ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2205.15944
  4. Cited By
Hide and Seek: on the Stealthiness of Attacks against Deep Learning
  Systems
v1v2 (latest)

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

31 May 2022
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
    AAML
ArXiv (abs)PDFHTML

Papers citing "Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems"

28 / 28 papers shown
Title
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Yi Zeng
Won Park
Z. Morley Mao
R. Jia
AAML
74
215
0
07 Apr 2021
Pervasive Label Errors in Test Sets Destabilize Machine Learning
  Benchmarks
Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks
Curtis G. Northcutt
Anish Athalye
Jonas W. Mueller
92
537
0
26 Mar 2021
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through
  Neural Payload Injection
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
Yan Liang
Jiayi Hua
Haoyu Wang
Chunyang Chen
Yunxin Liu
FedMLSILM
116
79
0
18 Jan 2021
Focal Frequency Loss for Image Reconstruction and Synthesis
Focal Frequency Loss for Image Reconstruction and Synthesis
Liming Jiang
Bo Dai
Wayne Wu
Chen Change Loy
103
285
0
23 Dec 2020
AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results
AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results
Pengxu Wei
Hannan Lu
Radu Timofte
Liang Lin
W. Zuo
...
Jun-Ho Choi
Jong-Seok Lee
Feras Almasri
T. Vandamme
O. Debeir
SupR
91
41
0
25 Sep 2020
An Embarrassingly Simple Approach for Trojan Attack in Deep Neural
  Networks
An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks
Ruixiang Tang
Mengnan Du
Ninghao Liu
Fan Yang
Helen Zhou
AAML
65
188
0
15 Jun 2020
Reliable evaluation of adversarial robustness with an ensemble of
  diverse parameter-free attacks
Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks
Francesco Croce
Matthias Hein
AAML
236
1,859
0
03 Mar 2020
Fast is better than free: Revisiting adversarial training
Fast is better than free: Revisiting adversarial training
Eric Wong
Leslie Rice
J. Zico Kolter
AAMLOOD
142
1,181
0
12 Jan 2020
SmoothFool: An Efficient Framework for Computing Smooth Adversarial
  Perturbations
SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations
Ali Dabouei
Sobhan Soleymani
Fariborz Taherkhani
J. Dawson
Nasser M. Nasrabadi
AAML
144
19
0
08 Oct 2019
Hidden Trigger Backdoor Attacks
Hidden Trigger Backdoor Attacks
Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
91
627
0
30 Sep 2019
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan
  Backdoors in AI Systems
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Wenbo Guo
Lun Wang
Masashi Sugiyama
Min Du
Basel Alomair
83
230
0
02 Aug 2019
A new Backdoor Attack in CNNs by training set corruption without label
  poisoning
A new Backdoor Attack in CNNs by training set corruption without label poisoning
Mauro Barni
Kassem Kallas
B. Tondi
AAML
116
358
0
12 Feb 2019
Backdooring Convolutional Neural Networks via Targeted Weight
  Perturbations
Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Jacob Dumford
Walter J. Scheirer
AAML
73
120
0
07 Dec 2018
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
89
683
0
28 Sep 2018
Backdoor Embedding in Convolutional Neural Network Models via Invisible
  Perturbation
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
C. Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
SILM
100
315
0
30 Aug 2018
Semantic Adversarial Examples
Semantic Adversarial Examples
Hossein Hosseini
Radha Poovendran
GANAAML
95
199
0
16 Mar 2018
ExpandNet: A Deep Convolutional Neural Network for High Dynamic Range
  Expansion from Low Dynamic Range Content
ExpandNet: A Deep Convolutional Neural Network for High Dynamic Range Expansion from Low Dynamic Range Content
Demetris Marnerides
Thomas Bashford-Rogers
Jonathan Hatchett
Kurt Debattista
66
266
0
06 Mar 2018
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
Richard Y. Zhang
Phillip Isola
Alexei A. Efros
Eli Shechtman
Oliver Wang
EGVM
384
11,920
0
11 Jan 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
Basel Alomair
AAMLSILM
146
1,854
0
15 Dec 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model
  Supply Chain
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
130
1,782
0
22 Aug 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILMOOD
319
12,138
0
19 Jun 2017
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OODAAML
282
8,587
0
16 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILMAAML
547
5,912
0
08 Jul 2016
DeepFool: a simple and accurate method to fool deep neural networks
DeepFool: a simple and accurate method to fool deep neural networks
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
AAML
154
4,905
0
14 Nov 2015
Domain-Adversarial Training of Neural Networks
Domain-Adversarial Training of Neural Networks
Yaroslav Ganin
E. Ustinova
Hana Ajakan
Pascal Germain
Hugo Larochelle
François Laviolette
M. Marchand
Victor Lempitsky
GANOOD
390
9,524
0
28 May 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
282
19,129
0
20 Dec 2014
Unsupervised Domain Adaptation by Backpropagation
Unsupervised Domain Adaptation by Backpropagation
Yaroslav Ganin
Victor Lempitsky
OOD
245
6,043
0
26 Sep 2014
ImageNet Large Scale Visual Recognition Challenge
ImageNet Large Scale Visual Recognition Challenge
Olga Russakovsky
Jia Deng
Hao Su
J. Krause
S. Satheesh
...
A. Karpathy
A. Khosla
Michael S. Bernstein
Alexander C. Berg
Li Fei-Fei
VLMObjD
1.7K
39,615
0
01 Sep 2014
1