ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1705.07204
  4. Cited By
Ensemble Adversarial Training: Attacks and Defenses
v1v2v3v4v5 (latest)

Ensemble Adversarial Training: Attacks and Defenses

19 May 2017
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
    AAML
ArXiv (abs)PDFHTML

Papers citing "Ensemble Adversarial Training: Attacks and Defenses"

50 / 1,471 papers shown
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger ActivationIEEE Transactions on Information Forensics and Security (TIFS), 2025
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAMLSILM
1.0K
5
0
20 Apr 2025
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
AAML
381
0
0
19 Apr 2025
SemDiff: Generating Natural Unrestricted Adversarial Examples via Semantic Attributes Optimization in Diffusion Models
SemDiff: Generating Natural Unrestricted Adversarial Examples via Semantic Attributes Optimization in Diffusion Models
Zeyu Dai
Shengcai Liu
Rui He
Jiahao Wu
Ning Lu
Wenqi Fan
Qing Li
Ke Tang
DiffMAAML
356
0
0
16 Apr 2025
Defending Against Frequency-Based Attacks with Diffusion Models
Defending Against Frequency-Based Attacks with Diffusion Models
Fatemeh Amerehi
Patrick Healy
AAML
281
1
0
15 Apr 2025
Two is Better than One: Efficient Ensemble Defense for Robust and Compact Models
Two is Better than One: Efficient Ensemble Defense for Robust and Compact ModelsComputer Vision and Pattern Recognition (CVPR), 2025
Yoojin Jung
Byung Cheol Song
AAMLVLMMQ
210
1
0
07 Apr 2025
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense
Haibo Zhang
Zhihua Yao
Kouichi Sakurai
Takeshi Saitoh
AAML
246
1
0
02 Apr 2025
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
Chaohu Liu
Tianyi Gui
Yu Liu
Linli Xu
VLMAAML
347
3
0
02 Apr 2025
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection
Yinghe Zhang
Chi Liu
S. Kevin Zhou
Sheng Shen
Peng Gui
AAML
298
0
0
01 Apr 2025
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks
Zongyuan Zhang
Tianyang Duan
Zheng Lin
Dong Huang
Zihan Fang
...
Ling Xiong
Hongbin Liang
Heming Cui
Yong Cui
Yue Gao
AAML
294
9
0
26 Mar 2025
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning
State-Aware Perturbation Optimization for Robust Deep Reinforcement LearningIEEE Transactions on Mobile Computing (IEEE TMC), 2025
Zongyuan Zhang
Tianyang Duan
Zheng Lin
Dong Huang
Zihan Fang
Zekai Sun
Ling Xiong
Hongbin Liang
Heming Cui
Yong Cui
AAML
375
6
0
26 Mar 2025
Principal Eigenvalue Regularization for Improved Worst-Class Certified Robustness of Smoothed Classifiers
Principal Eigenvalue Regularization for Improved Worst-Class Certified Robustness of Smoothed Classifiers
Gaojie Jin
Tianjin Huang
Ronghui Mu
Xiaowei Huang
AAML
307
0
0
21 Mar 2025
Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement
Improving Adversarial Transferability on Vision Transformers via Forward Propagation RefinementComputer Vision and Pattern Recognition (CVPR), 2025
Yuchen Ren
Subrat Kishore Dutta
Chenhao Lin
Bo Yang
Zhe Liu
Jiafei Wu
Chao Shen
ViT
275
5
0
19 Mar 2025
GSBA$^K$: $top$-$K$ Geometric Score-based Black-box Attack
GSBAK^KK: toptoptop-KKK Geometric Score-based Black-box Attack
Md. Farhamdur Reza
Richeng Jin
Tianfu Wu
H. Dai
AAML
346
0
0
17 Mar 2025
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial AttacksNeural Information Processing Systems (NeurIPS), 2025
Jin Li
Ziqiang He
Anwei Luo
Jian-Fang Hu
Zhong Wang
Xiangui Kang
DiffM
299
8
0
12 Mar 2025
Boosting the Local Invariance for Better Adversarial Transferability
Bohan Liu
Xiaosen Wang
AAML
479
0
0
08 Mar 2025
Improving the Transferability of Adversarial Attacks by an Input Transpose
Qing Wan
Shilong Deng
Xun Wang
AAML
296
0
0
02 Mar 2025
Concealed Adversarial attacks on neural networks for sequential data
Concealed Adversarial attacks on neural networks for sequential data
P. Sokerin
Dmitry Anikin
Sofia Krehova
Alexey Zaytsev
AAMLAI4TS
203
0
0
28 Feb 2025
Data-free Universal Adversarial Perturbation with Pseudo-semantic Prior
Data-free Universal Adversarial Perturbation with Pseudo-semantic PriorComputer Vision and Pattern Recognition (CVPR), 2025
Chanhui Lee
Yeonghwan Song
Jeany Son
AAML
931
1
0
28 Feb 2025
SAP-DIFF: Semantic Adversarial Patch Generation for Black-Box Face Recognition Models via Diffusion Models
SAP-DIFF: Semantic Adversarial Patch Generation for Black-Box Face Recognition Models via Diffusion ModelsInternational Conference on Multimedia Retrieval (ICMR), 2025
Mingsi Wang
Shuaiyin Yao
Chang Yue
Lijie Zhang
Guozhu Meng
DiffMAAML
274
0
0
27 Feb 2025
BeamVQ: Beam Search with Vector Quantization to Mitigate Data Scarcity in Physical Spatiotemporal Forecasting
BeamVQ: Beam Search with Vector Quantization to Mitigate Data Scarcity in Physical Spatiotemporal Forecasting
Weiyan Wang
Xingjian Shi
Hao Wu
Yuan Gao
Rui Chen
...
