ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1412.5068
  4. Cited By
Towards Deep Neural Network Architectures Robust to Adversarial Examples
v1v2v3v4 (latest)

Towards Deep Neural Network Architectures Robust to Adversarial Examples

International Conference on Learning Representations (ICLR), 2014
11 December 2014
S. Gu
Luca Rigazio
    AAML
ArXiv (abs)PDFHTML

Papers citing "Towards Deep Neural Network Architectures Robust to Adversarial Examples"

50 / 417 papers shown
PowerGAN: A Machine Learning Approach for Power Side-Channel Attack on
  Compute-in-Memory Accelerators
PowerGAN: A Machine Learning Approach for Power Side-Channel Attack on Compute-in-Memory AcceleratorsAdvanced Intelligent Systems (Adv. Intell. Syst.), 2023
Ziyu Wang
Yuting Wu
Yongmo Park
Sangmin Yoo
Xinxin Wang
Nhan Duy Truong
Wei D. Lu
AAML
232
11
0
13 Apr 2023
Decentralized Adversarial Training over Graphs
Decentralized Adversarial Training over GraphsIEEE Transactions on Information Theory (IEEE Trans. Inf. Theory), 2023
Ying Cao
Elsa Rizk
Stefan Vlaski
Ali H. Sayed
AAML
619
3
0
23 Mar 2023
Distribution-restrained Softmax Loss for the Model Robustness
Distribution-restrained Softmax Loss for the Model Robustness
Hao Wang
Chen Li
Jinzhe Jiang
Xin Zhang
Yaqian Zhao
Weifeng Gong
OOD
203
2
0
22 Mar 2023
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
  Contemporary Survey
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Yulong Wang
Tong Sun
Shenghong Li
Xinnan Yuan
W. Ni
Ekram Hossain
H. Vincent Poor
AAML
278
31
0
11 Mar 2023
NoiseCAM: Explainable AI for the Boundary Between Noise and Adversarial
  Attacks
NoiseCAM: Explainable AI for the Boundary Between Noise and Adversarial AttacksIEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2023
Wen-Xi Tan
Justus Renkhoff
Alvaro Velasquez
Ziyu Wang
Lu Li
Jian Wang
Shuteng Niu
Fan Yang
Yongxin Liu
Haoze Song
AAML
189
8
0
09 Mar 2023
Exploring Adversarial Attacks on Neural Networks: An Explainable
  Approach
Exploring Adversarial Attacks on Neural Networks: An Explainable ApproachIEEE International Performance, Computing, and Communications Conference (IPCCC), 2022
Justus Renkhoff
Wenkai Tan
Alvaro Velasquez
William Yichen Wang
Yongxin Liu
Jian Wang
Shuteng Niu
Lejla Begic Fazlic
Guido Dartmann
Haoze Song
AAML
181
7
0
08 Mar 2023
Defending against Adversarial Audio via Diffusion Model
Defending against Adversarial Audio via Diffusion ModelInternational Conference on Learning Representations (ICLR), 2023
Shutong Wu
Zhenghao Hu
Ming-Yu Liu
Weili Nie
Chaowei Xiao
DiffM
216
32
0
02 Mar 2023
Uncertainty Injection: A Deep Learning Method for Robust Optimization
Uncertainty Injection: A Deep Learning Method for Robust OptimizationIEEE Transactions on Wireless Communications (IEEE TWC), 2023
W. Cui
Wei Yu
UQCVOOD
101
11
0
23 Feb 2023
Identifying Adversarially Attackable and Robust Samples
Identifying Adversarially Attackable and Robust Samples
Vyas Raina
Mark Gales
AAML
235
4
0
30 Jan 2023
Mitigating Adversarial Effects of False Data Injection Attacks in Power Grid
Mitigating Adversarial Effects of False Data Injection Attacks in Power Grid
Farhin Farhad Riya
Shahinul Hoque
Jinyuan Stella Sun
Jiangnan Li
Hairong Qi
Hairong Qi
AAMLAI4CE
272
1
0
29 Jan 2023
Tracing the Origin of Adversarial Attack for Forensic Investigation and
