ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,353 papers shown
Analysis of adversarial attacks against CNN-based image forgery
  detectors
Analysis of adversarial attacks against CNN-based image forgery detectors
Diego Gragnaniello
Francesco Marra
Giovanni Poggi
L. Verdoliva
AAML
73
34
0
25 Aug 2018
Controlling Over-generalization and its Effect on Adversarial Examples
  Generation and Detection
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection
Mahdieh Abbasi
Arezoo Rajabi
A. Mozafari
R. Bobba
Christian Gagné
AAML
163
9
0
21 Aug 2018
Reinforcement Learning for Autonomous Defence in Software-Defined
  Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Yi Han
Benjamin I. P. Rubinstein
Tamas Abraham
T. Alpcan
O. Vel
S. Erfani
David Hubczenko
C. Leckie
Paul Montague
AAML
150
78
0
17 Aug 2018
Mitigation of Adversarial Attacks through Embedded Feature Selection
Mitigation of Adversarial Attacks through Embedded Feature Selection
Ziyi Bao
Luis Muñoz-González
Emil C. Lupu
AAML
93
1
0
16 Aug 2018
Distributionally Adversarial Attack
Distributionally Adversarial Attack
T. Zheng
Changyou Chen
K. Ren
OOD
334
131
0
16 Aug 2018
Out of the Black Box: Properties of deep neural networks and their
  applications
Out of the Black Box: Properties of deep neural networks and their applications
Nizar Ouarti
D. Carmona
FAttAAML
105
3
0
10 Aug 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
263
285
0
10 Aug 2018
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically
  Differentiable Renderer
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer
Hsueh-Ti Derek Liu
Michael Tao
Chun-Liang Li
Derek Nowrouzezahrai
Alec Jacobson
AAML
163
13
0
08 Aug 2018
Adversarial Vision Challenge
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
170
61
0
06 Aug 2018
Defense Against Adversarial Attacks with Saak Transform
Defense Against Adversarial Attacks with Saak Transform
Sibo Song
Yueru Chen
Ngai-Man Cheung
C.-C. Jay Kuo
119
26
0
06 Aug 2018
Gray-box Adversarial Training
Gray-box Adversarial Training
S. VivekB.
Konda Reddy Mopuri
R. Venkatesh Babu
AAML
104
39
0
06 Aug 2018
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the
  Robustness of 18 Deep Image Classification Models
Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D. Su
Huan Zhang
Hongge Chen
Jinfeng Yi
Pin-Yu Chen
Yupeng Gao
VLM
380
414
0
05 Aug 2018
Structured Adversarial Attack: Towards General Implementation and Better
  Interpretability
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
Kaidi Xu
Sijia Liu
Pu Zhao
Pin-Yu Chen
Huan Zhang
Quanfu Fan
Deniz Erdogmus
Yanzhi Wang
Xinyu Lin
AAML
318
169
0
05 Aug 2018
ATMPA: Attacking Machine Learning-based Malware Visualization Detection
  Methods via Adversarial Examples
ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples
Xinbo Liu
Jiliang Zhang
Yaping Lin
He Li
AAML
208
60
0
05 Aug 2018
Traits & Transferability of Adversarial Examples against Instance
  Segmentation & Object Detection
Traits & Transferability of Adversarial Examples against Instance Segmentation & Object Detection
Raghav Gurbaxani
Shivank Mishra
AAML
131
4
0
04 Aug 2018
Ask, Acquire, and Attack: Data-free UAP Generation using Class
  Impressions
Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions
Konda Reddy Mopuri
P. Uppala
R. Venkatesh Babu
AAML