Shuaipeng Li
Yangyu Tao
Di Wang
Hao Wu
Xiaomeng Huang
310
4
0
26 Feb 2025
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation
Wenyuan Wu
Zheng Liu
Yong Chen
Chao Su
Dezhong Peng
Xu Wang
AAML
511
2
0
24 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
759
0
0
20 Feb 2025
CyberSentinel: An Emergent Threat Detection System for AI Security
CyberSentinel: An Emergent Threat Detection System for AI Security
Krti Tallam
173
5
0
20 Feb 2025
A Transfer Attack to Image Watermarks
A Transfer Attack to Image WatermarksInternational Conference on Learning Representations (ICLR), 2024
Yuepeng Hu
Zhengyuan Jiang
Moyang Guo
Neil Zhenqiang Gong
449
20
0
20 Feb 2025
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN
Jiayu Zhang
Zhiyu Zhu
Xinyi Wang
Silin Liao
Zhibo Jin
Flora Salim
Huaming Chen
GAN
502
0
0
16 Feb 2025
Wasserstein distributional adversarial training for deep neural networks
Wasserstein distributional adversarial training for deep neural networks
Xingjian Bai
Guangyi He
Yifan Jiang
Jan Obloj
OOD
374
3
0
13 Feb 2025
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative ModelsIEEE International Conference on Healthcare Informatics (ICHI), 2025
Amy Rafferty
Rishi Ramaesh
Ajitha Rajan
MedImAAML
385
1
0
04 Feb 2025
Transferable Adversarial Examples with Bayes Approach
Transferable Adversarial Examples with Bayes Approach
Mingyuan Fan
Cen Chen
Ximeng Liu
Wenzhong Guo
AAML
311
1
0
08 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50Silicon Valley Cybersecurity Conference (SVCC), 2025
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
333
1
0
04 Jan 2025
Boosting Adversarial Transferability with Spatial Adversarial Alignment
Boosting Adversarial Transferability with Spatial Adversarial Alignment
Zhaoyu Chen
Haijing Guo
Kaixun Jiang
Jiyuan Fu
Xinyu Zhou
Jinjie Wei
Hao Tang
Yue Liu
Wenqiang Zhang
AAML
361
1
0
02 Jan 2025
Vitron: A Unified Pixel-level Vision LLM for Understanding, Generating, Segmenting, Editing
Vitron: A Unified Pixel-level Vision LLM for Understanding, Generating, Segmenting, EditingNeural Information Processing Systems (NeurIPS), 2024
Hao Fei
Shengqiong Wu
Hao Zhang
Tat-Seng Chua
Shuicheng Yan
499
77
0
31 Dec 2024
Enhancing Adversarial Robustness of Deep Neural Networks Through
  Supervised Contrastive Learning
Enhancing Adversarial Robustness of Deep Neural Networks Through Supervised Contrastive Learning
Longwei Wang
Navid Nayyem
Abdullah Rakin
AAML
191
2
0
27 Dec 2024
A Review of the Duality of Adversarial Learning in Network Intrusion:
  Attacks and Countermeasures
A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures
Shalini Saini
Anitha Chennamaneni
Babatunde Sawyerr
AAML
289
3
0
18 Dec 2024
Pre-trained Multiple Latent Variable Generative Models are good
  defenders against Adversarial Attacks
Pre-trained Multiple Latent Variable Generative Models are good defenders against Adversarial AttacksIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2024
Dario Serez
Marco Cristani
Alessio Del Bue
Vittorio Murino
Pietro Morerio
AAML
404
1
0
04 Dec 2024
Sustainable Self-evolution Adversarial Training
Sustainable Self-evolution Adversarial TrainingACM Multimedia (MM), 2024
Wenxuan Wang
Chenglei Wang
Huihui Qi
Menghao Ye
Xuelin Qian
Peng Wang
Yanning Zhang
AAML
433
0
0
03 Dec 2024
Face De-identification: State-of-the-art Methods and Comparative Studies
Face De-identification: State-of-the-art Methods and Comparative Studies
Jingyi Cao
Xiangyi Chen
Bo Liu
Ming Ding
Rong Xie
Li Song
Zhu Li
Wenjun Zhang