  Deterrence
Tracing the Origin of Adversarial Attack for Forensic Investigation and DeterrenceIEEE International Conference on Computer Vision (ICCV), 2022
Han Fang
Jiyi Zhang
Yupeng Qiu
Ke Xu
Chengfang Fang
E. Chang
AAML
195
3
0
31 Dec 2022
Generalizing and Improving Jacobian and Hessian Regularization
Generalizing and Improving Jacobian and Hessian Regularization
Chenwei Cui
Zehao Yan
Guangsheng Liu
Liangfu Lu
AAML
204
1
0
01 Dec 2022
Efficiently Finding Adversarial Examples with DNN Preprocessing
Efficiently Finding Adversarial Examples with DNN Preprocessing
Avriti Chauhan
Mohammad Afzal
Hrishikesh Karmarkar
Y. Elboher
Kumar Madhukar
Guy Katz
AAML
167
0
0
16 Nov 2022
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR)
  for Metaverses
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for MetaversesACM Computing Surveys (ACM CSUR), 2022
Adnan Qayyum
M. A. Butt
Hassan Ali
Muhammad Usman
O. Halabi
Ala I. Al-Fuqaha
Q. Abbasi
Muhammad Ali Imran
Junaid Qadir
242
61
0
24 Oct 2022
Ares: A System-Oriented Wargame Framework for Adversarial ML
Ares: A System-Oriented Wargame Framework for Adversarial ML
Farhan Ahmed
Pratik Vaishnavi
Kevin Eykholt
Amir Rahmati
AAML
188
8
0
24 Oct 2022
Scaling Laws for Reward Model Overoptimization
Scaling Laws for Reward Model OveroptimizationInternational Conference on Machine Learning (ICML), 2022
Leo Gao
John Schulman
Jacob Hilton
ALM
389
782
0
19 Oct 2022
Generalizability of Adversarial Robustness Under Distribution Shifts
Generalizability of Adversarial Robustness Under Distribution Shifts
Kumail Alhamoud
Hasan Hammoud
Motasem Alfarra
Guohao Li
OOD
337
12
0
29 Sep 2022
Trustworthy Reinforcement Learning Against Intrinsic Vulnerabilities:
  Robustness, Safety, and Generalizability
Trustworthy Reinforcement Learning Against Intrinsic Vulnerabilities: Robustness, Safety, and Generalizability
Mengdi Xu
Zuxin Liu
Peide Huang
Wenhao Ding
Zhepeng Cen
Yue Liu
Ding Zhao
396
51
0
16 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud
  Recognition
PointCAT: Contrastive Adversarial Training for Robust Point Cloud RecognitionIEEE Transactions on Image Processing (IEEE TIP), 2022
Qidong Huang
Xiaoyi Dong
DongDong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
286
18
0
16 Sep 2022
Side-channel attack analysis on in-memory computing architectures
Side-channel attack analysis on in-memory computing architecturesIEEE Transactions on Emerging Topics in Computing (IEEE TETC), 2022
Ziyu Wang
Fanruo Meng
Yongmo Park
Nhan Duy Truong
Wei D. Lu
296
34
0
06 Sep 2022
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters
  Substitution
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
158
0
0
31 Aug 2022
Resisting Adversarial Attacks in Deep Neural Networks using Diverse
  Decision Boundaries
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Manaar Alam
Shubhajit Datta
Debdeep Mukhopadhyay
Arijit Mondal
P. Chakrabarti
AAML
132
5
0
18 Aug 2022
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for
  Generating Adversarial Instances in Deep Networks
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for Generating Adversarial Instances in Deep Networks
Raz Lapid
Zvika Haramaty
Moshe Sipper
AAMLMLAU
196
14
0
17 Aug 2022
Why Accuracy Is Not Enough: The Need for Consistency in Object Detection
