ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1705.07204
  4. Cited By
Ensemble Adversarial Training: Attacks and Defenses
v1v2v3v4v5 (latest)

Ensemble Adversarial Training: Attacks and Defenses

19 May 2017
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
    AAML
ArXiv (abs)PDFHTML

Papers citing "Ensemble Adversarial Training: Attacks and Defenses"

50 / 1,470 papers shown
Boosting the Transferability of Adversarial Attacks with Reverse
  Adversarial Perturbation
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial PerturbationNeural Information Processing Systems (NeurIPS), 2022
Zeyu Qin
Yanbo Fan
Yi Liu
Li Shen
Yong Zhang
Jue Wang
Baoyuan Wu
AAMLSILM
207
107
0
12 Oct 2022
Stable and Efficient Adversarial Training through Local Linearization
Stable and Efficient Adversarial Training through Local Linearization
Zhuorong Li
Daiwei Yu
AAML
109
0
0
11 Oct 2022
Deep Reinforcement Learning based Evasion Generative Adversarial Network
  for Botnet Detection
Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet DetectionFuture generations computer systems (FGCS), 2022
Rizwan Hamid Randhawa
N. Aslam
Mohammad Alauthman
Muhammad Khalid
Husnain Rafiq
GAN
172
35
0
06 Oct 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted AttacksNeural Information Processing Systems (NeurIPS), 2022
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
232
68
0
05 Oct 2022
Robustness Certification of Visual Perception Models via Camera Motion
  Smoothing
Robustness Certification of Visual Perception Models via Camera Motion SmoothingConference on Robot Learning (CoRL), 2022
Hanjiang Hu
Zuxin Liu
Linyi Li
Jiacheng Zhu
Ding Zhao
AAML
188
8
0
04 Oct 2022
Understanding Adversarial Robustness Against On-manifold Adversarial
  Examples
Understanding Adversarial Robustness Against On-manifold Adversarial ExamplesPattern Recognition (Pattern Recogn.), 2022
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
240
18
0
02 Oct 2022
Learning Robust Kernel Ensembles with Kernel Average Pooling
Learning Robust Kernel Ensembles with Kernel Average Pooling
P. Bashivan
Adam Ibrahim
Amirozhan Dehghani
Yifei Ren
OOD
324
7
0
30 Sep 2022
Exploring the Relationship between Architecture and Adversarially Robust
  Generalization
Exploring the Relationship between Architecture and Adversarially Robust GeneralizationComputer Vision and Pattern Recognition (CVPR), 2022
Aishan Liu
Shiyu Tang
Yaning Tan
Yazhe Niu
Boxi Wu
Xianglong Liu
Dacheng Tao
AAML
230
23
0
28 Sep 2022
Strong Transferable Adversarial Attacks via Ensembled Asymptotically
  Normal Distribution Learning
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution LearningComputer Vision and Pattern Recognition (CVPR), 2022
Zhengwei Fang
Rui Wang
Tao Huang
L. Jing
AAML
260
23
0
24 Sep 2022
State-driven Implicit Modeling for Sparsity and Robustness in Neural
  Networks
State-driven Implicit Modeling for Sparsity and Robustness in Neural Networks
Alicia Y. Tsai
Juliette Decugis
L. Ghaoui
Alper Atamtürk
207
3
0
19 Sep 2022
Robust Ensemble Morph Detection with Domain Generalization
Robust Ensemble Morph Detection with Domain Generalization
Hossein Kashiani
S. Sami
Sobhan Soleymani
Nasser M. Nasrabadi
OODAAML
184
8
0
16 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud
  Recognition
PointCAT: Contrastive Adversarial Training for Robust Point Cloud RecognitionIEEE Transactions on Image Processing (IEEE TIP), 2022
Qidong Huang
Xiaoyi Dong
DongDong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
284
18
0
16 Sep 2022
Adversarial Coreset Selection for Efficient Robust Training
Adversarial Coreset Selection for Efficient Robust TrainingInternational Journal of Computer Vision (IJCV), 2022
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
194
11
0
13 Sep 2022
Boosting Robustness Verification of Semantic Feature Neighborhoods
Boosting Robustness Verification of Semantic Feature NeighborhoodsSensors Applications Symposium (SAS), 2022
Anan Kabaha
Dana Drachsler-Cohen
AAML
237
7
0
12 Sep 2022
Defend Data Poisoning Attacks on Voice Authentication
Defend Data Poisoning Attacks on Voice AuthenticationIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Ke Li
Cameron Baird
D. Lin
AAML
178
13
0
09 Sep 2022
Saliency Guided Adversarial Training for Learning Generalizable Features
  with Applications to Medical Imaging Classification System
