ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1711.08478
  4. Cited By
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not
  Robust to Adversarial Examples

MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples

22 November 2017
Nicholas Carlini
D. Wagner
    AAML
ArXiv (abs)PDFHTML

Papers citing "MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples"

50 / 135 papers shown
Can the state of relevant neurons in a deep neural networks serve as
  indicators for detecting adversarial attacks?
Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?
Roger Granda
Tinne Tuytelaars
José Oramas
AAML
128
2
0
29 Oct 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's PerspectiveACM Computing Surveys (ACM CSUR), 2020
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
256
182
0
08 Sep 2020
TextDecepter: Hard Label Black Box Attack on Text Classifiers
TextDecepter: Hard Label Black Box Attack on Text Classifiers
Sachin Saxena
AAML
139
5
0
16 Aug 2020
Adversarial Examples on Object Recognition: A Comprehensive Survey
Adversarial Examples on Object Recognition: A Comprehensive SurveyACM Computing Surveys (ACM CSUR), 2020
A. Serban
E. Poll
Joost Visser
AAML
417
80
0
07 Aug 2020
TEAM: We Need More Powerful Adversarial Examples for DNNs
TEAM: We Need More Powerful Adversarial Examples for DNNs
Yaguan Qian
Xi-Ming Zhang
Bin Wang
Wei Li
Zhaoquan Gu
Haijiang Wang
Wassim Swaileh
AAML
160
0
0
31 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Damien Scieur
William L. Hamilton
AAMLGAN
329
56
0
01 Jul 2020
Blacklight: Scalable Defense for Neural Networks against Query-Based
  Black-Box Attacks
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box AttacksUSENIX Security Symposium (USENIX Security), 2020
Huiying Li
Shawn Shan
Emily Wenger
Jiayun Zhang
Haitao Zheng
Ben Y. Zhao
AAML
268
51
0
24 Jun 2020
Beware the Black-Box: on the Robustness of Recent Defenses to
  Adversarial Examples
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples
Kaleel Mahmood
Deniz Gurevin
Marten van Dijk
Phuong Ha Nguyen
AAML
159
25
0
18 Jun 2020
Tricking Adversarial Attacks To Fail
Tricking Adversarial Attacks To Fail
Blerta Lindqvist
AAML
101
0
0
08 Jun 2020
Mitigating Advanced Adversarial Attacks with More Advanced Gradient
  Obfuscation Techniques
Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques
Han Qiu
Yi Zeng
Qinkai Zheng
Tianwei Zhang
Meikang Qiu
G. Memmi
AAML
135
14
0
27 May 2020
Adversarial Training against Location-Optimized Adversarial Patches
Adversarial Training against Location-Optimized Adversarial Patches
Sukrut Rao
David Stutz
Bernt Schiele
AAML
320
110
0
05 May 2020
Towards Deep Learning Models Resistant to Large Perturbations
Towards Deep Learning Models Resistant to Large Perturbations
Amirreza Shaeiri
Rozhin Nobahari
M. Rohban
OODAAML
191
14
0
30 Mar 2020
Vulnerabilities of Connectionist AI Applications: Evaluation and Defence
Vulnerabilities of Connectionist AI Applications: Evaluation and DefenceFrontiers in Big Data (Front. Big Data), 2020
Christian Berghoff
Matthias Neu
Arndt von Twickel
AAML
206
26
0
18 Mar 2020
Are L2 adversarial examples intrinsically different?
Are L2 adversarial examples intrinsically different?
