ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,353 papers shown
Examining Adversarial Learning against Graph-based IoT Malware Detection
  Systems
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
Ahmed A. Abusnaina
Aminollah Khormali
Hisham Alasmary
Jeman Park
Afsah Anwar
Ulku Meteriz
Aziz Mohaisen
AAML
135
5
0
12 Feb 2019
Towards a Robust Deep Neural Network in Texts: A Survey
Towards a Robust Deep Neural Network in Texts: A Survey
Wenqi Wang
Benxiao Tang
Run Wang
Lina Wang
Aoshuang Ye
AAML
233
41
0
12 Feb 2019
Model Compression with Adversarial Robustness: A Unified Optimization
  Framework
Model Compression with Adversarial Robustness: A Unified Optimization FrameworkNeural Information Processing Systems (NeurIPS), 2019
Shupeng Gui
Haotao Wang
Chen Yu
Haichuan Yang
Zinan Lin
Ji Liu
MQ
303
147
0
10 Feb 2019
Understanding the One-Pixel Attack: Propagation Maps and Locality
  Analysis
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis
Danilo Vasconcellos Vargas
Jiawei Su
FAttAAML
110
39
0
08 Feb 2019
A Comprehensive Overview of Biometric Fusion
A Comprehensive Overview of Biometric Fusion
Maneet Singh
Richa Singh
Arun Ross
218
202
0
08 Feb 2019
Certified Adversarial Robustness via Randomized Smoothing
Certified Adversarial Robustness via Randomized Smoothing
Jeremy M. Cohen
Elan Rosenfeld
J. Zico Kolter
AAML
855
2,298
0
08 Feb 2019
Robustness Of Saak Transform Against Adversarial Attacks
Robustness Of Saak Transform Against Adversarial Attacks
T. Ramanathan
Abinaya Manimaran
Suya You
C.-C. Jay Kuo
183
5
0
07 Feb 2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via
  Adversarial Examples
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Derui Wang
Chaoran Li
S. Wen
Qing-Long Han
Surya Nepal
Xiangyu Zhang
Yang Xiang
AAML
240
43
0
06 Feb 2019
Theoretical evidence for adversarial robustness through randomization
Theoretical evidence for adversarial robustness through randomization
Rafael Pinot
Laurent Meunier
Alexandre Araujo
H. Kashima
Florian Yger
Cédric Gouy-Pailler
Jamal Atif
AAML
276
88
0
04 Feb 2019
Robustness of Generalized Learning Vector Quantization Models against
  Adversarial Attacks
Robustness of Generalized Learning Vector Quantization Models against Adversarial AttacksWorkshop on Self-Organizing Maps (WSOM), 2019
S. Saralajew
Lars Holdijk
Maike Rees
T. Villmann
OOD
187
21
0
01 Feb 2019
Understanding Impacts of High-Order Loss Approximations and Features in
  Deep Learning Interpretation
Understanding Impacts of High-Order Loss Approximations and Features in Deep Learning InterpretationInternational Conference on Machine Learning (ICML), 2019
Sahil Singla
Eric Wallace
Shi Feng
Soheil Feizi
FAtt
232
61
0
01 Feb 2019
Robustness Certificates Against Adversarial Examples for ReLU Networks
Robustness Certificates Against Adversarial Examples for ReLU Networks
Sahil Singla
Soheil Feizi
AAML
143
21
0
01 Feb 2019
Training Artificial Neural Networks by Generalized Likelihood Ratio
  Method: Exploring Brain-like Learning to Improve Robustness
Training Artificial Neural Networks by Generalized Likelihood Ratio Method: Exploring Brain-like Learning to Improve Robustness
Li Xiao
Yijie Peng
J. Hong
Zewu Ke
Shuhuai Yang
103
0
0
31 Jan 2019
Augmenting Model Robustness with Transformation-Invariant Attacks
Augmenting Model Robustness with Transformation-Invariant Attacks
Houpu Yao
Zhe Wang
Guangyu Nie
Yassine Mazboudi
Yezhou Yang
Yi Ren
AAMLOOD
147
3
0
31 Jan 2019
Who's Afraid of Adversarial Queries? The Impact of Image Modifications
  on Content-based Image Retrieval
Who's Afraid of Adversarial Queries? The Impact of Image Modifications on Content-based Image RetrievalInternational Conference on Multimedia Retrieval (ICMR), 2019
