ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1908.02256
  4. Cited By
BlurNet: Defense by Filtering the Feature Maps

BlurNet: Defense by Filtering the Feature Maps

6 August 2019
Ravi Raju
Mikko H. Lipasti
    AAML
ArXivPDFHTML

Papers citing "BlurNet: Defense by Filtering the Feature Maps"

23 / 23 papers shown
Title
On Adaptive Attacks to Adversarial Example Defenses
On Adaptive Attacks to Adversarial Example Defenses
Florian Tramèr
Nicholas Carlini
Wieland Brendel
Aleksander Madry
AAML
190
827
0
19 Feb 2020
On the Effectiveness of Low Frequency Perturbations
On the Effectiveness of Low Frequency Perturbations
Yash Sharma
G. Ding
Marcus A. Brubaker
AAML
49
121
0
28 Feb 2019
Certified Adversarial Robustness via Randomized Smoothing
Certified Adversarial Robustness via Randomized Smoothing
Jeremy M. Cohen
Elan Rosenfeld
J. Zico Kolter
AAML
104
2,018
0
08 Feb 2019
Feature Denoising for Improving Adversarial Robustness
Feature Denoising for Improving Adversarial Robustness
Cihang Xie
Yuxin Wu
Laurens van der Maaten
Alan Yuille
Kaiming He
78
907
0
09 Dec 2018
Stochastic Activation Pruning for Robust Adversarial Defense
Stochastic Activation Pruning for Robust Adversarial Defense
Guneet Singh Dhillon
Kamyar Azizzadenesheli
Zachary Chase Lipton
Jeremy Bernstein
Jean Kossaifi
Aran Khanna
Anima Anandkumar
AAML
49
546
0
05 Mar 2018
Obfuscated Gradients Give a False Sense of Security: Circumventing
  Defenses to Adversarial Examples
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye
Nicholas Carlini
D. Wagner
AAML
161
3,171
0
01 Feb 2018
Mitigating Adversarial Effects Through Randomization
Mitigating Adversarial Effects Through Randomization
Cihang Xie
Jianyu Wang
Zhishuai Zhang
Zhou Ren
Alan Yuille
AAML
86
1,050
0
06 Nov 2017
Countering Adversarial Images using Input Transformations
Countering Adversarial Images using Input Transformations
Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
AAML
86
1,399
0
31 Oct 2017
Mitigating Evasion Attacks to Deep Neural Networks via Region-based
  Classification
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
Xiaoyu Cao
Neil Zhenqiang Gong
AAML
47
209
0
17 Sep 2017
Efficient Defenses Against Adversarial Attacks
Efficient Defenses Against Adversarial Attacks
Valentina Zantedeschi
Maria-Irina Nicolae
Ambrish Rawat
AAML
35
297
0
21 Jul 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
229
11,962
0
19 Jun 2017
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
  Methods
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini
D. Wagner
AAML
103
1,851
0
20 May 2017
Adversarial Examples Detection in Deep Networks with Convolutional
  Filter Statistics
Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics
Xin Li
Fuxin Li
GAN
AAML
87
365
0
22 Dec 2016
Towards the Science of Security and Privacy in Machine Learning
Towards the Science of Security and Privacy in Machine Learning
Nicolas Papernot
Patrick McDaniel
Arunesh Sinha
Michael P. Wellman
AAML
67
472
0
11 Nov 2016
Xception: Deep Learning with Depthwise Separable Convolutions
Xception: Deep Learning with Depthwise Separable Convolutions
François Chollet
MDE
BDL
PINN
852
14,493
0
07 Oct 2016
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library
Nicolas Papernot
Fartash Faghri
Nicholas Carlini
Ian Goodfellow
Reuben Feinman
...
David Berthelot
P. Hendricks
Jonas Rauber
Rujun Long
Patrick McDaniel
AAML
49
512
0
03 Oct 2016
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OOD
AAML
170
8,513
0
16 Aug 2016
A study of the effect of JPG compression on adversarial images
A study of the effect of JPG compression on adversarial images
Gintare Karolina Dziugaite
Zoubin Ghahramani
Daniel M. Roy
AAML
73
532
0
02 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
494
5,878
0
08 Jul 2016
Transferability in Machine Learning: from Phenomena to Black-Box Attacks
  using Adversarial Samples
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples
Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
SILM
AAML
81
1,735
0
24 May 2016
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
176
18,922
0
20 Dec 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
185
14,831
1
21 Dec 2013
Speech Recognition with Deep Recurrent Neural Networks
Speech Recognition with Deep Recurrent Neural Networks
Alex Graves
Abdel-rahman Mohamed
Geoffrey E. Hinton
167
8,503
0
22 Mar 2013
1