ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.1897
  4. Cited By
Deep Neural Networks are Easily Fooled: High Confidence Predictions for
  Unrecognizable Images
v1v2v3v4 (latest)

Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images

Computer Vision and Pattern Recognition (CVPR), 2014
5 December 2014
Anh Totti Nguyen
J. Yosinski
Jeff Clune
    AAML
ArXiv (abs)PDFHTML

Papers citing "Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images"

50 / 1,455 papers shown
AIR5: Five Pillars of Artificial Intelligence Research
AIR5: Five Pillars of Artificial Intelligence Research
Yew-Soon Ong
Abhishek Gupta
152
40
0
30 Dec 2018
End-to-End Latent Fingerprint Search
End-to-End Latent Fingerprint Search
Kai Cao
Dinh-Luan Nguyen
Cori Tymoszek
Anil K. Jain
105
33
0
26 Dec 2018
PPD: Permutation Phase Defense Against Adversarial Examples in Deep
  Learning
PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning
Mehdi Jafarnia-Jahromi
Tasmin Chowdhury
Hsin-Tai Wu
S. Mukherjee
AAML
106
4
0
25 Dec 2018
Increasing the adversarial robustness and explainability of capsule
  networks with $γ$-capsules
Increasing the adversarial robustness and explainability of capsule networks with γγγ-capsules
David Peer
Sebastian Stabinger
A. Rodríguez-Sánchez
AAMLGANMedIm
195
12
0
23 Dec 2018
Dissociable neural representations of adversarially perturbed images in
  convolutional neural networks and the human brain
Dissociable neural representations of adversarially perturbed images in convolutional neural networks and the human brain
Chi Zhang
Xiaohan Duan
Linyuan Wang
Yongli Li
Bin Yan
Guoen Hu
Ruyuan Zhang
Li Tong
AAML
178
1
0
22 Dec 2018
Why ReLU networks yield high-confidence predictions far away from the
  training data and how to mitigate the problem
Why ReLU networks yield high-confidence predictions far away from the training data and how to mitigate the problem
Matthias Hein
Maksym Andriushchenko
Julian Bitterwolf
OODD
384
599
0
13 Dec 2018
TextBugger: Generating Adversarial Text Against Real-world Applications
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li
S. Ji
Tianyu Du
Bo Li
Ting Wang
SILMAAML
455
835
0
13 Dec 2018
Deep Anomaly Detection with Outlier Exposure
Deep Anomaly Detection with Outlier Exposure
Dan Hendrycks
Mantas Mazeika
Thomas G. Dietterich
OODD
1.7K
1,642
0
11 Dec 2018
Deep-RBF Networks Revisited: Robust Classification with Rejection
Deep-RBF Networks Revisited: Robust Classification with Rejection
P. Zadeh
Reshad Hosseini
S. Sra
AAMLOOD
97
28
0
07 Dec 2018
Backdooring Convolutional Neural Networks via Targeted Weight
  Perturbations
Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Jacob Dumford
Walter J. Scheirer
AAML
152
135
0
07 Dec 2018
Adversarial Defense of Image Classification Using a Variational
  Auto-Encoder
Adversarial Defense of Image Classification Using a Variational Auto-Encoder
Yi-Si Luo
H. Pfister
AAML
142
12
0
07 Dec 2018
Interpretable Deep Learning under Fire
Interpretable Deep Learning under Fire
Xinyang Zhang
Ningfei Wang
Hua Shen
S. Ji
Xiapu Luo
Ting Wang
AAMLAI4CE
232
185
0
03 Dec 2018
Adversarial Examples as an Input-Fault Tolerance Problem
Adversarial Examples as an Input-Fault Tolerance Problem
A. Galloway
A. Golubeva
Graham W. Taylor
SILMAAML
106
0
0
30 Nov 2018
Ensemble Bayesian Decision Making with Redundant Deep Perceptual Control
  Policies
Ensemble Bayesian Decision Making with Redundant Deep Perceptual Control Policies
Keuntaek Lee
Ziyi Wang
Bogdan I. Vlahov
Harleen K. Brar
Evangelos A. Theodorou
BDLUQCV
218
31
0
30 Nov 2018
Generalized Coarse-to-Fine Visual Recognition with Progressive Training
Generalized Coarse-to-Fine Visual Recognition with Progressive Training
Xutong Ren
Lingxi Xie
Chen Wei
Siyuan Qiao
Chi Su
Jiaying Liu
Qi Tian
Elliot K. Fishman
Alan Yuille
ObjD
130
0
0
29 Nov 2018
Deep learning for pedestrians: backpropagation in CNNs
Deep learning for pedestrians: backpropagation in CNNs
L. Boué
3DVPINN
136
7
0
29 Nov 2018
Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses
  of Familiar Objects
Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects
Michael A. Alcorn
Melvin Johnson
Zhitao Gong
Chengfei Wang
Long Mai
Naveen Ari
Stella Laurenzo
404
314
0
28 Nov 2018
Universal Adversarial Training
Universal Adversarial Training
A. Mendrik
Mahyar Najibi
Zheng Xu
John P. Dickerson
L. Davis
Tom Goldstein
AAMLOOD
246
204
0
27 Nov 2018
Probabilistic Object Detection: Definition and Evaluation
