ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1707.06728
  4. Cited By
Efficient Defenses Against Adversarial Attacks
v1v2 (latest)

Efficient Defenses Against Adversarial Attacks

21 July 2017
Valentina Zantedeschi
Maria-Irina Nicolae
Ambrish Rawat
    AAML
ArXiv (abs)PDFHTML

Papers citing "Efficient Defenses Against Adversarial Attacks"

50 / 151 papers shown
Title
SoK: Systematic analysis of adversarial threats against deep learning approaches for autonomous anomaly detection systems in SDN-IoT networks
SoK: Systematic analysis of adversarial threats against deep learning approaches for autonomous anomaly detection systems in SDN-IoT networksJournal of Information Security and Applications (JISA), 2025
T. Yasarathna
Nhien-An Le-Khac
AAML
20
0
0
30 Sep 2025
SAGE: Sample-Aware Guarding Engine for Robust Intrusion Detection Against Adversarial Attacks
SAGE: Sample-Aware Guarding Engine for Robust Intrusion Detection Against Adversarial Attacks
Jing Chen
Onat Gungor
Zhengli Shang
T. Rosing
AAML
33
0
0
09 Sep 2025
Label Smoothing is a Pragmatic Information Bottleneck
Label Smoothing is a Pragmatic Information Bottleneck
Sota Kudo
39
0
0
12 Aug 2025
Revisiting Adversarial Perception Attacks and Defense Methods on Autonomous Driving Systems
Revisiting Adversarial Perception Attacks and Defense Methods on Autonomous Driving Systems
Cheng Chen
Yuhong Wang
Nafis S Munir
Xiangwei Zhou
Xugui Zhou
AAML
142
2
0
14 May 2025
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic ChainACM Asia Conference on Computer and Communications Security (AsiaCCS), 2025
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
195
0
0
08 May 2025
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks
Jing Chen
Onat Gungor
Zhengli Shang
Elvin Li
T. Rosing
AAML
135
3
0
17 Apr 2025
Enhancing Adversarial Robustness via Uncertainty-Aware Distributional
  Adversarial Training
Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training
Junhao Dong
Xinghua Qu
Zhiyuan Wang
Yew-Soon Ong
AAML
166
3
0
05 Nov 2024
CausAdv: A Causal-based Framework for Detecting Adversarial Examples
CausAdv: A Causal-based Framework for Detecting Adversarial Examples
Hichem Debbi
CMLAAML
133
1
0
29 Oct 2024
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full
  Version)
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full Version)Conference on Computer and Communications Security (CCS), 2024
Jonathan Knauer
Phillip Rieger
Hossein Fereidooni
A. Sadeghi
AAML
125
0
0
02 Sep 2024
Beyond Dropout: Robust Convolutional Neural Networks Based on Local
  Feature Masking
Beyond Dropout: Robust Convolutional Neural Networks Based on Local Feature Masking
Yunpeng Gong
Chuangliang Zhang
Yongjie Hou
Lifei Chen
Min Jiang
AAML
93
20
0
18 Jul 2024
MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification
MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification
Sajjad Amini
Mohammadreza Teymoorianfard
Shiqing Ma
Amir Houmansadr
OODAAML
186
17
0
09 Jun 2024
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
  and the Open Libraries Behind Them
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them
Chao-Jung Liu
Boxi Chen
Wei Shao
Chris Zhang
Kelvin Wong
Yi Zhang
190
6
0
22 Jan 2024
Panda or not Panda? Understanding Adversarial Attacks with Interactive
  Visualization
Panda or not Panda? Understanding Adversarial Attacks with Interactive Visualization
Yuzhe You
Jarvis Tse
Jian Zhao
AAML
86
3
0
22 Nov 2023
Robustness Enhancement in Neural Networks with Alpha-Stable Training
  Noise
Robustness Enhancement in Neural Networks with Alpha-Stable Training Noise
Xueqiong Yuan
Jipeng Li
E. Kuruoglu
OOD
96
4
0
17 Nov 2023
Training Image Derivatives: Increased Accuracy and Universal Robustness
Training Image Derivatives: Increased Accuracy and Universal Robustness
V. Avrutskiy
200
0
0
21 Oct 2023
Untargeted White-box Adversarial Attack with Heuristic Defence Methods
  in Real-time Deep Learning based Network Intrusion Detection System
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection SystemComputer Communications (Comput. Commun.), 2023
Khushnaseeb Roshan
Aasim Zafar