Saliency Guided Adversarial Training for Learning Generalizable Features with Applications to Medical Imaging Classification System
Xin Li
Yao Qiang
Chengyin Li
Sijia Liu
D. Zhu
OODMedIm
219
4
0
09 Sep 2022
Bag of Tricks for FGSM Adversarial Training
Bag of Tricks for FGSM Adversarial Training
Zichao Li
Li Liu
Zeyu Wang
Yuyin Zhou
Cihang Xie
AAML
149
6
0
06 Sep 2022
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models
  with Transferred Evolutionary Strategies
Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary StrategiesInternational Conference on Information and Knowledge Management (CIKM), 2022
Yinghua Zhang
Yangqiu Song
Kun Bai
Qian Yang
AAML
142
1
0
28 Aug 2022
Anti-Retroactive Interference for Lifelong Learning
Anti-Retroactive Interference for Lifelong LearningEuropean Conference on Computer Vision (ECCV), 2022
Runqi Wang
Yuxiang Bao
Baochang Zhang
Jianzhuang Liu
Wentao Zhu
Guodong Guo
KELMCLL
167
25
0
27 Aug 2022
A Perturbation Resistant Transformation and Classification System for
  Deep Neural Networks
A Perturbation Resistant Transformation and Classification System for Deep Neural Networks
Nathaniel R. Dean
D. Sarkar
AAML
102
0
0
25 Aug 2022
Auditing Membership Leakages of Multi-Exit Networks
Auditing Membership Leakages of Multi-Exit NetworksConference on Computer and Communications Security (CCS), 2022
Zheng Li
Yiyong Liu
Xinlei He
Ning Yu
Michael Backes
Yang Zhang
AAML
187
46
0
23 Aug 2022
Adversarial Vulnerability of Temporal Feature Networks for Object
  Detection
Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Svetlana Pavlitskaya
Nikolai Polley
Michael Weber
J. Marius Zöllner
AAML
172
7
0
23 Aug 2022
Membership-Doctor: Comprehensive Assessment of Membership Inference
  Against Machine Learning Models
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models
Xinlei He
Zheng Li
Weilin Xu
Cory Cornelius
Yang Zhang
MIACV
207
27
0
22 Aug 2022
Machine Learning with Confidential Computing: A Systematization of
  Knowledge
Machine Learning with Confidential Computing: A Systematization of KnowledgeACM Computing Surveys (ACM CSUR), 2022
Fan Mo
Zahra Tarkhani
Hamed Haddadi
384
21
0
22 Aug 2022
A Novel Plug-and-Play Approach for Adversarially Robust Generalization
A Novel Plug-and-Play Approach for Adversarially Robust Generalization
Deepak Maurya
Adarsh Barik
Jean Honorio
OODAAML
276
0
0
19 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for
  Image Classifier Models
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier ModelsIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
168
20
0
19 Aug 2022
Resisting Adversarial Attacks in Deep Neural Networks using Diverse
  Decision Boundaries
Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Manaar Alam
Shubhajit Datta
Debdeep Mukhopadhyay
Arijit Mondal
P. Chakrabarti
AAML
127
5
0
18 Aug 2022
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Hung-Jui Wang
Yuehua Wu
Shang-Tse Chen
AAML
275
2
0
18 Aug 2022
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for
  Generating Adversarial Instances in Deep Networks
An Evolutionary, Gradient-Free, Query-Efficient, Black-Box Algorithm for Generating Adversarial Instances in Deep Networks
Raz Lapid
Zvika Haramaty
Moshe Sipper
AAMLMLAU
185
14
0
17 Aug 2022
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Two Heads are Better than One: Robust Learning Meets Multi-branch Models
Dong Huang
Qi Bu
Yuhao Qing
Haowen Pi
Sen Wang
Zihan Fang
Heming Cui
Dong Huang
OODAAML
308
2
0
17 Aug 2022
An Overview and Prospective Outlook on Robust Training and Certification
  of Machine Learning Models
An Overview and Prospective Outlook on Robust Training and Certification of Machine Learning Models
Brendon G. Anderson
Tanmay Gautam
Somayeh Sojoudi
OOD
248
2
0
15 Aug 2022
Unifying Gradients to Improve Real-world Robustness for Deep Networks
Unifying Gradients to Improve Real-world Robustness for Deep NetworksACM Transactions on Intelligent Systems and Technology (ACM TIST), 2022
Yingwen Wu
Sizhe Chen
Kun Fang
Xiaolin Huang
AAML
210
4
0
12 Aug 2022
Diverse Generative Perturbations on Attention Space for Transferable
  Adversarial Attacks
Diverse Generative Perturbations on Attention Space for Transferable Adversarial AttacksInternational Conference on Information Photonics (ICIP), 2022
Woo Jae Kim
Seunghoon Hong
Sung-eui Yoon
AAML
208
15
0
11 Aug 2022
Federated Adversarial Learning: A Framework with Convergence Analysis
