ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1706.06083
  4. Cited By
Towards Deep Learning Models Resistant to Adversarial Attacks
v1v2v3v4 (latest)

Towards Deep Learning Models Resistant to Adversarial Attacks

19 June 2017
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
    SILMOOD
ArXiv (abs)PDFHTMLGithub (752★)

Papers citing "Towards Deep Learning Models Resistant to Adversarial Attacks"

50 / 7,067 papers shown
TAIGen: Training-Free Adversarial Image Generation via Diffusion Models
TAIGen: Training-Free Adversarial Image Generation via Diffusion Models
Susim Roy
Anubhooti Jain
Mayank Vatsa
Richa Singh
DiffMVLM
187
1
0
20 Aug 2025
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection
Jan Lum Fok
Qingwen Zeng
Shiping Chen
Oscar Fawkes
H. Chen
AAML
100
3
0
20 Aug 2025
Enhancing Targeted Adversarial Attacks on Large Vision-Language Models via Intermediate Projector
Enhancing Targeted Adversarial Attacks on Large Vision-Language Models via Intermediate Projector
Yiming Cao
Yanjie Li
K. Liang
Y. Lai
AAML
124
0
0
19 Aug 2025
Timestep-Compressed Attack on Spiking Neural Networks through Timestep-Level Backpropagation
Timestep-Compressed Attack on Spiking Neural Networks through Timestep-Level Backpropagation
D. Kang
Doohyun Kim
Sang-Ki Ko
Jinkyu Lee
Hyeongboo Baek
Brent ByungHoon Kang
AAML
113
0
0
19 Aug 2025
DASH: A Meta-Attack Framework for Synthesizing Effective and Stealthy Adversarial Examples
DASH: A Meta-Attack Framework for Synthesizing Effective and Stealthy Adversarial Examples
Abdullah Al Nomaan Nafi
Habibur Rahaman
Zafaryab Haider
Tanzim Mahfuz
Fnu Suya
Swarup Bhunia
Prabuddha Chakraborty
AAML
171
0
0
18 Aug 2025
Adversarial Attacks on VQA-NLE: Exposing and Alleviating Inconsistencies in Visual Question Answering Explanations
Adversarial Attacks on VQA-NLE: Exposing and Alleviating Inconsistencies in Visual Question Answering Explanations
Yahsin Yeh
Yilun Wu
Bokai Ruan
Honghan Shuai
AAML
87
1
0
17 Aug 2025
EXOTIC: An Exact, Optimistic, Tree-Based Algorithm for Min-Max Optimization
EXOTIC: An Exact, Optimistic, Tree-Based Algorithm for Min-Max Optimization
Chinmay Maheshwari
Chinmay Pimpalkhare
Debasish Chatterjee
107
0
0
17 Aug 2025
Adversarial Robustness in Distributed Quantum Machine Learning
Adversarial Robustness in Distributed Quantum Machine Learning
Pouya Kananian
Hans-Arno Jacobsen
OODAAML
143
0
0
16 Aug 2025
ComplicitSplat: Downstream Models are Vulnerable to Blackbox Attacks by 3D Gaussian Splat Camouflages
ComplicitSplat: Downstream Models are Vulnerable to Blackbox Attacks by 3D Gaussian Splat Camouflages
Matthew Hull
Haoyang Yang
Pratham Mehta
Mansi Phute
Aeree Cho
...