197
92
0
03 Aug 2018
Adversarial Open-World Person Re-Identification
Adversarial Open-World Person Re-Identification
Xiang Li
Ancong Wu
Weishi Zheng
172
44
0
27 Jul 2018
Symbolic Execution for Deep Neural Networks
Symbolic Execution for Deep Neural Networks
D. Gopinath
Kaiyuan Wang
Mengshi Zhang
C. Păsăreanu
S. Khurshid
AAML
133
55
0
27 Jul 2018
A general metric for identifying adversarial images
A general metric for identifying adversarial images
S. Kumar
AAML
79
0
0
26 Jul 2018
Effects of Degradations on Deep Neural Network Architectures
Effects of Degradations on Deep Neural Network Architectures
Prasun Roy
Subhankar Ghosh
Saumik Bhattacharya
Umapada Pal
262
153
0
26 Jul 2018
Simultaneous Adversarial Training - Learn from Others Mistakes
Simultaneous Adversarial Training - Learn from Others MistakesIEEE International Conference on Automatic Face & Gesture Recognition (FG), 2018
Zukang Liao
AAMLGAN
175
4
0
21 Jul 2018
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Prior Convictions: Black-Box Adversarial Attacks with Bandits and PriorsInternational Conference on Learning Representations (ICLR), 2018
Andrew Ilyas
Logan Engstrom
Aleksander Madry
MLAUAAML
339
408
0
20 Jul 2018
Physical Adversarial Examples for Object Detectors
Physical Adversarial Examples for Object Detectors
Kevin Eykholt
Ivan Evtimov
Earlence Fernandes
Yue Liu
Amir Rahmati
Florian Tramèr
Atul Prakash
Tadayoshi Kohno
Basel Alomair
AAML
273
526
0
20 Jul 2018
Harmonic Adversarial Attack Method
Harmonic Adversarial Attack Method
Wen Heng
Shuchang Zhou
Tingting Jiang
AAML
99
7
0
18 Jul 2018
Defend Deep Neural Networks Against Adversarial Examples via Fixed and
  Dynamic Quantized Activation Functions
Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions
Adnan Siraj Rakin
Jinfeng Yi
Boqing Gong
Deliang Fan
AAMLMQ
213
51
0
18 Jul 2018
Query-Efficient Hard-label Black-box Attack:An Optimization-based
  Approach
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Minhao Cheng
Thong Le
Pin-Yu Chen
Jinfeng Yi
Huan Zhang
Cho-Jui Hsieh
AAML
244
369
0
12 Jul 2018
With Friends Like These, Who Needs Adversaries?
With Friends Like These, Who Needs Adversaries?
Saumya Jetley
Nicholas A. Lord
Juil Sock
AAML
309
72
0
11 Jul 2018
A Simple Unified Framework for Detecting Out-of-Distribution Samples and
  Adversarial Attacks
A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks
Kimin Lee
Kibok Lee
Honglak Lee
Jinwoo Shin
OODD
537
2,374
0
10 Jul 2018
Vulnerability Analysis of Chest X-Ray Image Classification Against
  Adversarial Attacks
Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks
Saeid Asgari Taghanaki
A. Das
Ghassan Hamarneh
MedIm
139
53
0
09 Jul 2018
Implicit Generative Modeling of Random Noise during Training for
  Adversarial Robustness
Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness
Priyadarshini Panda
Kaushik Roy
AAML
140
4
0
05 Jul 2018
Local Gradients Smoothing: Defense against localized adversarial attacks
Local Gradients Smoothing: Defense against localized adversarial attacksIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2018
Muzammal Naseer
Salman H. Khan
Fatih Porikli
AAML
268
200
0
03 Jul 2018
Adversarial Robustness Toolbox v1.0.0
Adversarial Robustness Toolbox v1.0.0
Maria-Irina Nicolae
M. Sinn
Minh-Ngoc Tran
Beat Buesser
Ambrish Rawat
...