Why Accuracy Is Not Enough: The Need for Consistency in Object Detection
Caleb Tung
Abhinav Goel
Fischer Bordwell
Nick Eliopoulos
Xiao Hu
George K. Thiruvathukal
Yung-Hsiang Lu
75
5
0
28 Jul 2022
On the Relationship Between Adversarial Robustness and Decision Region in Deep Neural Networks
On the Relationship Between Adversarial Robustness and Decision Region in Deep Neural Networks
Seongjin Park
Haedong Jeong
Tair Djanibekov
Giyoung Jeon
Jinseok Seol
Jaesik Choi
AAML
301
1
0
07 Jul 2022
Threat Assessment in Machine Learning based Systems
Threat Assessment in Machine Learning based Systems
L. Tidjon
Foutse Khomh
153
20
0
30 Jun 2022
Exact Spectral Norm Regularization for Neural Networks
Exact Spectral Norm Regularization for Neural Networks
Anton Johansson
Claes Strannegård
Niklas Engsner
P. Mostad
AAML
173
4
0
27 Jun 2022
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by
  Out-of-Distribution Detection
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Abderrahmen Amich
Ata Kaboudi
Birhanu Eshete
AAMLOODD
93
3
0
15 Jun 2022
Human Eyes Inspired Recurrent Neural Networks are More Robust Against
  Adversarial Noises
Human Eyes Inspired Recurrent Neural Networks are More Robust Against Adversarial NoisesNeural Computation (Neural Comput.), 2022
Minkyu Choi
Yizhen Zhang
Kuan Han
Xiaokai Wang
Zhongming Liu
AAMLGAN
144
6
0
15 Jun 2022
Benefits of Overparameterized Convolutional Residual Networks: Function
  Approximation under Smoothness Constraint
Benefits of Overparameterized Convolutional Residual Networks: Function Approximation under Smoothness ConstraintInternational Conference on Machine Learning (ICML), 2022
Hao Liu
Minshuo Chen
Siawpeng Er
Wenjing Liao
Tong Zhang
Tuo Zhao
185
15
0
09 Jun 2022
Robust Semantic Communications with Masked VQ-VAE Enabled Codebook
Robust Semantic Communications with Masked VQ-VAE Enabled CodebookIEEE Transactions on Wireless Communications (TWC), 2022
Qiyu Hu
Guangyi Zhang
Zhijin Qin
Yunlong Cai
Guanding Yu
Geoffrey Ye Li
AAML
213
224
0
08 Jun 2022
Gradient Obfuscation Checklist Test Gives a False Sense of Security
Gradient Obfuscation Checklist Test Gives a False Sense of Security
Nikola Popovic
D. Paudel
Thomas Probst
Luc Van Gool
AAML
190
6
0
03 Jun 2022
Attack-Agnostic Adversarial Detection
Attack-Agnostic Adversarial Detection
Jiaxin Cheng
Mohamed Hussein
J. Billa
Wael AbdAlmageed
AAML
195
2
0
01 Jun 2022
Alleviating Robust Overfitting of Adversarial Training With Consistency
  Regularization
Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization
Shudong Zhang
Haichang Gao
Tianwei Zhang
Yunyi Zhou
Zihui Wu
AAML
202
6
0
24 May 2022
CE-based white-box adversarial attacks will not work using super-fitting
CE-based white-box adversarial attacks will not work using super-fitting
Youhuan Yang
Lei Sun
Leyu Dai
Song Guo
Xiuqing Mao
Xiaoqin Wang
Bayi Xu
AAML
279
0
0
04 May 2022
A Tale of Two Models: Constructing Evasive Attacks on Edge Models
A Tale of Two Models: Constructing Evasive Attacks on Edge ModelsConference on Machine Learning and Systems (MLSys), 2022
Wei Hao
Aahil Awatramani
Jia-Bin Hu
Chengzhi Mao
Pin-Chun Chen
Eyal Cidon
Asaf Cidon
Junfeng Yang
AAML
196
6
0
22 Apr 2022
A Mask-Based Adversarial Defense Scheme
A Mask-Based Adversarial Defense Scheme
Weizhen Xu
Chenyi Zhang
Fangzhen Zhao
Liangda Fang
AAML
182
4
0
21 Apr 2022
