ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1511.04599
  4. Cited By
DeepFool: a simple and accurate method to fool deep neural networks
v1v2v3 (latest)

DeepFool: a simple and accurate method to fool deep neural networks

14 November 2015
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
    AAML
ArXiv (abs)PDFHTML

Papers citing "DeepFool: a simple and accurate method to fool deep neural networks"

50 / 2,353 papers shown
Towards Adversarially Robust Dataset Distillation by Curvature Regularization
Towards Adversarially Robust Dataset Distillation by Curvature RegularizationAAAI Conference on Artificial Intelligence (AAAI), 2024
Eric Xue
Yijiang Li
Haoyang Liu
Yifan Shen
Haohan Wang
Haohan Wang
DD
555
18
0
15 Mar 2024
Adversarial Fine-tuning of Compressed Neural Networks for Joint
  Improvement of Robustness and Efficiency
Adversarial Fine-tuning of Compressed Neural Networks for Joint Improvement of Robustness and Efficiency
Hallgrimur Thorsteinsson
Valdemar J Henriksen
Tong Chen
Raghavendra Selvan
AAML
235
1
0
14 Mar 2024
Versatile Defense Against Adversarial Attacks on Image Recognition
Versatile Defense Against Adversarial Attacks on Image Recognition
Haibo Zhang
Zhihua Yao
Kouichi Sakurai
AAML
122
3
0
13 Mar 2024
Hard-label based Small Query Black-box Adversarial Attack
Hard-label based Small Query Black-box Adversarial AttackIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2024
Jeonghwan Park
Paul Miller
Niall McLaughlin
MLAU
164
11
0
09 Mar 2024
Exploring the Adversarial Frontier: Quantifying Robustness via
  Adversarial Hypervolume
Exploring the Adversarial Frontier: Quantifying Robustness via Adversarial HypervolumeIEEE Transactions on Emerging Topics in Computational Intelligence (IEEE TETCI), 2024
Ping Guo
Cheng Gong
Xi Lin
Zhiyuan Yang
Qingfu Zhang
AAML
243
4
0
08 Mar 2024
Fooling Neural Networks for Motion Forecasting via Adversarial Attacks
Fooling Neural Networks for Motion Forecasting via Adversarial Attacks
Edgar Medina
Leyong Loh
AAML
236
1
0
07 Mar 2024
Adversarial Perturbations of Physical Signals
Adversarial Perturbations of Physical Signals
Robert L. Bassett
Austin Van Dellen
Anthony P. Austin
AAML
79
1
0
27 Feb 2024
Edge Detectors Can Make Deep Convolutional Neural Networks More Robust
Edge Detectors Can Make Deep Convolutional Neural Networks More Robust
Jin Ding
Jie-Chao Zhao
Yong-zhi Sun
Ping Tan
Jia-Wei Wang
Ji-en Ma
You-tong Fang
AAML
206
3
0
26 Feb 2024
Improving behavior based authentication against adversarial attack using
  XAI
Improving behavior based authentication against adversarial attack using XAI
Dong Qin
G. Amariucai
Daji Qiao
Yong Guan
AAML
320
3
0
26 Feb 2024
Optimal Zero-Shot Detector for Multi-Armed Attacks
Optimal Zero-Shot Detector for Multi-Armed Attacks
Federica Granese
Marco Romanelli
Pablo Piantanida
AAML
248
0
0
24 Feb 2024
Reinforcement Learning-Based Approaches for Enhancing Security and
  Resilience in Smart Control: A Survey on Attack and Defense Methods
Reinforcement Learning-Based Approaches for Enhancing Security and Resilience in Smart Control: A Survey on Attack and Defense Methods
Zheyu Zhang
AAML
149
1
0
23 Feb 2024
Adversarial Purification and Fine-tuning for Robust UDC Image
  Restoration
Adversarial Purification and Fine-tuning for Robust UDC Image Restoration
Zhenbo Song
Zhenyuan Zhang
Kaihao Zhang
Tong Lu
Zhaoxin Fan
Jianfeng Lu
AAML
272
0
0
21 Feb 2024
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems
Jinjing Shi
Zimeng Xiao
Heyuan Shi
Yu Jiang
Xuelong Li
AAML
194
5
0
20 Feb 2024
AICAttack: Adversarial Image Captioning Attack with Attention-Based
  Optimization
AICAttack: Adversarial Image Captioning Attack with Attention-Based Optimization
Jiyao Li
Mingze Ni
Yifei Dong
Tianqing Zhu
Wei Liu
AAML
202
4
0
19 Feb 2024
Theoretical Understanding of Learning from Adversarial Perturbations
Theoretical Understanding of Learning from Adversarial Perturbations
Soichiro Kumano
Hiroshi Kera
Toshihiko Yamasaki
AAML
210
4
0
16 Feb 2024
Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of