Zhuoran Liu
Subrat Kishore Dutta
Martha Larson
AAML
208
45
0
29 Jan 2019
A Black-box Attack on Neural Networks Based on Swarm Evolutionary
  Algorithm
A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm
Xiaolei Liu
Yuheng Luo
Xiaosong Zhang
Qingxin Zhu
AAML
113
17
0
26 Jan 2019
Generative Adversarial Networks for Black-Box API Attacks with Limited
  Training Data
Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data
Yi Shi
Y. Sagduyu
Kemal Davaslioglu
Jason H. Li
AAML
132
30
0
25 Jan 2019
Theoretically Principled Trade-off between Robustness and Accuracy
Theoretically Principled Trade-off between Robustness and Accuracy
Hongyang R. Zhang
Yaodong Yu
Jiantao Jiao
Eric Xing
L. Ghaoui
Sai Li
735
2,861
0
24 Jan 2019
Sitatapatra: Blocking the Transfer of Adversarial Samples
Sitatapatra: Blocking the Transfer of Adversarial Samples
Ilia Shumailov
Xitong Gao
Yiren Zhao
Robert D. Mullins
Ross J. Anderson
Chengzhong Xu
AAMLGAN
186
15
0
23 Jan 2019
Sensitivity Analysis of Deep Neural Networks
Sensitivity Analysis of Deep Neural Networks
Hai Shu
Hongtu Zhu
AAML
86
60
0
22 Jan 2019
Universal Rules for Fooling Deep Neural Networks based Text
  Classification
Universal Rules for Fooling Deep Neural Networks based Text Classification
Di Li
Danilo Vasconcellos Vargas
Kouichi Sakurai
AAML
122
11
0
22 Jan 2019
Perception-in-the-Loop Adversarial Examples
Perception-in-the-Loop Adversarial Examples
Mahmoud Salamati
Sadegh Soudjani
R. Majumdar
AAML
81
3
0
21 Jan 2019
Adversarial Attacks on Deep Learning Models in Natural Language
  Processing: A Survey
Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey
W. Zhang
Quan Z. Sheng
A. Alhazmi
Chenliang Li
AAML
244
57
0
21 Jan 2019
Generating Adversarial Perturbation with Root Mean Square Gradient
Yatie Xiao
Chi-Man Pun
Jizhe Zhou
GAN
132
1
0
13 Jan 2019
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia
  Classification System
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System
Huangxun Chen
Chenyu Huang
Qianyi Huang
Qian Zhang
Wei Wang
AAML
231
31
0
12 Jan 2019
Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud
  Classifiers
Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers
Daniel Liu
Ronald Yu
Hao Su
3DPC
277
202
0
10 Jan 2019
Thinking Outside the Pool: Active Training Image Creation for Relative
  Attributes
Thinking Outside the Pool: Active Training Image Creation for Relative Attributes
Aron Yu
Kristen Grauman
140
23
0
08 Jan 2019
Contamination Attacks and Mitigation in Multi-Party Machine Learning
Contamination Attacks and Mitigation in Multi-Party Machine Learning
Jamie Hayes
O. Ohrimenko
AAMLFedML
210
75
0
08 Jan 2019
Interpretable BoW Networks for Adversarial Example Detection
Interpretable BoW Networks for Adversarial Example Detection
Krishna Kanth Nakka
Mathieu Salzmann
GANAAML
128
0
0
08 Jan 2019
Ten ways to fool the masses with machine learning
Ten ways to fool the masses with machine learning
F. Minhas
Amina Asif
Asa Ben-Hur
FedMLHAI
103
5
0
07 Jan 2019
Image Super-Resolution as a Defense Against Adversarial Attacks
Image Super-Resolution as a Defense Against Adversarial Attacks
Aamir Mustafa
Salman H. Khan
Munawar Hayat
Jianbing Shen
Ling Shao
AAMLSupR
212
210
0
07 Jan 2019
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical
  Study
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study
Xurong Li
S. Ji
Men Han
Juntao Ji
Zhenyu Ren
Yushan Liu
Chunming Wu
AAML
468
33
0
04 Jan 2019
Multi-Label Adversarial Perturbations
Multi-Label Adversarial Perturbations
Qingquan Song
Haifeng Jin
Xiao Huang
Helen Zhou
AAML
94
42
0
02 Jan 2019
A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for
  Deep Neural Networks
A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for Deep Neural Networks