Matthew Lau
Wenke Lee
W. T. Lunardi
Martin Andreoni
Polo Chau
AAML3DGS
205
0
0
16 Aug 2025
TriQDef: Disrupting Semantic and Gradient Alignment to Prevent Adversarial Patch Transferability in Quantized Neural Networks
TriQDef: Disrupting Semantic and Gradient Alignment to Prevent Adversarial Patch Transferability in Quantized Neural Networks
Amira Guesmi
B. Ouni
Muhammad Shafique
AAMLMQ
83
0
0
16 Aug 2025
Boosting the Robustness-Accuracy Trade-off of SNNs by Robust Temporal Self-Ensemble
Boosting the Robustness-Accuracy Trade-off of SNNs by Robust Temporal Self-Ensemble
Jihang Wang
Dongcheng Zhao
Ruolin Chen
Qian Zhang
Yi Zeng
AAML
157
0
0
15 Aug 2025
Robust Convolution Neural ODEs via Contractivity-promoting regularization
Robust Convolution Neural ODEs via Contractivity-promoting regularization
M. Zakwan
Liang Xu
Giancarlo Ferrari-Trecate
AAML
130
0
0
15 Aug 2025
Semantically Guided Adversarial Testing of Vision Models Using Language Models
Semantically Guided Adversarial Testing of Vision Models Using Language Models
Katarzyna Filus
Jorge M. Cruz-Duarte
AAMLVLM
95
0
0
15 Aug 2025
Contrastive ECOC: Learning Output Codes for Adversarial Defense
Contrastive ECOC: Learning Output Codes for Adversarial Defense
Che-Yu Chou
Hung-Hsuan Chen
55
0
0
14 Aug 2025
SHALE: A Scalable Benchmark for Fine-grained Hallucination Evaluation in LVLMs
SHALE: A Scalable Benchmark for Fine-grained Hallucination Evaluation in LVLMs
Bei Yan
Z. Chen
Yuecong Min
Jie Zhang
Jiahao Wang
X. Wang
Shiguang Shan
HILM
163
1
0
13 Aug 2025
Exploring Cross-Stage Adversarial Transferability in Class-Incremental Continual Learning
Exploring Cross-Stage Adversarial Transferability in Class-Incremental Continual Learning
Jungwoo Kim
Jong-Seok Lee
AAMLCLLSILM
99
0
0
12 Aug 2025
A Guide to Robust Generalization: The Impact of Architecture, Pre-training, and Optimization Strategy
A Guide to Robust Generalization: The Impact of Architecture, Pre-training, and Optimization Strategy
M. Heuillet
Rishika Bhagwatkar
Jonas Ngnawé
Y. Pequignot
Alexandre Larouche
Christian Gagné
Irina Rish
Ola Ahmad
Audrey Durand
OODAAMLVLM
161
1
0
12 Aug 2025
P-CAFE: Personalized Cost-Aware Incremental Feature Selection For Electronic Health Records
P-CAFE: Personalized Cost-Aware Incremental Feature Selection For Electronic Health Records
Naama Kashani
Mira Cohen
Uri Shaham
122
0
0
12 Aug 2025
Constrained Black-Box Attacks Against Cooperative Multi-Agent Reinforcement Learning
Constrained Black-Box Attacks Against Cooperative Multi-Agent Reinforcement Learning
Amine Andam
Jamal Bentahar
Mustapha Hedabou
AAML
97
0
0
12 Aug 2025
AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders
AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders
Hiroya Kato
Kentaro Kita
Kento Hasegawa
Seira Hidano
112
0
0
12 Aug 2025
VISOR: Visual Input-based Steering for Output Redirection in Vision-Language Models
VISOR: Visual Input-based Steering for Output Redirection in Vision-Language Models
Mansi Phute
Ravikumar Balakrishnan
LLMSV
92
0
0
11 Aug 2025
Adversarial Video Promotion Against Text-to-Video Retrieval
Adversarial Video Promotion Against Text-to-Video Retrieval
Qiwei Tian
Chenhao Lin
Zhengyu Zhao
Qian Li
Shuai Liu
Chao Shen
AAML
174
0
0
09 Aug 2025
Who's the Evil Twin? Differential Auditing for Undesired Behavior
Who's the Evil Twin? Differential Auditing for Undesired Behavior
Ishwar Balappanawar
Venkata Hasith Vattikuti
Greta Kintzley
Ronan Azimi-Mancel
Satvik Golechha
AAMLMLAU
304
0
0
09 Aug 2025
Many-Turn Jailbreaking
Many-Turn Jailbreaking
Xianjun Yang
Liqiang Xiao
Shiyang Li
Faisal Ladhak
Hyokun Yun
Linda R. Petzold
Yi Xu
William Wang
150
0
0
09 Aug 2025
ETA: Energy-based Test-time Adaptation for Depth Completion
ETA: Energy-based Test-time Adaptation for Depth Completion
Younjoon Chung
Hyoungseob Park
Patrick Rim
Xiaoran Zhang
Jihe He
Ziyao Zeng
Safa Cicek
Byung-Woo Hong
James S. Duncan
Alex Wong
TTA
351
2
0
08 Aug 2025