  Conjugate Variables in System Attacks
Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of Conjugate Variables in System Attacks
Jun-Jie Zhang
Deyu Meng
AAML
248
4
0
16 Feb 2024
Feature Accentuation: Revealing 'What' Features Respond to in Natural
  Images
Feature Accentuation: Revealing 'What' Features Respond to in Natural Images
Christopher Hamblin
Thomas Fel
Srijani Saha
Talia Konkle
George A. Alvarez
FAtt
394
5
0
15 Feb 2024
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary
  Statistics
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics
Wenwei Zhao
Xiaowen Li
Shangqing Zhao
Jie Xu
Yao-Hong Liu
Zhuo Lu
AAML
153
1
0
14 Feb 2024
Enhancing Robustness of Indoor Robotic Navigation with Free-Space
  Segmentation Models Against Adversarial Attacks
Enhancing Robustness of Indoor Robotic Navigation with Free-Space Segmentation Models Against Adversarial Attacks
Qiyuan An
Christos Sevastopoulos
F. Makedon
194
1
0
13 Feb 2024
NeuralSentinel: Safeguarding Neural Network Reliability and
  Trustworthiness
NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness
Xabier Echeberria-Barrio
Mikel Gorricho
Selene Valencia
Francesco Zola
AAML
174
1
0
12 Feb 2024
Understanding Deep Learning defenses Against Adversarial Examples
  Through Visualizations for Dynamic Risk Assessment
Understanding Deep Learning defenses Against Adversarial Examples Through Visualizations for Dynamic Risk Assessment
Xabier Echeberria-Barrio
Amaia Gil-Lerchundi
Jon Egana-Zubia
Raul Orduna Urrutia
AAML
178
8
0
12 Feb 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust DefenseIEEE Access (IEEE Access), 2024
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
298
9
0
11 Feb 2024
Investigating White-Box Attacks for On-Device Models
Investigating White-Box Attacks for On-Device Models
M. Zhou
Yantao Du
Jing Wu
Kui Liu
Hailong Sun
Li Li
AAML
348
12
0
08 Feb 2024
Studying Vulnerable Code Entities in R
Studying Vulnerable Code Entities in R
ZiXiao Zhao
Millon Madhur Das
Fatemeh H. Fard
AAML
192
0
0
06 Feb 2024
Transcending Adversarial Perturbations: Manifold-Aided Adversarial
  Examples with Legitimate Semantics
Transcending Adversarial Perturbations: Manifold-Aided Adversarial Examples with Legitimate Semantics
Shuai Li
Xiaoyu Jiang
Xiaoguang Ma
AAML
238
1
0
05 Feb 2024
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms
  in Vision Transformers
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers
Oryan Yehezkel
Alon Zolfi
Amit Baras
Yuval Elovici
A. Shabtai
AAML
207
2
0
04 Feb 2024
Distractor Generation for Multiple-Choice Questions: A Survey of
  Methods, Datasets, and Evaluation
Distractor Generation for Multiple-Choice Questions: A Survey of Methods, Datasets, and Evaluation
Elaf Alhazmi
Quan Z. Sheng
W. Zhang
Munazza Zaib
A. Alhazmi
AI4Ed
228
1
0
02 Feb 2024
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Wenqi Wei
Ling Liu
361
44
0
02 Feb 2024
Sparse and Transferable Universal Singular Vectors Attack
Sparse and Transferable Universal Singular Vectors Attack
Kseniia Kuvshinova
Olga Tsymboi
Ivan Oseledets
AAML
226
0
0
25 Jan 2024
Boosting the Transferability of Adversarial Examples via Local Mixup and
  Adaptive Step Size
Boosting the Transferability of Adversarial Examples via Local Mixup and Adaptive Step Size
Junlin Liu
Xinchen Lyu
AAML
254
8
0
24 Jan 2024
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
  and the Open Libraries Behind Them
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them
Chao-Jung Liu
Boxi Chen
Wei Shao
Chris Zhang
Kelvin Wong
Yi Zhang
317
7
0
22 Jan 2024
Cloud-based XAI Services for Assessing Open Repository Models Under
  Adversarial Attacks
Cloud-based XAI Services for Assessing Open Repository Models Under Adversarial Attacks
Zerui Wang
Yan Liu
AAML
266
7
0
22 Jan 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive
  Attackers for Security Applications
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
255
1
0
20 Jan 2024
Cross-Modality Perturbation Synergy Attack for Person Re-identification