Robustness Testing of Data and Knowledge Driven Anomaly Detection in
  Cyber-Physical Systems
Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems
Xugui Zhou
Maxfield Kouzel
H. Alemzadeh
OODAAML
146
16
0
20 Apr 2022
Shape-invariant 3D Adversarial Point Clouds
Shape-invariant 3D Adversarial Point CloudsComputer Vision and Pattern Recognition (CVPR), 2022
Qidong Huang
Xiaoyi Dong
Dongdong Chen
Hang Zhou
Weiming Zhang
Nenghai Yu
3DPC
217
99
0
08 Mar 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Adversarial Patterns: Building Robust Android Malware ClassifiersACM Computing Surveys (ACM CSUR), 2022
Dipkamal Bhusal
Nidhi Rastogi
AAML
336
5
0
04 Mar 2022
Rethinking Machine Learning Robustness via its Link with the
  Out-of-Distribution Problem
Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Abderrahmen Amich
Birhanu Eshete
OOD
130
4
0
18 Feb 2022
Lossy Compression of Noisy Data for Private and Data-Efficient Learning
Lossy Compression of Noisy Data for Private and Data-Efficient LearningIEEE Journal on Selected Areas in Information Theory (JSAIT), 2022
Berivan Isik
Tsachy Weissman
297
3
0
07 Feb 2022
Layer-wise Regularized Adversarial Training using Layers Sustainability
  Analysis (LSA) framework
Layer-wise Regularized Adversarial Training using Layers Sustainability Analysis (LSA) frameworkNeurocomputing (Neurocomputing), 2022
Mohammad Khalooei
M. Homayounpour
M. Amirmazlaghani
AAML
237
4
0
05 Feb 2022
Steerable Pyramid Transform Enables Robust Left Ventricle Quantification
Steerable Pyramid Transform Enables Robust Left Ventricle QuantificationChinese Conference on Pattern Recognition and Computer Vision (CPRCV), 2022
Xiangyang Zhu
Kede Ma
Wufeng Xue
MedIm
132
0
0
20 Jan 2022
Improving the Behaviour of Vision Transformers with Token-consistent
  Stochastic Layers
Improving the Behaviour of Vision Transformers with Token-consistent Stochastic LayersSocial Science Research Network (SSRN), 2021
Nikola Popovic
D. Paudel
Thomas Probst
Luc Van Gool
388
1
0
30 Dec 2021
DeepAdversaries: Examining the Robustness of Deep Learning Models for
  Galaxy Morphology Classification
DeepAdversaries: Examining the Robustness of Deep Learning Models for Galaxy Morphology Classification
A. Ćiprijanović
Diana Kafkes
Gregory F. Snyder
F. Sánchez
G. Perdue
K. Pedro
Brian D. Nord
Sandeep Madireddy
Stefan M. Wild
AAML
260
23
0
28 Dec 2021
Universal Randomized Guessing Subjected to Distortion
Universal Randomized Guessing Subjected to Distortion
Asaf Cohen
N. Merhav
97
4
0
27 Dec 2021
On the Convergence and Robustness of Adversarial Training
On the Convergence and Robustness of Adversarial Training
Yisen Wang
Jiabo He
James Bailey
Jinfeng Yi
Bowen Zhou
Quanquan Gu
AAML
603
370
0
15 Dec 2021
Quantifying and Understanding Adversarial Examples in Discrete Input
  Spaces
Quantifying and Understanding Adversarial Examples in Discrete Input Spaces
Volodymyr Kuleshov
Evgenii Nikishin
S. Thakoor
Tingfung Lau
Stefano Ermon
AAML
161
1
0
12 Dec 2021
Explainable Deep Learning in Healthcare: A Methodological Survey from an
  Attribution View
Explainable Deep Learning in Healthcare: A Methodological Survey from an Attribution ViewWIREs Mechanisms of Disease (WIREs Mech Dis), 2021
Di Jin
Elena Sergeeva
W. Weng
Geeticka Chauhan
Peter Szolovits
OOD
287
74
0
05 Dec 2021
Previous
123456789
Next
Page 2 of 9