ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1811.12673
  4. Cited By
ComDefend: An Efficient Image Compression Model to Defend Adversarial
  Examples

ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples

30 November 2018
Xiaojun Jia
Xingxing Wei
Xiaochun Cao
H. Foroosh
    AAML
ArXivPDFHTML

Papers citing "ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples"

26 / 26 papers shown
Title
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
142
0
0
20 Apr 2025
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models
X. Jia
Sensen Gao
Simeng Qin
Ke Ma
X. Li
Yihao Huang
Wei Dong
Yang Liu
Xiaochun Cao
AAML
VLM
60
0
0
17 Mar 2025
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation
Wenyuan Wu
Zheng Liu
Yong Chen
Chao Su
Dezhong Peng
Xu Wang
AAML
37
0
0
24 Feb 2025
Purify++: Improving Diffusion-Purification with Advanced Diffusion
  Models and Control of Randomness
Purify++: Improving Diffusion-Purification with Advanced Diffusion Models and Control of Randomness
Boya Zhang
Weijian Luo
Zhihua Zhang
29
10
0
28 Oct 2023
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval
Xu Yuan
Zheng-Wei Zhang
Xunguang Wang
Lin Wu
AAML
31
11
0
23 Oct 2023
Enhancing Adversarial Robustness via Score-Based Optimization
Enhancing Adversarial Robustness via Score-Based Optimization
Boya Zhang
Weijian Luo
Zhihua Zhang
DiffM
24
12
0
10 Jul 2023
Randomness in ML Defenses Helps Persistent Attackers and Hinders
  Evaluators
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators
Keane Lucas
Matthew Jagielski
Florian Tramèr
Lujo Bauer
Nicholas Carlini
AAML
25
9
0
27 Feb 2023
Adversarial Example Defense via Perturbation Grading Strategy
Adversarial Example Defense via Perturbation Grading Strategy
Shaowei Zhu
Wanli Lyu
Bin Li
Z. Yin
Bin Luo
AAML
25
1
0
16 Dec 2022
Boosting the Transferability of Adversarial Attacks with Global Momentum
  Initialization
Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Jiafeng Wang
Zhaoyu Chen
Kaixun Jiang
Dingkang Yang
Lingyi Hong
Pinxue Guo
Yan Wang
Wenqiang Zhang
AAML
18
27
0
21 Nov 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
22
42
0
05 Oct 2022
Sampling-based Fast Gradient Rescaling Method for Highly Transferable Adversarial Attacks
Xuechun Han
Anmin Liu
Yifeng Xiong
Yanbo Fan
Kun He
AAML
28
5
0
06 Apr 2022
Improving Adversarial Transferability via Neuron Attribution-Based
  Attacks
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Jianping Zhang
Weibin Wu
Jen-tse Huang
Yizhan Huang
Wenxuan Wang
Yuxin Su
Michael R. Lyu
AAML
45
129
0
31 Mar 2022
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against
  Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Siyuan Liang
Baoyuan Wu
Yanbo Fan
Xingxing Wei
Xiaochun Cao
AAML
22
70
0
22 Jan 2022
All You Need is RAW: Defending Against Adversarial Attacks with Camera
  Image Pipelines
All You Need is RAW: Defending Against Adversarial Attacks with Camera Image Pipelines
Yuxuan Zhang
B. Dong
Felix Heide
AAML
26
8
0
16 Dec 2021
MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical
  Pretrained Models Against Adversarial Attack
MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical Pretrained Models Against Adversarial Attack
Mengting Xu
Tao Zhang
Daoqiang Zhang
AAML
MedIm
13
23
0
29 Nov 2021
Adaptive Perturbation for Adversarial Attack
Adaptive Perturbation for Adversarial Attack
Zheng Yuan
Jie M. Zhang
Zhaoyan Jiang
Liangliang Li
Shiguang Shan
AAML
19
3
0
27 Nov 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Attack to Fool and Explain Deep Networks
Attack to Fool and Explain Deep Networks
Naveed Akhtar
M. Jalwana
Bennamoun
Ajmal Saeed Mian
AAML
19
33
0
20 Jun 2021
Enhancing the Transferability of Adversarial Attacks through Variance
  Tuning
Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Xiaosen Wang
Kun He
AAML
19
376
0
29 Mar 2021
Error Diffusion Halftoning Against Adversarial Examples
Error Diffusion Halftoning Against Adversarial Examples
Shao-Yuan Lo
Vishal M. Patel
DiffM
10
4
0
23 Jan 2021
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Simulating Unknown Target Models for Query-Efficient Black-box Attacks
Chen Ma
L. Chen
Junhai Yong
MLAU
OOD
39
17
0
02 Sep 2020
Defending Adversarial Examples via DNN Bottleneck Reinforcement
Defending Adversarial Examples via DNN Bottleneck Reinforcement
Wenqing Liu
Miaojing Shi
Teddy Furon
Li Li
AAML
13
8
0
12 Aug 2020
A Review on Generative Adversarial Networks: Algorithms, Theory, and
  Applications
A Review on Generative Adversarial Networks: Algorithms, Theory, and Applications
Jie Gui
Zhenan Sun
Yonggang Wen
Dacheng Tao
Jieping Ye
EGVM
26
817
0
20 Jan 2020
One Man's Trash is Another Man's Treasure: Resisting Adversarial
  Examples by Adversarial Examples
One Man's Trash is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples
Chang Xiao
Changxi Zheng
AAML
17
19
0
25 Nov 2019
Nesterov Accelerated Gradient and Scale Invariance for Adversarial
  Attacks
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin
Chuanbiao Song
Kun He
Liwei Wang
J. Hopcroft
AAML
13
552
0
17 Aug 2019
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
261
3,109
0
04 Nov 2016
1