Probabilistic Object Detection: Definition and Evaluation
David Hall
Feras Dayoub
John Skinner
Haoyang Zhang
Dimity Miller
Peter Corke
G. Carneiro
A. Angelova
Niko Sünderhauf
UQCV
278
117
0
27 Nov 2018
Detecting Adversarial Perturbations Through Spatial Behavior in
  Activation Spaces
Detecting Adversarial Perturbations Through Spatial Behavior in Activation SpacesIEEE International Joint Conference on Neural Network (IJCNN), 2018
Ziv Katzir
Yuval Elovici
AAML
119
27
0
22 Nov 2018
Recent Advances in Open Set Recognition: A Survey
Recent Advances in Open Set Recognition: A SurveyIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2018
Chuanxing Geng
Sheng-Jun Huang
Songcan Chen
BDLObjD
471
910
0
21 Nov 2018
How the Softmax Output is Misleading for Evaluating the Strength of
  Adversarial Examples
How the Softmax Output is Misleading for Evaluating the Strength of Adversarial ExamplesNeural Information Processing Systems (NeurIPS), 2018
Utku Ozbulak
W. D. Neve
Arnout Van Messem
AAML
80
7
0
21 Nov 2018
CIFAR10 to Compare Visual Recognition Performance between Deep Neural
  Networks and Humans
CIFAR10 to Compare Visual Recognition Performance between Deep Neural Networks and Humans
T. Ho-Phuoc
126
47
0
18 Nov 2018
Exploring the Deep Feature Space of a Cell Classification Neural Network
Exploring the Deep Feature Space of a Cell Classification Neural Network
Ezra Webb
Cheng Lei
Chun-Jung Huang
H. Kobayashi
H. Mikami
K. Goda
62
2
0
15 Nov 2018
Distortion Robust Image Classification using Deep Convolutional Neural
  Network with Discrete Cosine Transform
Distortion Robust Image Classification using Deep Convolutional Neural Network with Discrete Cosine Transform
Md Tahmid Hossain
S. Teng
Dengsheng Zhang
Suryani Lim
Guojun Lu
232
31
0
14 Nov 2018
Co-Representation Learning For Classification and Novel Class Detection via Deep Networks
Zhuoyi Wang
Zelun Kong
Hemeng Tao
Swarup Chandra
Latifur Khan
88
2
0
13 Nov 2018
An Overview of Computational Approaches for Interpretation Analysis
An Overview of Computational Approaches for Interpretation Analysis
Philipp Blandfort
Jörn Hees
D. Patton
199
2
0
09 Nov 2018
A Geometric Perspective on the Transferability of Adversarial Directions
A Geometric Perspective on the Transferability of Adversarial DirectionsInternational Conference on Artificial Intelligence and Statistics (AISTATS), 2018
Duncan C. McElfresh
H. Bidkhori
Dimitris Papailiopoulos
AAML
95
17
0
08 Nov 2018
Deep Weighted Averaging Classifiers
Deep Weighted Averaging Classifiers
Dallas Card
Michael J.Q. Zhang
Hao Tang
238
42
0
06 Nov 2018
CarePre: An Intelligent Clinical Decision Assistance System
CarePre: An Intelligent Clinical Decision Assistance System
Zhuochen Jin
Jingshun Yang
Shuyuan Cui
David Gotz
Jimeng Sun
Nan Cao
141
34
0
06 Nov 2018
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on
  Adversarial Machine Learning
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning
Faiq Khalid
Muhammad Abdullah Hanif
Semeen Rehman
Junaid Qadir
Mohamed Bennai
AAML
130
34
0
04 Nov 2018
Learning to Defend by Learning to Attack
Learning to Defend by Learning to Attack
Haoming Jiang
Zhehui Chen
Yuyang Shi
Bo Dai
T. Zhao
258
23
0
03 Nov 2018
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep
  Neural Networks
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Faiq Khalid
Muhammad Abdullah Hanif
Semeen Rehman
Rehan Ahmed
Mohamed Bennai
AAML
203
21
0
02 Nov 2018
Informed Democracy: Voting-based Novelty Detection for Action
  Recognition
Informed Democracy: Voting-based Novelty Detection for Action Recognition
Alina Roitberg
Ziad Al-Halah
Rainer Stiefelhagen
150
31
0
30 Oct 2018
Understanding Deep Convolutional Networks through Gestalt Theory
Understanding Deep Convolutional Networks through Gestalt Theory
A. Amanatiadis
Vasileios G. Kaburlasos
Elias B. Kosmatopoulos
FAtt
94
16
0
19 Oct 2018
Security Matters: A Survey on Adversarial Machine Learning
Security Matters: A Survey on Adversarial Machine Learning
Guofu Li
Pengjia Zhu
Jin Li
Zhemin Yang
Ning Cao
Zhiyi Chen
AAML
221
27
0
16 Oct 2018
Learning to fail: Predicting fracture evolution in brittle material
  models using recurrent graph convolutional neural networks
Learning to fail: Predicting fracture evolution in brittle material models using recurrent graph convolutional neural networks
Max Schwarzer
Bryce Rogan
Yadong Ruan
Zhengming Song
Diana Lee
...