Sheikh Burhan Ul Haque
AAML
208
53
0
05 Oct 2023
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio
  -- A Survey
Privacy-preserving and Privacy-attacking Approaches for Speech and Audio -- A Survey
Yuchen Liu
Apu Kapadia
Donald Williamson
AAML
129
1
0
26 Sep 2023
One-stage Modality Distillation for Incomplete Multimodal Learning
One-stage Modality Distillation for Incomplete Multimodal Learning
Shicai Wei
Yang Luo
Chunbo Luo
127
1
0
15 Sep 2023
Towards Robust Model Watermark via Reducing Parametric Vulnerability
Towards Robust Model Watermark via Reducing Parametric VulnerabilityIEEE International Conference on Computer Vision (ICCV), 2023
Guanhao Gan
Yiming Li
Dongxian Wu
Shu-Tao Xia
AAML
111
18
0
09 Sep 2023
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution
  to Facilitate Security Analysis
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security AnalysisConference on Computer and Communications Security (CCS), 2023
Yiling He
Jian Lou
Zhan Qin
Kui Ren
FAttAAML
102
12
0
10 Aug 2023
Learning Provably Robust Estimators for Inverse Problems via Jittering
Learning Provably Robust Estimators for Inverse Problems via JitteringNeural Information Processing Systems (NeurIPS), 2023
Anselm Krainovic
Mahdi Soltanolkotabi
Reinhard Heckel
OOD
78
9
0
24 Jul 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & DefensesIEEE Access (IEEE Access), 2023
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
174
91
0
18 May 2023
Inference Time Evidences of Adversarial Attacks for Forensic on
  Transformers
Inference Time Evidences of Adversarial Attacks for Forensic on Transformers
Hugo Lemarchant
Liang Li
Yiming Qian
Yuta Nakashima
Hajime Nagahara
ViTAAML
140
0
0
31 Jan 2023
A Review of Speech-centric Trustworthy Machine Learning: Privacy,
  Safety, and Fairness
A Review of Speech-centric Trustworthy Machine Learning: Privacy, Safety, and FairnessAPSIPA Transactions on Signal and Information Processing (TASIP), 2022
Tiantian Feng
Rajat Hebbar
Nicholas Mehlman
Xuan Shi
Aditya Kommineni
and Shrikanth Narayanan
152
36
0
18 Dec 2022
MCIBI++: Soft Mining Contextual Information Beyond Image for Semantic
  Segmentation
MCIBI++: Soft Mining Contextual Information Beyond Image for Semantic SegmentationIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Zhenchao Jin
Dongdong Yu
Zehuan Yuan
Lequan Yu
241
23
0
09 Sep 2022
Defending Against Backdoor Attack on Graph Nerual Network by
  Explainability
Defending Against Backdoor Attack on Graph Nerual Network by Explainability
B. Jiang
Zhao Li
AAMLGNN
177
22
0
07 Sep 2022
Robust Prototypical Few-Shot Organ Segmentation with Regularized
  Neural-ODEs
Robust Prototypical Few-Shot Organ Segmentation with Regularized Neural-ODEsIEEE Transactions on Medical Imaging (IEEE TMI), 2022
Prashant Pandey
Mustafa Chasmai
Tanuj Sur
Brejesh Lall
203
13
0
26 Aug 2022
Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Yaguan Qian
Yu-qun Wang
Bin Wang
Zhaoquan Gu
Yu-Shuang Guo
Wassim Swaileh
AAML
150
3
0
04 Jul 2022
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by
  Out-of-Distribution Detection
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Abderrahmen Amich
Ata Kaboudi
Birhanu Eshete
AAMLOODD
60
3
0
15 Jun 2022
Post-breach Recovery: Protection against White-box Adversarial Examples
  for Leaked DNN Models
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN ModelsConference on Computer and Communications Security (CCS), 2022
Shawn Shan
Wen-Luan Ding
Emily Wenger
Haitao Zheng
Ben Y. Zhao
AAML
115
13
0
21 May 2022
When adversarial examples are excusable
When adversarial examples are excusable
Pieter-Jan Kindermans
Charles Staats
AAML
76
0
0
25 Apr 2022
Improving Neural ODEs via Knowledge Distillation
Improving Neural ODEs via Knowledge DistillationIET Computer Vision (ICV), 2022
Haoyu Chu
Shikui Wei
Qiming Lu
Yao-Min Zhao
65
2
0
10 Mar 2022
Rethinking Machine Learning Robustness via its Link with the
  Out-of-Distribution Problem
Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Abderrahmen Amich
Birhanu Eshete
OOD
89
4
0
18 Feb 2022
Memory Defense: More Robust Classification via a Memory-Masking