PICV
286
6
0
15 Nov 2024
The Inherent Adversarial Robustness of Analog In-Memory Computing
The Inherent Adversarial Robustness of Analog In-Memory ComputingNature Communications (Nat. Commun.), 2024
Corey Lammie
Julian Büchel
A. Vasilopoulos
Corey Lammie
Abu Sebastian
AAML
336
8
0
11 Nov 2024
Neural Fingerprints for Adversarial Attack Detection
Neural Fingerprints for Adversarial Attack Detection
Haim Fisher
Moni Shahar
Yehezkel S. Resheff
AAML
155
1
0
07 Nov 2024
User-wise Perturbations for User Identity Protection in EEG-Based BCIs
User-wise Perturbations for User Identity Protection in EEG-Based BCIsJournal of Neural Engineering (J. Neural Eng.), 2024
Xiaoqing Chen
Siyang Li
Yunlu Tu
Ziwei Wang
Dongrui Wu
188
5
0
04 Nov 2024
ARQ: A Mixed-Precision Quantization Framework for Accurate and Certifiably Robust DNNs
ARQ: A Mixed-Precision Quantization Framework for Accurate and Certifiably Robust DNNs
Yuchen Yang
Shubham Ugare
Yifan Zhao
Gagandeep Singh
Sasa Misailovic
MQ
332
1
0
31 Oct 2024
Longitudinal Mammogram Exam-based Breast Cancer Diagnosis Models:
  Vulnerability to Adversarial Attacks
Longitudinal Mammogram Exam-based Breast Cancer Diagnosis Models: Vulnerability to Adversarial Attacks
Zhengbo Zhou
Degan Hao
Dooman Arefan
M. Zuley
J. Sumkin
Shandong Wu
AAML
233
0
0
29 Oct 2024
GADT: Enhancing Transferable Adversarial Attacks through Gradient-guided
  Adversarial Data Transformation
GADT: Enhancing Transferable Adversarial Attacks through Gradient-guided Adversarial Data Transformation
Yating Ma
Xiaogang Xu
Liming Fang
Zhe Liu
AAML
266
2
0
24 Oct 2024
Conflict-Aware Adversarial Training
Conflict-Aware Adversarial Training
Zhiyu Xue
Haohan Wang
Yao Qin
Ramtin Pedarsani
AAML
345
0
0
21 Oct 2024
ROSAR: An Adversarial Re-Training Framework for Robust Side-Scan Sonar
  Object Detection
ROSAR: An Adversarial Re-Training Framework for Robust Side-Scan Sonar Object Detection
Martin Aubard
László Antal
Ana Madureira
Luis F. Teixeira
Erika Ábrahám
AAML
221
2
0
14 Oct 2024
S$^4$ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
S4^44ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
750
0
0
13 Oct 2024
Collaboration! Towards Robust Neural Methods for Routing Problems
Collaboration! Towards Robust Neural Methods for Routing ProblemsNeural Information Processing Systems (NeurIPS), 2024
Jianan Zhou
Yaoxin Wu
Zhiguang Cao
Wen Song
Jie Zhang
Zhiqi Shen
AAML
208
4
0
07 Oct 2024
On the Adversarial Risk of Test Time Adaptation: An Investigation into Realistic Test-Time Data Poisoning
On the Adversarial Risk of Test Time Adaptation: An Investigation into Realistic Test-Time Data PoisoningInternational Conference on Learning Representations (ICLR), 2024
Yongyi Su
Yushu Li
Nanqing Liu
Kui Jia
Xulei Yang
Chuan-Sheng Foo
Xun Xu
TTAAAML
481
2
0
07 Oct 2024
TA3: Testing Against Adversarial Attacks on Machine Learning Models
TA3: Testing Against Adversarial Attacks on Machine Learning Models
Yuanzhe Jin
Min Chen
165
2
0
06 Oct 2024
Towards Universal Certified Robustness with Multi-Norm Training
Towards Universal Certified Robustness with Multi-Norm Training
Enyi Jiang
Gagandeep Singh
Gagandeep Singh
AAML
535
2
0
03 Oct 2024
Navigating Threats: A Survey of Physical Adversarial Attacks on LiDAR
  Perception Systems in Autonomous Vehicles
Navigating Threats: A Survey of Physical Adversarial Attacks on LiDAR Perception Systems in Autonomous Vehicles
Amira Guesmi
Mohamed Bennai
AAML
328
6
0
30 Sep 2024
Previous
12345...282930
Next
Page 2 of 30
Pageof 30