Cross-Modality Perturbation Synergy Attack for Person Re-identification
Yunpeng Gong
Zhun Zhong
Zhiming Luo
Yansong Qu
Rongrong Ji
Min Jiang
AAML
383
42
0
18 Jan 2024
Mathematical Algorithm Design for Deep Learning under Societal and
  Judicial Constraints: The Algorithmic Transparency Requirement
Mathematical Algorithm Design for Deep Learning under Societal and Judicial Constraints: The Algorithmic Transparency Requirement
Holger Boche
Adalbert Fono
Gitta Kutyniok
FaML
351
5
0
18 Jan 2024
Querying Easily Flip-flopped Samples for Deep Active Learning
Querying Easily Flip-flopped Samples for Deep Active Learning
S. Cho
G. Kim
Junghyun Lee
Jinwoo Shin
Chang D. Yoo
271
8
0
18 Jan 2024
MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative
  Adversarial Networks
MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative Adversarial Networks
Giovanni Pasqualino
Luca Guarnera
A. Ortis
Sebastiano Battiato
MedIm
297
9
0
17 Jan 2024
Do stable neural networks exist for classification problems? -- A new
  view on stability in AI
Do stable neural networks exist for classification problems? -- A new view on stability in AI
Z. N. D. Liu
A. C. Hansen
204
3
0
15 Jan 2024
Left-right Discrepancy for Adversarial Attack on Stereo Networks
Left-right Discrepancy for Adversarial Attack on Stereo Networks
Pengfei Wang
Xiaofei Hui
Beijia Lu
Nimrod Lilith
Jun Liu
Sameer Alam
AAML
303
3
0
14 Jan 2024
Adversarial Examples are Misaligned in Diffusion Model Manifolds
Adversarial Examples are Misaligned in Diffusion Model ManifoldsIEEE International Joint Conference on Neural Network (IJCNN), 2024
P. Lorenz
Ricard Durall
Jansi Keuper
DiffM
464
1
0
12 Jan 2024
Exploring Vulnerabilities of No-Reference Image Quality Assessment
  Models: A Query-Based Black-Box Method
Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Chenxi Yang
Yujia Liu
Dingquan Li
Tingting Jiang
298
18
0
10 Jan 2024
Machine unlearning through fine-grained model parameters perturbation
Machine unlearning through fine-grained model parameters perturbationIEEE Transactions on Knowledge and Data Engineering (TKDE), 2024
Zhiwei Zuo
Zhuo Tang
KenLi Li
Anwitaman Datta
AAMLMU
448
5
0
09 Jan 2024
A Random Ensemble of Encrypted models for Enhancing Robustness against
  Adversarial Examples
A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
AAML
151
0
0
05 Jan 2024
JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial Example
JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial ExampleIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2024
B. Tondi
Wei Guo
Niccolò Pancino
Mauro Barni
AAML
226
0
0
02 Jan 2024
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object
  Detectors in the Physical World
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World
Zheng Zhou
Hong Zhao
Ju Liu
Qiaosheng Zhang
Liwei Geng
Shuchang Lyu
W. Feng
AAML
410
4
0
29 Dec 2023
Adversarial Attacks on Image Classification Models: Analysis and Defense
Adversarial Attacks on Image Classification Models: Analysis and Defense
Jaydip Sen
Abhiraj Sen
Ananda Chatterjee
AAML
161
6
0
28 Dec 2023
Natural Adversarial Patch Generation Method Based on Latent Diffusion
  Model
Natural Adversarial Patch Generation Method Based on Latent Diffusion Model
Xianyi Chen
Fazhan Liu
Dong Jiang
Kai Yan
AAMLDiffM
219
2
0
27 Dec 2023
AdvCloak: Customized Adversarial Cloak for Privacy Protection
AdvCloak: Customized Adversarial Cloak for Privacy Protection
Xuannan Liu
Yaoyao Zhong
Xingchen Cui
Yuhang Zhang
Peipei Li
Weihong Deng
PICV
216
4
0
22 Dec 2023
Where and How to Attack? A Causality-Inspired Recipe for Generating
  Counterfactual Adversarial Examples
Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual Adversarial Examples
Ruichu Cai
Yuxuan Zhu
Jie Qiao
Zefeng Liang
Furui Liu
Zhifeng Hao
CML
374
5
0
21 Dec 2023
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural
  Networks
ARBiBench: Benchmarking Adversarial Robustness of Binarized Neural Networks
Peng Zhao
Jiehua Zhang
Bowen Peng
Longguang Wang
Yingmei Wei
Yu Liu
Li Liu
AAML
336
2
0
21 Dec 2023
Previous
123...567...464748
Next