Long Zhang
Xuechao Sun
Yong Li
Ying Tai
AAML
158
24
0
01 Jan 2019
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving
  Systems
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems
Husheng Zhou
Wei Li
Yuankun Zhu
Yuqun Zhang
Bei Yu
Lingming Zhang
Cong Liu
AAML
186
202
0
27 Dec 2018
End-to-End Latent Fingerprint Search
End-to-End Latent Fingerprint Search
Kai Cao
Dinh-Luan Nguyen
Cori Tymoszek
Anil K. Jain
105
33
0
26 Dec 2018
A Multiversion Programming Inspired Approach to Detecting Audio
  Adversarial Examples
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples
Qiang Zeng
Jianhai Su
Chenglong Fu
Golam Kayas
Lannan Luo
AAML
113
51
0
26 Dec 2018
A Data-driven Adversarial Examples Recognition Framework via Adversarial
  Feature Genome
A Data-driven Adversarial Examples Recognition Framework via Adversarial Feature Genome
Li Chen
Qi Li
Jiawei Zhu
Jian Peng
Haifeng Li
AAML
207
4
0
25 Dec 2018
PPD: Permutation Phase Defense Against Adversarial Examples in Deep
  Learning
PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning
Mehdi Jafarnia-Jahromi
Tasmin Chowdhury
Hsin-Tai Wu
S. Mukherjee
AAML
106
4
0
25 Dec 2018
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds
  Defense
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense
Hang Zhou
Kejiang Chen
Weiming Zhang
Han Fang
Wenbo Zhou
Nenghai Yu
3DPC
150
8
0
25 Dec 2018
Towards resilient machine learning for ransomware detection
Towards resilient machine learning for ransomware detection
Li-Wei Chen
Chih-Yuan Yang
Anindya Paul
R. Sahita
AAML
130
22
0
21 Dec 2018
A Survey of Safety and Trustworthiness of Deep Neural Networks:
  Verification, Testing, Adversarial Attack and Defence, and Interpretability
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability
Xiaowei Huang
Daniel Kroening
Wenjie Ruan
Marta Kwiatkowska
Youcheng Sun
Emese Thamo
Min Wu
Xinping Yi
AAML
495
52
0
18 Dec 2018
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased
  robustness in adversarial settings
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings
François Menet
Paul Berthier
José M. Fernandez
M. Gagnon
AAML
87
12
0
17 Dec 2018
Designing Adversarially Resilient Classifiers using Resilient Feature
  Engineering
Designing Adversarially Resilient Classifiers using Resilient Feature Engineering
Kevin Eykholt
A. Prakash
AAML
121
4
0
17 Dec 2018
Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks
Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks
Xiang Li
Shihao Ji
AAML
155
29
0
17 Dec 2018
Trust Region Based Adversarial Attack on Neural Networks
Trust Region Based Adversarial Attack on Neural Networks
Z. Yao
A. Gholami
Peng Xu
Kurt Keutzer
Michael W. Mahoney
AAML
114
59
0
16 Dec 2018
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on
  Generation of Adversarial Examples
Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples
E. Balda
Arash Behboodi
R. Mathar
AAML
135
5
0
15 Dec 2018
Adversarial Sample Detection for Deep Neural Network through Model
  Mutation Testing
Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing
Jingyi Wang
Guoliang Dong
Jun Sun
Xinyu Wang
Peixin Zhang
AAML
224
204
0
14 Dec 2018
Why ReLU networks yield high-confidence predictions far away from the
  training data and how to mitigate the problem
Why ReLU networks yield high-confidence predictions far away from the training data and how to mitigate the problem
Matthias Hein
Maksym Andriushchenko
Julian Bitterwolf
OODD
421
604
0
13 Dec 2018
TextBugger: Generating Adversarial Text Against Real-world Applications
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li
S. Ji
Tianyu Du
Bo Li
Ting Wang
SILMAAML
457
840
0
13 Dec 2018
Previous
123...394041...464748
Next
Page 40 of 48
Pageof 48