense: 3D Adversarial Defense based on Frequency Analysis
Hanieh Naderi
Kimia Noorbakhsh
Arian Etemadi
S. Kasaei
AAML
16
12
0
23 Feb 2022
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Xiaosen Wang
Zeliang Zhang
Kangheng Tong
Dihong Gong
Kun He
Zhifeng Li
Wei Liu
AAML
24
56
0
13 Dec 2021
Gradient Frequency Modulation for Visually Explaining Video
  Understanding Models
Gradient Frequency Modulation for Visually Explaining Video Understanding Models
Xinmiao Lin
Wentao Bao
Matthew Wright
Yu Kong
FAtt
AAML
30
2
0
01 Nov 2021
Calibrated Adversarial Training
Calibrated Adversarial Training
Tianjin Huang
Vlado Menkovski
Yulong Pei
Mykola Pechenizkiy
AAML
64
3
0
01 Oct 2021
AdvDrop: Adversarial Attack to DNNs by Dropping Information
AdvDrop: Adversarial Attack to DNNs by Dropping Information
Ranjie Duan
YueFeng Chen
Dantong Niu
Yun Yang
•. A. K. Qin
Yuan He
AAML
24
89
0
20 Aug 2021
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Siyue Wang
Xiao Wang
Pin-Yu Chen
Pu Zhao
Xue Lin
AAML
40
2
0
14 May 2021
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models
  against Adversarial Attacks
Deep Image Destruction: Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Jun-Ho Choi
Huan Zhang
Jun-Hyuk Kim
Cho-Jui Hsieh
Jong-Seok Lee
VLM
27
7
0
30 Apr 2021
Color Channel Perturbation Attacks for Fooling Convolutional Neural
  Networks and A Defense Against Such Attacks
Color Channel Perturbation Attacks for Fooling Convolutional Neural Networks and A Defense Against Such Attacks
Jayendra Kantipudi
S. Dubey
Soumendu Chakraborty
AAML
47
19
0
20 Dec 2020
Adversarial Eigen Attack on Black-Box Models
Adversarial Eigen Attack on Black-Box Models
Linjun Zhou
Peng Cui
Yinan Jiang
Shiqiang Yang
AAML
14
12
0
27 Aug 2020
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
19
66
0
15 Jul 2020
QEBA: Query-Efficient Boundary-Based Blackbox Attack
QEBA: Query-Efficient Boundary-Based Blackbox Attack
Huichen Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo-wen Li
AAML
21
178
0
28 May 2020
Towards Frequency-Based Explanation for Robust CNN
Towards Frequency-Based Explanation for Robust CNN
Zifan Wang
Yilin Yang
Ankit Shrivastava
Varun Rawal
Zihao Ding
AAML
FAtt
21
47
0
06 May 2020
Adversarial Attacks on Monocular Depth Estimation
Adversarial Attacks on Monocular Depth Estimation
Ziqi Zhang
Xinge Zhu
Yingwei Li
Xiangqun Chen
Yao Guo
AAML
MDE
30
25
0
23 Mar 2020
The Threat of Adversarial Attacks on Machine Learning in Network
  Security -- A Survey
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Olakunle Ibitoye
Rana Abou-Khamis
Mohamed el Shehaby
Ashraf Matrawy
M. O. Shafiq
AAML
37
68
0
06 Nov 2019
Copy and Paste: A Simple But Effective Initialization Method for
  Black-Box Adversarial Attacks
Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks
T. Brunner
Frederik Diehl
Alois Knoll
AAML
11
8
0
14 Jun 2019
Learning Transferable Adversarial Examples via Ghost Networks
Learning Transferable Adversarial Examples via Ghost Networks
Yingwei Li
S. Bai
Yuyin Zhou
Cihang Xie
Zhishuai Zhang
Alan Yuille
AAML
42
136
0
09 Dec 2018
MMA Training: Direct Input Space Margin Maximization through Adversarial
  Training
MMA Training: Direct Input Space Margin Maximization through Adversarial Training
G. Ding
Yash Sharma
Kry Yik-Chau Lui
Ruitong Huang
AAML
27
270
0
06 Dec 2018
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
300
3,115
0
04 Nov 2016
1