Learning to Forget with Information Divergence Reweighted Objectives for Noisy Labels
Learning to Forget with Information Divergence Reweighted Objectives for Noisy Labels
Jeremiah Birrell
Reza Ebrahimi
NoLa
206
0
0
08 Aug 2025
Keep It Real: Challenges in Attacking Compression-Based Adversarial Purification
Keep It Real: Challenges in Attacking Compression-Based Adversarial Purification
Samuel Räber
Till Aczél
Andreas Plesner
Roger Wattenhofer
DiffMAAML
261
0
0
07 Aug 2025
Physical Adversarial Camouflage through Gradient Calibration and Regularization
Physical Adversarial Camouflage through Gradient Calibration and RegularizationInternational Joint Conference on Artificial Intelligence (IJCAI), 2025
Jiawei Liang
Yaning Tan
Jianjie Huang
Chenxi Si
Ming Zhang
Xiaochun Cao
AAML
155
3
0
07 Aug 2025
Adapting Vision-Language Models Without Labels: A Comprehensive Survey
Adapting Vision-Language Models Without Labels: A Comprehensive Survey
Hao Dong
Lijun Sheng
Jian Liang
Ran He
Eleni Chatzi
Olga Fink
OffRLVLM
217
4
0
07 Aug 2025
From Detection to Correction: Backdoor-Resilient Face Recognition via Vision-Language Trigger Detection and Noise-Based Neutralization
From Detection to Correction: Backdoor-Resilient Face Recognition via Vision-Language Trigger Detection and Noise-Based Neutralization
Farah Wahida
M. Chamikara
Yashothara Shanmugarasa
Mohan Baruwal Chhetri
Thilina Ranbaduge
Ibrahim Khalil
AAML
135
0
0
07 Aug 2025
FLAT: Latent-Driven Arbitrary-Target Backdoor Attacks in Federated Learning
FLAT: Latent-Driven Arbitrary-Target Backdoor Attacks in Federated Learning
T. Nguyen
Khoa D. Doan
Kok-Seng Wong
FedMLAAML
136
1
0
06 Aug 2025
AuthPrint: Fingerprinting Generative Models Against Malicious Model Providers
AuthPrint: Fingerprinting Generative Models Against Malicious Model Providers
Kai Yao
Marc Juarez
WIGM
302
2
0
06 Aug 2025
TDSNNs: Competitive Topographic Deep Spiking Neural Networks for Visual Cortex Modeling
TDSNNs: Competitive Topographic Deep Spiking Neural Networks for Visual Cortex Modeling
Deming Zhou
Yuetong Fang
Zhaorui Wang
Zhanchen Zhu
106
1
0
06 Aug 2025
When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs
When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs
Bodam Kim
Hiskias Dingeto
Taeyoun Kwon
Dasol Choi
DongGeon Lee
Haon Park
JaeHoon Lee
Jongho Shin
AAML
215
2
0
05 Aug 2025
The Power of Many: Synergistic Unification of Diverse Augmentations for Efficient Adversarial Robustness
The Power of Many: Synergistic Unification of Diverse Augmentations for Efficient Adversarial Robustness
Wang Yu-Hang
Shiwei Li
Jianxiang Liao
Li Bohan
Jian Liu
Wenfei Yin
AAML
252
0
0
05 Aug 2025
VideoGuard: Protecting Video Content from Unauthorized Editing
VideoGuard: Protecting Video Content from Unauthorized Editing
Junjie Cao
KaiZhou Li
Xinchun Yu
Hongxiang Li
Xiaoping Zhang
DiffMVGen
118
0
0
05 Aug 2025
Untraceable DeepFakes via Traceable Fingerprint Elimination
Untraceable DeepFakes via Traceable Fingerprint Elimination
Jiewei Lai
Lan zhang
Chen Tang
Pengcheng Sun
Xinming Wang
Yunhao Wang
AAML
206
0
0
05 Aug 2025
GeoShield: Safeguarding Geolocation Privacy from Vision-Language Models via Adversarial Perturbations
GeoShield: Safeguarding Geolocation Privacy from Vision-Language Models via Adversarial Perturbations
Xinwei Liu
Xiaojun Jia
Yuan Xun
Simeng Qin
Simeng Qin
AAML
374
1
0
05 Aug 2025
Adversarial Attention Perturbations for Large Object Detection Transformers
Adversarial Attention Perturbations for Large Object Detection Transformers
Zachary Yahn
Selim Furkan Tekin
Fatih Ilhan
Sihao Hu
Tiansheng Huang
Yichang Xu
Margaret Loper
Ling Liu
AAMLViT
139
2
0
05 Aug 2025
Are Inherently Interpretable Models More Robust? A Study In Music Emotion Recognition
Are Inherently Interpretable Models More Robust? A Study In Music Emotion Recognition
Katharina Hoedt
A. Flexer
Gerhard Widmer
AAMLOOD
113
0
0
05 Aug 2025
Infrared Object Detection with Ultra Small ConvNets: Is ImageNet Pretraining Still Useful?
