ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1608.00530
  4. Cited By
Early Methods for Detecting Adversarial Images
v1v2 (latest)

Early Methods for Detecting Adversarial Images

1 August 2016
Dan Hendrycks
Kevin Gimpel
    AAML
ArXiv (abs)PDFHTML

Papers citing "Early Methods for Detecting Adversarial Images"

50 / 100 papers shown
Sparse Representations Improve Adversarial Robustness of Neural Network Classifiers
Sparse Representations Improve Adversarial Robustness of Neural Network Classifiers
Killian Steunou
Théo Druilhe
Sigurd Saue
AAML
204
0
0
25 Sep 2025
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial
  Purification
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial PurificationIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
Hanrui Wang
Ruoxi Sun
Cunjian Chen
Minhui Xue
Lay-Ki Soon
Shuo Wang
Zhe Jin
DiffMAAML
221
5
0
20 Aug 2024
Panda or not Panda? Understanding Adversarial Attacks with Interactive
  Visualization
Panda or not Panda? Understanding Adversarial Attacks with Interactive Visualization
Yuzhe You
Jarvis Tse
Jian Zhao
AAML
198
5
0
22 Nov 2023
Beyond Labeling Oracles: What does it mean to steal ML models?
Beyond Labeling Oracles: What does it mean to steal ML models?
Avital Shafran
Ilia Shumailov
Murat A. Erdogdu
Nicolas Papernot
AAML
423
5
0
03 Oct 2023
Computational Asymmetries in Robust Classification
Computational Asymmetries in Robust ClassificationInternational Conference on Machine Learning (ICML), 2023
Samuele Marro
M. Lombardi
AAML
195
2
0
25 Jun 2023
Inference Time Evidences of Adversarial Attacks for Forensic on
  Transformers
Inference Time Evidences of Adversarial Attacks for Forensic on Transformers
Hugo Lemarchant
Liang Li
Yiming Qian
Yuta Nakashima
Hajime Nagahara
ViTAAML
269
0
0
31 Jan 2023
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for
  Improving Adversarial Training
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial TrainingComputer Vision and Pattern Recognition (CVPR), 2022
Junhao Dong
Seyed-Mohsen Moosavi-Dezfooli
Jianhuang Lai
Xiaohua Xie
AAML
365
45
0
01 Nov 2022
Robust Models are less Over-Confident
Robust Models are less Over-ConfidentNeural Information Processing Systems (NeurIPS), 2022
Julia Grabinski
Paul Gavrikov
J. Keuper
Margret Keuper
AAML
345
33
0
12 Oct 2022
An Adaptive Black-box Defense against Trojan Attacks (TrojDef)
An Adaptive Black-box Defense against Trojan Attacks (TrojDef)IEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2022
Guanxiong Liu
Abdallah Khreishah
Fatima Sharadgah
Issa M. Khalil
AAML
213
9
0
05 Sep 2022
Towards Adversarial Purification using Denoising AutoEncoders
Towards Adversarial Purification using Denoising AutoEncoders
Dvij Kalaria
Aritra Hazra
P. Chakrabarti
DiffM
279
8
0
29 Aug 2022
Resisting Adversarial Attacks in Deep Neural Networks using Diverse
  Decision Boundaries
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Manaar Alam
Shubhajit Datta
Debdeep Mukhopadhyay
Arijit Mondal
P. Chakrabarti
AAML
167
5
0
18 Aug 2022
Mixture GAN For Modulation Classification Resiliency Against Adversarial
  Attacks
Mixture GAN For Modulation Classification Resiliency Against Adversarial AttacksGlobal Communications Conference (GLOBECOM), 2022
Eyad Shtaiwi
Ahmed El Ouadrhiri
Majid Moradikia
Salma Sultana
Ahmed M Abdelhadi
Zhu Han
AAMLGAN
160
15
0
29 May 2022
Btech thesis report on adversarial attack detection and purification of
  adverserially attacked images
Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Dvij Kalaria
AAML
214
1
0
09 May 2022
Semantic interpretation for convolutional neural networks: What makes a
  cat a cat?