Nathalie Baracaldo
Bryant Chen
Heiko Ludwig
Ian Molloy
Ben Edwards
AAMLVLM
423
527
0
03 Jul 2018
Adversarial Perturbations Against Real-Time Video Classification Systems
Adversarial Perturbations Against Real-Time Video Classification SystemsNetwork and Distributed System Security Symposium (NDSS), 2018
Shasha Li
Ajaya Neupane
S. Paul
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
A. Swami
AAML
221
129
0
02 Jul 2018
Adversarial Examples in Deep Learning: Characterization and Divergence
Adversarial Examples in Deep Learning: Characterization and Divergence
Wenqi Wei
Ling Liu
Margaret Loper
Stacey Truex
Lei Yu
Mehmet Emre Gursoy
Yanzhao Wu
AAMLSILM
270
18
0
29 Jun 2018
A New Angle on L2 Regularization
A New Angle on L2 Regularization
T. Tanay
Lewis D. Griffin
LLMSV
129
5
0
28 Jun 2018
Gradient Similarity: An Explainable Approach to Detect Adversarial
  Attacks against Deep Learning
Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
J. Dhaliwal
S. Shintre
AAML
84
16
0
27 Jun 2018
Customizing an Adversarial Example Generator with Class-Conditional GANs
Customizing an Adversarial Example Generator with Class-Conditional GANs
Shih-hong Tsai
GANAAML
99
4
0
27 Jun 2018
SSIMLayer: Towards Robust Deep Representation Learning via Nonlinear
  Structural Similarity
SSIMLayer: Towards Robust Deep Representation Learning via Nonlinear Structural Similarity
A. Abobakr
M. Hossny
S. Nahavandi
125
4
0
24 Jun 2018
Detection based Defense against Adversarial Examples from the
  Steganalysis Point of View
Detection based Defense against Adversarial Examples from the Steganalysis Point of View
Jiayang Liu
Weiming Zhang
Yiwei Zhang
Dongdong Hou
Yujia Liu
Hongyue Zha
Nenghai Yu
AAML
264
107
0
21 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
156
7
0
19 Jun 2018
Hierarchical interpretations for neural network predictions
Hierarchical interpretations for neural network predictions
Chandan Singh
W. James Murdoch
Bin Yu
233
155
0
14 Jun 2018
Adversarial Attacks on Variational Autoencoders
Adversarial Attacks on Variational Autoencoders
George Gondim-Ribeiro
Pedro Tabacof
Eduardo Valle
AAMLDRL
133
44
0
12 Jun 2018
Adversarial Attack on Graph Structured Data
Adversarial Attack on Graph Structured Data
H. Dai
Hui Li
Tian Tian
Xin Huang
L. Wang
Jun Zhu
Le Song
GNNAAMLOOD
221
848
0
06 Jun 2018
Towards Dependability Metrics for Neural Networks
Towards Dependability Metrics for Neural Networks
Chih-Hong Cheng
Georg Nührenberg
Chung-Hao Huang
Harald Ruess
Hirotoshi Yasuoka
155
47
0
06 Jun 2018
DPatch: An Adversarial Patch Attack on Object Detectors
DPatch: An Adversarial Patch Attack on Object Detectors
Xin Liu
Huanrui Yang
Ziwei Liu
Linghao Song
Hai Helen Li
Yiran Chen
AAMLObjD
419
337
0
05 Jun 2018
An Explainable Adversarial Robustness Metric for Deep Learning Neural
  Networks
An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks
Chirag Agarwal
Bo Dong
Dan Schonfeld
A. Hoogs
185
2
0
05 Jun 2018
PAC-learning in the presence of evasion adversaries
PAC-learning in the presence of evasion adversaries
Daniel Cullina
A. Bhagoji
Prateek Mittal
AAML
202
56
0
05 Jun 2018
Detecting Adversarial Examples via Key-based Network
Detecting Adversarial Examples via Key-based Network
Pinlong Zhao
Zhouyu Fu
Ou Wu
Q. Hu
Jun Wang
AAMLGAN
174
8
0
02 Jun 2018
Interpreting Deep Learning: The Machine Learning Rorschach Test?
Interpreting Deep Learning: The Machine Learning Rorschach Test?
Adam S. Charles
AAMLHAIAI4CE
212
9
0
01 Jun 2018
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks
PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks
Jan Svoboda
Jonathan Masci
Federico Monti
M. Bronstein
Leonidas Guibas
AAMLGNN
179
42
0
31 May 2018
Previous
123...424344...464748
Next
Page 43 of 48
Pageof 48