Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2002.05990
Cited By
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets
14 February 2020
Dongxian Wu
Yisen Wang
Shutao Xia
James Bailey
Xingjun Ma
AAML
SILM
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"
17 / 67 papers shown
Title
Analysis and Applications of Class-wise Robustness in Adversarial Training
Qi Tian
Kun Kuang
Ke Jiang
Fei Wu
Yisen Wang
AAML
20
46
0
29 May 2021
Staircase Sign Method for Boosting Adversarial Attacks
Qilong Zhang
Xiaosu Zhu
Jingkuan Song
Lianli Gao
Heng Tao Shen
AAML
43
13
0
20 Apr 2021
Ensemble-in-One: Learning Ensemble within Random Gated Networks for Enhanced Adversarial Robustness
Yi Cai
Xuefei Ning
Huazhong Yang
Yu Wang
AAML
27
4
0
27 Mar 2021
A Unified Game-Theoretic Interpretation of Adversarial Robustness
Jie Ren
Die Zhang
Yisen Wang
Lu Chen
Zhanpeng Zhou
...
Xu Cheng
Xin Wang
Meng Zhou
Jie Shi
Quanshi Zhang
AAML
72
22
0
12 Mar 2021
"What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models
Sahar Abdelnabi
Mario Fritz
AAML
27
7
0
09 Feb 2021
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
156
190
0
13 Jan 2021
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
44
122
0
21 Dec 2020
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors
Ren Pang
Zheng-Wei Zhang
Xiangshan Gao
Zhaohan Xi
S. Ji
Peng Cheng
Xiapu Luo
Ting Wang
AAML
29
31
0
16 Dec 2020
Transferable Universal Adversarial Perturbations Using Generative Models
Atiyeh Hashemi
Andreas Bär
S. Mozaffari
Tim Fingscheidt
AAML
30
17
0
28 Oct 2020
A Unified Approach to Interpreting and Boosting Adversarial Transferability
Xin Wang
Jie Ren
Shuyu Lin
Xiangming Zhu
Yisen Wang
Quanshi Zhang
AAML
29
94
0
08 Oct 2020
Improving Query Efficiency of Black-box Adversarial Attack
Yang Bai
Yuyuan Zeng
Yong Jiang
Yisen Wang
Shutao Xia
Weiwei Guo
AAML
MLAU
37
52
0
24 Sep 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Xingjun Ma
James Bailey
Feng Lu
AAML
22
504
0
05 Jul 2020
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
38
51
0
01 Jul 2020
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
167
224
0
08 Mar 2020
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet
Sizhe Chen
Zhengbao He
Chengjin Sun
Jie-jin Yang
Xiaolin Huang
AAML
31
103
0
16 Jan 2020
Ensemble Adversarial Training: Attacks and Defenses
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
65
2,699
0
19 May 2017
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
293
5,842
0
08 Jul 2016
Previous
1
2