Semantic interpretation for convolutional neural networks: What makes a cat a cat?Advancement of science (AS), 2022
Haonan Xu
Yuntian Chen
Dongxiao Zhang
FAtt
275
5
0
16 Apr 2022
"That Is a Suspicious Reaction!": Interpreting Logits Variation to
  Detect NLP Adversarial Attacks
"That Is a Suspicious Reaction!": Interpreting Logits Variation to Detect NLP Adversarial AttacksAnnual Meeting of the Association for Computational Linguistics (ACL), 2022
Edoardo Mosca
Shreyash Agarwal
Javier Rando
Georg Groh
AAML
294
41
0
10 Apr 2022
Adversarial Robustness of Deep Reinforcement Learning based Dynamic
  Recommender Systems
Adversarial Robustness of Deep Reinforcement Learning based Dynamic Recommender Systems
Siyu Wang
Yuanjiang Cao
Xiaocong Chen
Weitong Chen
Xianzhi Wang
Quan.Z Sheng
AAML
191
3
0
02 Dec 2021
Detecting Adversaries, yet Faltering to Noise? Leveraging Conditional
  Variational AutoEncoders for Adversary Detection in the Presence of Noisy
  Images
Detecting Adversaries, yet Faltering to Noise? Leveraging Conditional Variational AutoEncoders for Adversary Detection in the Presence of Noisy Images
Dvij Kalaria
Aritra Hazra
P. Chakrabarti
AAML
278
0
0
28 Nov 2021
Unity is strength: Improving the Detection of Adversarial Examples with
  Ensemble Approaches
Unity is strength: Improving the Detection of Adversarial Examples with Ensemble Approaches
Francesco Craighero
Fabrizio Angaroni
Fabio Stella
Chiara Damiani
M. Antoniotti
Alex Graudenzi
AAML
296
15
0
24 Nov 2021
Detecting AutoAttack Perturbations in the Frequency Domain
Detecting AutoAttack Perturbations in the Frequency Domain
P. Lorenz
P. Harder
Dominik Strassel
Margret Keuper
J. Keuper
AAML
469
15
0
16 Nov 2021
Two Souls in an Adversarial Image: Towards Universal Adversarial Example
  Detection using Multi-view Inconsistency
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view InconsistencyAsia-Pacific Computer Systems Architecture Conference (ACSA), 2021
Sohaib Kiani
S. Awan
Chao Lan
Fengjun Li
Bo Luo
GANAAML
241
12
0
25 Sep 2021
SoK: Machine Learning Governance
SoK: Machine Learning Governance
Varun Chandrasekaran
Hengrui Jia
Anvith Thudi
Adelin Travers
Mohammad Yaghini
Nicolas Papernot
348
20
0
20 Sep 2021
Adversarially Robust One-class Novelty Detection
Adversarially Robust One-class Novelty DetectionIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2021
Shao-Yuan Lo
Poojan Oza
Vishal M. Patel
AAML
287
42
0
25 Aug 2021
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks
  in Complex Scenes
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Mingjun Yin
Shasha Li
Zikui Cai
Chengyu Song
M. Salman Asif
Amit K. Roy-Chowdhury
S. Krishnamurthy
AAML
311
25
0
19 Aug 2021
Models of Computational Profiles to Study the Likelihood of DNN
  Metamorphic Test Cases
Models of Computational Profiles to Study the Likelihood of DNN Metamorphic Test Cases
E. Merlo
Mira Marhaba
Foutse Khomh
Houssem Ben Braiek
G. Antoniol
175
1
0
28 Jul 2021
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying ThemInternational Conference on Machine Learning (ICML), 2021
Florian Tramèr
AAML
389
82
0
24 Jul 2021
Detect and Defense Against Adversarial Examples in Deep Learning using
  Natural Scene Statistics and Adaptive Denoising
Detect and Defense Against Adversarial Examples in Deep Learning using Natural Scene Statistics and Adaptive Denoising
Anouar Kherchouche
Sid Ahmed Fezza
W. Hamidouche
AAML
235
12
0
12 Jul 2021
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of
  Outlier Adversarial Examples
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples
Nelson Manohar-Alers
Ryan Feng
Sahib Singh
Jiguo Song
Atul Prakash
AAML
156
3
0
01 Jul 2021
Long-term Cross Adversarial Training: A Robust Meta-learning Method for
  Few-shot Classification Tasks
Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks
Fan Liu
Shuyu Zhao
Xuelong Dai
Bin Xiao
VLM
396
8
0
22 Jun 2021
Taxonomy of Machine Learning Safety: A Survey and Primer
Taxonomy of Machine Learning Safety: A Survey and PrimerACM Computing Surveys (CSUR), 2021
Sina Mohseni
Haotao Wang
Zhiding Yu
Chaowei Xiao
Zinan Lin
J. Yadawa
367
50
0
09 Jun 2021
Biometrics: Trust, but Verify
Biometrics: Trust, but VerifyIEEE Transactions on Biometrics Behavior and Identity Science (TBBIS), 2021
Anil K. Jain
Debayan Deb
Joshua J. Engelsma
FaML
362
114
0
14 May 2021
Self-Supervised Adversarial Example Detection by Disentangled
  Representation
Self-Supervised Adversarial Example Detection by Disentangled RepresentationInternational Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Jinyu Tian
Jiantao Zhou
AAMLDRL
287
10
0
08 May 2021
Adversarial Example Detection for DNN Models: A Review and Experimental