  Autoencoder
Memory Defense: More Robust Classification via a Memory-Masking Autoencoder
Eashan Adhikarla
Danni Luo
Brian D. Davison
AAML
62
2
0
05 Feb 2022
Adversarial Machine Learning Threat Analysis and Remediation in Open
  Radio Access Network (O-RAN)
Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)Journal of Network and Computer Applications (JNCA), 2022
Edan Habler
Ron Bitton
D. Avraham
D. Mimran
Eitan Klevansky
Oleg Brodt
Heiko Lehmann
Yuval Elovici
A. Shabtai
AAML
165
17
0
16 Jan 2022
Subspace Adversarial Training
Subspace Adversarial Training
Tao Li
Yingwen Wu
Sizhe Chen
Kun Fang
Xiaolin Huang
AAMLOOD
153
64
0
24 Nov 2021
A Review of Adversarial Attack and Defense for Classification Methods
A Review of Adversarial Attack and Defense for Classification Methods
Yao Li
Minhao Cheng
Cho-Jui Hsieh
T. C. Lee
AAML
138
78
0
18 Nov 2021
Parameterizing Activation Functions for Adversarial Robustness
Parameterizing Activation Functions for Adversarial Robustness
Sihui Dai
Saeed Mahloujifar
Prateek Mittal
AAML
128
33
0
11 Oct 2021
Trustworthy AI and Robotics and the Implications for the AEC Industry: A
  Systematic Literature Review and Future Potentials
Trustworthy AI and Robotics and the Implications for the AEC Industry: A Systematic Literature Review and Future PotentialsAutomation in Construction (AC), 2021
Newsha Emaminejad
Reza Akhavian
109
58
0
27 Sep 2021
Morphence: Moving Target Defense Against Adversarial Examples
Morphence: Moving Target Defense Against Adversarial ExamplesAsia-Pacific Computer Systems Architecture Conference (ACSA), 2021
Abderrahmen Amich
Birhanu Eshete
AAML
150
25
0
31 Aug 2021
SoK: How Robust is Image Classification Deep Neural Network
  Watermarking? (Extended Version)
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)IEEE Symposium on Security and Privacy (IEEE S&P), 2021
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
145
104
0
11 Aug 2021
Detect and Defense Against Adversarial Examples in Deep Learning using
  Natural Scene Statistics and Adaptive Denoising
Detect and Defense Against Adversarial Examples in Deep Learning using Natural Scene Statistics and Adaptive Denoising
Anouar Kherchouche
Sid Ahmed Fezza
W. Hamidouche
AAML
104
11
0
12 Jul 2021
Adversarial Machine Learning for Cybersecurity and Computer Vision:
  Current Developments and Challenges
Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges
B. Xi
AAML
71
32
0
30 Jun 2021
Countering Adversarial Examples: Combining Input Transformation and
  Noisy Training
Countering Adversarial Examples: Combining Input Transformation and Noisy Training
Cheng Zhang
Pan Gao
AAML
64
3
0
25 Jun 2021
Certification of embedded systems based on Machine Learning: A survey
Certification of embedded systems based on Machine Learning: A survey
Guillaume Vidot
Christophe Gabreau
I. Ober
Iulian Ober
97
12
0
14 Jun 2021
Biometrics: Trust, but Verify
Biometrics: Trust, but VerifyIEEE Transactions on Biometrics Behavior and Identity Science (TBBIS), 2021
Anil K. Jain
Debayan Deb
Joshua J. Engelsma
FaML
169
95
0
14 May 2021
Adversarial examples attack based on random warm restart mechanism and
  improved Nesterov momentum
Adversarial examples attack based on random warm restart mechanism and improved Nesterov momentum
Tian-zhou Li
AAML
53
1
0
10 May 2021
Relating Adversarially Robust Generalization to Flat Minima
Relating Adversarially Robust Generalization to Flat MinimaIEEE International Conference on Computer Vision (ICCV), 2021
David Stutz
Matthias Hein
Bernt Schiele
OOD
169
74
0
09 Apr 2021
Explaining Adversarial Vulnerability with a Data Sparsity Hypothesis
Explaining Adversarial Vulnerability with a Data Sparsity HypothesisNeurocomputing (Neurocomputing), 2021
Mahsa Paknezhad
Cuong Phuc Ngo
Amadeus Aristo Winarto
Alistair Cheong
Beh Chuen Yang
Wu Jiayang
Lee Hwee Kuan
OODAAML
142
10
0
01 Mar 2021
A PAC-Bayes Analysis of Adversarial Robustness
A PAC-Bayes Analysis of Adversarial RobustnessNeural Information Processing Systems (NeurIPS), 2021
Paul Viallard
Guillaume Vidot
Amaury Habrard
Emilie Morvant
AAML
123
16
0
19 Feb 2021
1234
Next