Federated Adversarial Learning: A Framework with Convergence AnalysisInternational Conference on Machine Learning (ICML), 2022
Xiaoxiao Li
Zhao Song
Jiaming Yang
FedML
299
31
0
07 Aug 2022
Blackbox Attacks via Surrogate Ensemble Search
Blackbox Attacks via Surrogate Ensemble SearchNeural Information Processing Systems (NeurIPS), 2022
Zikui Cai
Chengyu Song
S. Krishnamurthy
Amit K. Roy-Chowdhury
M. Salman Asif
AAML
308
26
0
07 Aug 2022
Data-free Backdoor Removal based on Channel Lipschitzness
Data-free Backdoor Removal based on Channel LipschitznessEuropean Conference on Computer Vision (ECCV), 2022
Runkai Zheng
Rong Tang
Jianze Li
Li Liu
AAML
270
124
0
05 Aug 2022
Self-Ensembling Vision Transformer (SEViT) for Robust Medical Image
  Classification
Self-Ensembling Vision Transformer (SEViT) for Robust Medical Image ClassificationInternational Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI), 2022
Faris Almalik
Mohammad Yaqub
Karthik Nandakumar
ViTAAMLMedIm
231
43
0
04 Aug 2022
Towards Efficient Communications in Federated Learning: A Contemporary
  Survey
Towards Efficient Communications in Federated Learning: A Contemporary SurveyJournal of the Franklin Institute (JFI), 2022
Zihao Zhao
Yuzhu Mao
Yang Liu
Linqi Song
Ouyang Ye
Xinlei Chen
Wenbo Ding
FedML
350
70
0
02 Aug 2022
Robust Real-World Image Super-Resolution against Adversarial Attacks
Robust Real-World Image Super-Resolution against Adversarial AttacksACM Multimedia (MM), 2021
N. Babaguchi
John R. Smith
Pengxu Wei
T. Plagemann
Rong Yan
AAML
247
27
0
31 Jul 2022
Perception-Aware Attack: Creating Adversarial Music via
  Reverse-Engineering Human Perception
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human PerceptionConference on Computer and Communications Security (CCS), 2022
Rui Duan
Zhe Qu
Shangqing Zhao
Leah Ding
Yao-Hong Liu
Zhuo Lu
AAML
158
8
0
26 Jul 2022
LGV: Boosting Adversarial Example Transferability from Large Geometric
  Vicinity
LGV: Boosting Adversarial Example Transferability from Large Geometric VicinityEuropean Conference on Computer Vision (ECCV), 2022
Martin Gubri
Maxime Cordy
Mike Papadakis
Yves Le Traon
Koushik Sen
AAML
199
64
0
26 Jul 2022
SegPGD: An Effective and Efficient Adversarial Attack for Evaluating and
  Boosting Segmentation Robustness
SegPGD: An Effective and Efficient Adversarial Attack for Evaluating and Boosting Segmentation RobustnessEuropean Conference on Computer Vision (ECCV), 2022
Jindong Gu
Hengshuang Zhao
Volker Tresp
Juil Sock
AAML
269
90
0
25 Jul 2022
Adversarial Pixel Restoration as a Pretext Task for Transferable
  Perturbations
Adversarial Pixel Restoration as a Pretext Task for Transferable PerturbationsBritish Machine Vision Conference (BMVC), 2022
H. Malik
Shahina Kunhimon
Muzammal Naseer
Salman Khan
Fahad Shahbaz Khan
AAML
200
8
0
18 Jul 2022
Adversarially-Aware Robust Object Detector
Adversarially-Aware Robust Object DetectorEuropean Conference on Computer Vision (ECCV), 2022
Ziyi Dong
Pengxu Wei
Guanbin Li
AAMLObjD
242
36
0
13 Jul 2022
Interactive Machine Learning: A State of the Art Review
Interactive Machine Learning: A State of the Art Review
Natnael A. Wondimu
Cédric Buche
U. Visser
VLMHAI
278
12
0
13 Jul 2022
Perturbation Inactivation Based Adversarial Defense for Face Recognition
Perturbation Inactivation Based Adversarial Defense for Face RecognitionIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Min Ren
Yuhao Zhu
Yunlong Wang
Zhenan Sun
AAML
194
21
0
13 Jul 2022
Exploring Adversarial Examples and Adversarial Robustness of
  Convolutional Neural Networks by Mutual Information
Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information
Jiebao Zhang
Wenhua Qian
Ren-qi Nie
Jinde Cao
Dan Xu
GANAAML
151
0
0
12 Jul 2022
Adversarial Robustness Assessment of NeuroEvolution Approaches
Adversarial Robustness Assessment of NeuroEvolution ApproachesIEEE Congress on Evolutionary Computation (CEC), 2022
Inês Valentim
Nuno Lourenço
Nuno Antunes
AAML
140
1
0
12 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial AttackEuropean Conference on Computer Vision (ECCV), 2022
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
298
222
0
12 Jul 2022
Certified Adversarial Robustness via Anisotropic Randomized Smoothing
Certified Adversarial Robustness via Anisotropic Randomized Smoothing
Hanbin Hong
Yuan Hong
AAML
225
6
0
12 Jul 2022
Previous
123...8910...282930
Next