Mingxuan Li
Jingyuan Wang
Yufan Wu
AAML
125
0
0
28 Feb 2020
Real-Time Detectors for Digital and Physical Adversarial Inputs to
  Perception Systems
Real-Time Detectors for Digital and Physical Adversarial Inputs to Perception SystemsInternational Conference on Cyber-Physical Systems (ICCPS), 2020
Y. Kantaros
Taylor J. Carpenter
Kaustubh Sridhar
Yahan Yang
Insup Lee
James Weimer
AAML
203
18
0
23 Feb 2020
Towards Certifiable Adversarial Sample Detection
Towards Certifiable Adversarial Sample Detection
Ilia Shumailov
Yiren Zhao
Robert D. Mullins
Ross J. Anderson
AAML
129
14
0
20 Feb 2020
RAID: Randomized Adversarial-Input Detection for Neural Networks
RAID: Randomized Adversarial-Input Detection for Neural Networks
Hasan Ferit Eniser
M. Christakis
Valentin Wüstholz
AAML
245
17
0
07 Feb 2020
Minimax Defense against Gradient-based Adversarial Attacks
Minimax Defense against Gradient-based Adversarial Attacks
Blerta Lindqvist
R. Izmailov
AAML
91
0
0
04 Feb 2020
TEAM: An Taylor Expansion-Based Method for Generating Adversarial
  Examples
TEAM: An Taylor Expansion-Based Method for Generating Adversarial Examples
Yaguan Qian
Xi-Ming Zhang
Wassim Swaileh
Li Wei
Bin Wang
Jian-Hai Chen
Wujie Zhou
Jing-Sheng Lei
AAML
127
0
0
23 Jan 2020
Secure and Robust Machine Learning for Healthcare: A Survey
Secure and Robust Machine Learning for Healthcare: A SurveyIEEE Reviews in Biomedical Engineering (RBME), 2020
A. Qayyum
Junaid Qadir
Muhammad Bilal
Ala I. Al-Fuqaha
AAMLOOD
257
441
0
21 Jan 2020
ATHENA: A Framework based on Diverse Weak Defenses for Building
  Adversarial Defense
ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense
Meng
Jianhai Su
Jason M. O'Kane
Pooyan Jamshidi
AAML
124
7
0
02 Jan 2020
Exploiting the Sensitivity of $L_2$ Adversarial Examples to
  Erase-and-Restore
Exploiting the Sensitivity of L2L_2L2​ Adversarial Examples to Erase-and-Restore
F. Zuo
Qiang Zeng
AAML
124
1
0
01 Jan 2020
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
233
114
0
13 Nov 2019
DLA: Dense-Layer-Analysis for Adversarial Example Detection
DLA: Dense-Layer-Analysis for Adversarial Example DetectionEuropean Symposium on Security and Privacy (EuroS&P), 2019
Philip Sperl
Ching-yu Kao
Peng Chen
Konstantin Böttinger
AAML
125
36
0
05 Nov 2019
MadNet: Using a MAD Optimization for Defending Against Adversarial
  Attacks
MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks
Shai Rozenberg
G. Elidan
Ran El-Yaniv
AAML
120
1
0
03 Nov 2019
Enhancing Certifiable Robustness via a Deep Model Ensemble
Enhancing Certifiable Robustness via a Deep Model Ensemble
Huan Zhang
Minhao Cheng
Cho-Jui Hsieh
131
9
0
31 Oct 2019
DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural
  Networks
DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks
Fuyuan Zhang
Sankalan Pal Chowdhury
M. Christakis
AAML
176
8
0
14 Oct 2019
BUZz: BUffer Zones for defending adversarial examples in image
  classification
BUZz: BUffer Zones for defending adversarial examples in image classification
Kaleel Mahmood
Phuong Ha Nguyen
Lam M. Nguyen
THANH VAN NGUYEN
Marten van Dijk
AAML
171
6
0
03 Oct 2019
Lower Bounds on Adversarial Robustness from Optimal Transport
Lower Bounds on Adversarial Robustness from Optimal TransportNeural Information Processing Systems (NeurIPS), 2019
A. Bhagoji
Daniel Cullina
Prateek Mittal
OODOTAAML
195
97
0
26 Sep 2019
Towards Model-Agnostic Adversarial Defenses using Adversarially Trained
  Autoencoders
Towards Model-Agnostic Adversarial Defenses using Adversarially Trained Autoencoders
Pratik Vaishnavi
Kevin Eykholt
A. Prakash
Amir Rahmati
AAML
172
2
0
12 Sep 2019
An Empirical Investigation of Randomized Defenses against Adversarial
  Attacks
An Empirical Investigation of Randomized Defenses against Adversarial Attacks
Yannik Potdevin
Dirk Nowotka
Vijay Ganesh
AAML
104
4
0
12 Sep 2019
Robustifying deep networks for image segmentation
Robustifying deep networks for image segmentation
Zheng Liu
Jinnian Zhang
Varun Jog
Po-Ling Loh
A. McMillan
AAMLOOD
130
7
0
01 Aug 2019
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial
  Examples
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples
Hossein Hosseini
Sreeram Kannan
Radha Poovendran
AAML
119
19
0
28 Jul 2019
Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks
  Are Necessary
Adversarial Robustness Assessment: Why both L0L_0L0​ and L∞L_\inftyL∞​ Attacks Are Necessary
Shashank Kotyan
Danilo Vasconcellos Vargas
AAML
168
8
0
14 Jun 2019
A Computationally Efficient Method for Defending Adversarial Deep
  Learning Attacks
A Computationally Efficient Method for Defending Adversarial Deep Learning Attacks