Infrared Object Detection with Ultra Small ConvNets: Is ImageNet Pretraining Still Useful?
Srikanth Muralidharan
H. R. Medeiros
Masih Aminbeidokhti
Eric Granger
M. Pedersoli
134
0
0
04 Aug 2025
TRACEALIGN -- Tracing the Drift: Attributing Alignment Failures to Training-Time Belief Sources in LLMs
TRACEALIGN -- Tracing the Drift: Attributing Alignment Failures to Training-Time Belief Sources in LLMs
A. Das
Vinija Jain
Vasu Sharma
LLMSV
133
0
0
04 Aug 2025
Failure Cases Are Better Learned But Boundary Says Sorry: Facilitating Smooth Perception Change for Accuracy-Robustness Trade-Off in Adversarial Training
Failure Cases Are Better Learned But Boundary Says Sorry: Facilitating Smooth Perception Change for Accuracy-Robustness Trade-Off in Adversarial Training
Yanyun Wang
Li Liu
AAML
172
0
0
04 Aug 2025
SUAD: Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants
SUAD: Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants
Chao Liu
Zhezheng Zhu
Hao Chen
Zhe Chen
Kaiwen Guo
Penghao Wang
Jun Luo
AAML
155
0
0
04 Aug 2025
A Survey on Data Security in Large Language Models
A Survey on Data Security in Large Language Models
Kang Chen
Xiuze Zhou
Y. Lin
Jinhe Su
Yuanhui Yu
Li Shen
F. Lin
PILMELM
222
1
1
04 Aug 2025
Proactive Disentangled Modeling of Trigger-Object Pairings for Backdoor Defense
Proactive Disentangled Modeling of Trigger-Object Pairings for Backdoor Defense
Kyle Stein
A. Mahyari
Guillermo Francia III
Eman El-Sheikh
AAML
143
0
0
03 Aug 2025
Simulated Ensemble Attack: Transferring Jailbreaks Across Fine-tuned Vision-Language Models
Simulated Ensemble Attack: Transferring Jailbreaks Across Fine-tuned Vision-Language Models
Ruofan Wang
Xin Wang
Yang Yao
Xuan Tong
Jiabo He
Xingjun Ma
AAML
204
0
0
03 Aug 2025
"Energon": Unveiling Transformers from GPU Power and Thermal Side-Channels
"Energon": Unveiling Transformers from GPU Power and Thermal Side-Channels
Arunava Chaudhuri
Shubhi Shukla
Sarani Bhattacharya
Debdeep Mukhopadhyay
106
1
0
03 Aug 2025
Beyond Vulnerabilities: A Survey of Adversarial Attacks as Both Threats and Defenses in Computer Vision Systems
Beyond Vulnerabilities: A Survey of Adversarial Attacks as Both Threats and Defenses in Computer Vision Systems
Zhongliang Guo
Shuai Zhao
Yanli Li
Weiye Li
Chun Tong Lei
Shuai Zhao
Lei Fang
Ognjen Arandjelović
Chun Pong Lau
AAML
208
3
0
03 Aug 2025
Practical, Generalizable and Robust Backdoor Attacks on Text-to-Image Diffusion Models
Practical, Generalizable and Robust Backdoor Attacks on Text-to-Image Diffusion Models
Haoran Dai
Jiawen Wang
Ruo Yang
Manali Sharma
Zhonghao Liao
Yuan Hong
Binghui Wang
AAML
104
1
0
03 Aug 2025
Previous
123...678...140141142
Next
Page 7 of 142
Pageof 142