V. Chau
B. Moore
E. Rougier
Hari S. Viswanathan
G. Srinivasan
AI4CE
139
75
0
14 Oct 2018
Characterizing Adversarial Examples Based on Spatial Consistency
  Information for Semantic Segmentation
Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Chaowei Xiao
Ruizhi Deng
Yue Liu
Feng Yu
M. Liu
Basel Alomair
AAML
178
103
0
11 Oct 2018
Analyzing the Noise Robustness of Deep Neural Networks
Analyzing the Noise Robustness of Deep Neural Networks
Mengchen Liu
Shixia Liu
Hang Su
Kelei Cao
Jun Zhu
AAML
123
9
0
09 Oct 2018
WAIC, but Why? Generative Ensembles for Robust Anomaly Detection
WAIC, but Why? Generative Ensembles for Robust Anomaly Detection
Hyun-Jae Choi
Eric Jang
Alexander A. Alemi
OODD
294
84
0
02 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
246
49
0
02 Oct 2018
Semantically Invariant Text-to-Image Generation
Semantically Invariant Text-to-Image GenerationInternational Conference on Information Photonics (ICIP), 2018
Shagan Sah
D. Peri
Ameya Shringi
Chi Zhang
Miguel Domínguez
Andreas E. Savakis
R. Ptucha
EGVM
100
9
0
27 Sep 2018
Scenic: A Language for Scenario Specification and Scene Generation
Scenic: A Language for Scenario Specification and Scene GenerationACM-SIGPLAN Symposium on Programming Language Design and Implementation (PLDI), 2018
Daniel J. Fremont
T. Dreossi
Shromona Ghosh
Xiangyu Yue
Alberto L. Sangiovanni-Vincentelli
Sanjit A. Seshia
250
291
0
25 Sep 2018
Neural Networks with Structural Resistance to Adversarial Attacks
Neural Networks with Structural Resistance to Adversarial Attacks
Luca de Alfaro
AAML
101
5
0
25 Sep 2018
Unrestricted Adversarial Examples
Unrestricted Adversarial Examples
Tom B. Brown
Nicholas Carlini
Chiyuan Zhang
Catherine Olsson
Paul Christiano
Ian Goodfellow
AAML
158
106
0
22 Sep 2018
Evaluating Merging Strategies for Sampling-based Uncertainty Techniques
  in Object Detection
Evaluating Merging Strategies for Sampling-based Uncertainty Techniques in Object Detection
Dimity Miller
Feras Dayoub
Michael Milford
Niko Sünderhauf
259
113
0
17 Sep 2018
Defensive Dropout for Hardening Deep Neural Networks under Adversarial
  Attacks
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks
Siyue Wang
Tianlin Li
Pu Zhao
Wujie Wen
David Kaeli
S. Chin
Xinyu Lin
AAML
150
72
0
13 Sep 2018
Humans can decipher adversarial images
Humans can decipher adversarial images
Zhenglong Zhou
C. Firestone
AAML
232
124
0
11 Sep 2018
Classification by Re-generation: Towards Classification Based on
  Variational Inference
Classification by Re-generation: Towards Classification Based on Variational Inference
Shideh Rezaeifar
O. Taran
Svyatoslav Voloshynovskiy
DRL
110
4
0
10 Sep 2018
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Yali Du
Meng Fang
Jinfeng Yi
Jun Cheng
Dacheng Tao
AAML
142
21
0
09 Sep 2018
Previous
123...212223...282930
Next