  Comparison
Adversarial Example Detection for DNN Models: A Review and Experimental ComparisonArtificial Intelligence Review (AIR), 2021
Ahmed Aldahdooh
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
795
171
0
01 May 2021
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection
ExAD: An Ensemble Approach for Explanation-based Adversarial Detection
R. Vardhan
Ninghao Liu
Phakpoom Chinprutthiwong
Weijie Fu
Zhen Hu
Helen Zhou
G. Gu
AAML
330
6
0
22 Mar 2021
Attribution of Gradient Based Adversarial Attacks for Reverse
  Engineering of Deceptions
Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of DeceptionsMedia Watermarking, Security, and Forensics (MWSF), 2021
Michael Goebel
Jason Bunk
Srinjoy Chattopadhyay
L. Nataraj
S. Chandrasekaran
B. S. Manjunath
AAML
164
5
0
19 Mar 2021
SpectralDefense: Detecting Adversarial Attacks on CNNs in the Fourier
  Domain
SpectralDefense: Detecting Adversarial Attacks on CNNs in the Fourier DomainIEEE International Joint Conference on Neural Network (IJCNN), 2021
P. Harder
Franz-Josef Pfreundt
Margret Keuper
J. Keuper
AAML
397
56
0
04 Mar 2021
Improving Adversarial Robustness via Probabilistically Compact Loss with
  Logit Constraints
Improving Adversarial Robustness via Probabilistically Compact Loss with Logit ConstraintsAAAI Conference on Artificial Intelligence (AAAI), 2020
X. Li
Xiangrui Li
Deng Pan
D. Zhu
AAML
244
17
0
14 Dec 2020
Effect of backdoor attacks over the complexity of the latent space
  distribution
Effect of backdoor attacks over the complexity of the latent space distribution
Henry Chacón
P. Rad
AAML
272
1
0
29 Nov 2020
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
FaceGuard: A Self-Supervised Defense Against Adversarial Face ImagesIEEE International Conference on Automatic Face & Gesture Recognition (FG), 2020
Debayan Deb
Xiaoming Liu
Anil K. Jain
CVBMAAMLPICV
351
33
0
28 Nov 2020
Adversarial Attack Based Countermeasures against Deep Learning
  Side-Channel Attacks
Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks
Ruizhe Gu
Ping Wang
Mengce Zheng
Honggang Hu
Nenghai Yu
AAML
115
6
0
22 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's PerspectiveACM Computing Surveys (ACM CSUR), 2020
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
327
189
0
08 Sep 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive SurveyACM Computing Surveys (ACM CSUR), 2020
A. Serban
E. Poll
Joost Visser
AAML
580
83
0
07 Aug 2020
Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Cassandra: Detecting Trojaned Networks from Adversarial PerturbationsIEEE Access (IEEE Access), 2020
Xiaoyu Zhang
Lin Wang
Rohit Gupta
Nazanin Rahnavard
M. Shah
AAML
263
28
0
28 Jul 2020
Connecting the Dots: Detecting Adversarial Perturbations Using Context
  Inconsistency
Connecting the Dots: Detecting Adversarial Perturbations Using Context InconsistencyEuropean Conference on Computer Vision (ECCV), 2020
Shasha Li
Shitong Zhu
Sudipta Paul
Amit K. Roy-Chowdhury
Chengyu Song
S. Krishnamurthy
A. Swami
Kevin S. Chan
AAML
344
41
0
19 Jul 2020
Efficient detection of adversarial images
Efficient detection of adversarial images
Darpan Kumar Yadav
Kartik Mundra
Rahul Modpur
Arpan Chattopadhyay
I. Kar
AAML
135
1
0
09 Jul 2020
Defensive Approximation: Securing CNNs using Approximate Computing
Defensive Approximation: Securing CNNs using Approximate ComputingInternational Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2020
Amira Guesmi
Ihsen Alouani
Khaled N. Khasawneh
M. Baklouti
T. Frikha
Mohamed Abid
Nael B. Abu-Ghazaleh
AAML
237
45
0
13 Jun 2020
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label
  Classifiers
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
S. Melacci
Gabriele Ciravegna
Angelo Sotgiu
Ambra Demontis
Battista Biggio
Marco Gori
Fabio Roli
397
21
0
06 Jun 2020
Effective and Robust Detection of Adversarial Examples via
  Benford-Fourier Coefficients
Effective and Robust Detection of Adversarial Examples via Benford-Fourier Coefficients
Chengcheng Ma
Baoyuan Wu
Shibiao Xu
Yanbo Fan
Yong Zhang
Xiaopeng Zhang
Zhifeng Li
AAML
218
9
0
12 May 2020
Adversarial Imitation Attack
Adversarial Imitation Attack
Mingyi Zhou
Jing Wu
Yipeng Liu
Xiaolin Huang
Shuaicheng Liu
Xiang Zhang
Ce Zhu
AAML
167
0
0
28 Mar 2020
DaST: Data-free Substitute Training for Adversarial Attacks
DaST: Data-free Substitute Training for Adversarial AttacksComputer Vision and Pattern Recognition (CVPR), 2020
Mingyi Zhou
Jing Wu
Yipeng Liu
Shuaicheng Liu
Ce Zhu
258
172
0
28 Mar 2020
Are L2 adversarial examples intrinsically different?
Are L2 adversarial examples intrinsically different?
Mingxuan Li
Jingyuan Wang
Yufan Wu
AAML
164
0
0
28 Feb 2020
12
Next
Page 1 of 2