R. Sahay
Rehana Mahfuz
Aly El Gamal
AAML
75
5
0
13 Jun 2019
Enhancing Gradient-based Attacks with Symbolic Intervals
Enhancing Gradient-based Attacks with Symbolic Intervals
Shiqi Wang
Yizheng Chen
Ahmed Abdou
Suman Jana
AAML
104
15
0
05 Jun 2019
Bandlimiting Neural Networks Against Adversarial Attacks
Bandlimiting Neural Networks Against Adversarial Attacks
Yuping Lin
A. KasraAhmadiK.
Hui Jiang
AAML
123
6
0
30 May 2019
Purifying Adversarial Perturbation with Adversarially Trained
  Auto-encoders
Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders
Hebi Li
Qi Xiao
Shixin Tian
Jin Tian
AAML
149
4
0
26 May 2019
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Yuanshun Yao
Huiying Li
Haitao Zheng
Ben Y. Zhao
AAML
116
13
0
24 May 2019
Better the Devil you Know: An Analysis of Evasion Attacks using
  Out-of-Distribution Adversarial Examples
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Vikash Sehwag
A. Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
M. Chiang
Prateek Mittal
OODD
209
26
0
05 May 2019
Gotta Catch Ém All: Using Honeypots to Catch Adversarial Attacks on
  Neural Networks
Gotta Catch Ém All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan
Emily Wenger
Bolun Wang
Yangqiu Song
Haitao Zheng
Ben Y. Zhao
313
79
0
18 Apr 2019
Adversarial Defense Through Network Profiling Based Path Extraction
Adversarial Defense Through Network Profiling Based Path Extraction
Yuxian Qiu
Jingwen Leng
Cong Guo
Quan Chen
Chong Li
Minyi Guo
Yuhao Zhu
AAML
112
56
0
17 Apr 2019
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks
N. Benjamin Erichson
Z. Yao
Michael W. Mahoney
AAML
116
27
0
07 Apr 2019
Defending against Whitebox Adversarial Attacks via Randomized
  Discretization
Defending against Whitebox Adversarial Attacks via Randomized Discretization
Yuchen Zhang
Abigail Z. Jacobs
AAML
203
77
0
25 Mar 2019
On Evaluating Adversarial Robustness
On Evaluating Adversarial Robustness
Nicholas Carlini
Anish Athalye
Nicolas Papernot
Wieland Brendel
Jonas Rauber
Dimitris Tsipras
Ian Goodfellow
Aleksander Madry
Alexey Kurakin
ELMAAML
466
959
0
18 Feb 2019
Mockingbird: Defending Against Deep-Learning-Based Website
  Fingerprinting Attacks with Adversarial Traces
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
Mohammad Saidur Rahman
Mohsen Imani
Nate Mathews
M. Wright
AAML
316
94
0
18 Feb 2019
AuxBlocks: Defense Adversarial Example via Auxiliary Blocks
AuxBlocks: Defense Adversarial Example via Auxiliary Blocks
Yueyao Yu
Pengfei Yu
Wenye Li
AAML
60
8
0
18 Feb 2019
Understanding the One-Pixel Attack: Propagation Maps and Locality
  Analysis
Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis
Danilo Vasconcellos Vargas
Jiawei Su
FAttAAML
107
39
0
08 Feb 2019
Robustness Certificates Against Adversarial Examples for ReLU Networks
Robustness Certificates Against Adversarial Examples for ReLU Networks
Sahil Singla
Soheil Feizi
AAML
142
21
0
01 Feb 2019
A Survey of Safety and Trustworthiness of Deep Neural Networks:
  Verification, Testing, Adversarial Attack and Defence, and Interpretability
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability
Xiaowei Huang
Daniel Kroening
Wenjie Ruan
Marta Kwiatkowska
Youcheng Sun
Emese Thamo
Min Wu
Xinping Yi
AAML
489
52
0
18 Dec 2018
Previous
123
Next