ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.02976
  4. Cited By
Defense against Adversarial Attacks Using High-Level Representation
  Guided Denoiser

Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser

8 December 2017
Fangzhou Liao
Ming Liang
Yinpeng Dong
Tianyu Pang
Xiaolin Hu
Jun Zhu
ArXivPDFHTML

Papers citing "Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser"

50 / 148 papers shown
Title
A Simple DropConnect Approach to Transfer-based Targeted Attack
A Simple DropConnect Approach to Transfer-based Targeted Attack
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAML
69
0
0
24 Apr 2025
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu
Song Xia
Xun Lin
Chenqi Kong
Wenhan Yang
Shijian Lu
Yap-Peng Tan
Alex C. Kot
AAML
SILM
151
0
0
20 Apr 2025
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Rethinking Target Label Conditioning in Adversarial Attacks: A 2D Tensor-Guided Generative Approach
Hangyu Liu
Bo Peng
Pengxiang Ding
Donglin Wang
AAML
28
0
0
19 Apr 2025
Revisiting the Relationship between Adversarial and Clean Training: Why Clean Training Can Make Adversarial Training Better
Revisiting the Relationship between Adversarial and Clean Training: Why Clean Training Can Make Adversarial Training Better
MingWei Zhou
Xiaobing Pei
AAML
152
0
0
30 Mar 2025
MIGA: Mutual Information-Guided Attack on Denoising Models for Semantic Manipulation
Guanghao Li
Mingzhi Chen
Hao Yu
Shuting Dong
Wenhao Jiang
Ming Tang
Chun Yuan
DiffM
AAML
51
0
0
10 Mar 2025
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation
Wenyuan Wu
Zheng Liu
Yong Chen
Chao Su
Dezhong Peng
Xu Wang
AAML
37
0
0
24 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
62
0
0
20 Feb 2025
Generalized Task-Driven Medical Image Quality Enhancement with Gradient Promotion
Dong Zhang
Kwang-Ting Cheng
MedIm
20
0
0
03 Jan 2025
Fall Leaf Adversarial Attack on Traffic Sign Classification
Fall Leaf Adversarial Attack on Traffic Sign Classification
Anthony Etim
Jakub Szefer
AAML
73
3
0
27 Nov 2024
Natias: Neuron Attribution based Transferable Image Adversarial
  Steganography
Natias: Neuron Attribution based Transferable Image Adversarial Steganography
Zexin Fan
Kejiang Chen
Kai Zeng
Jiansong Zhang
Weiming Zhang
Nenghai Yu
AAML
18
2
0
08 Sep 2024
Exploring Frequencies via Feature Mixing and Meta-Learning for Improving
  Adversarial Transferability
Exploring Frequencies via Feature Mixing and Meta-Learning for Improving Adversarial Transferability
Juanjuan Weng
Zhiming Luo
Shaozi Li
AAML
36
1
0
06 May 2024
A Survey of Neural Network Robustness Assessment in Image Recognition
A Survey of Neural Network Robustness Assessment in Image Recognition
Jie Wang
Jun Ai
Minyan Lu
Haoran Su
Dan Yu
Yutao Zhang
Junda Zhu
Jingyu Liu
AAML
30
3
0
12 Apr 2024
Robust Overfitting Does Matter: Test-Time Adversarial Purification With
  FGSM
Robust Overfitting Does Matter: Test-Time Adversarial Purification With FGSM
Linyu Tang
Lei Zhang
AAML
35
3
0
18 Mar 2024
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
Bo Yang
Hengwei Zhang
Jin-dong Wang
Yulong Yang
Chenhao Lin
Chao Shen
Zhengyu Zhao
SILM
AAML
68
1
0
27 Feb 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
33
6
0
11 Feb 2024
Adversarial Prompt Tuning for Vision-Language Models
Adversarial Prompt Tuning for Vision-Language Models
Jiaming Zhang
Xingjun Ma
Xin Wang
Lingyu Qiu
Jiaqi Wang
Yu-Gang Jiang
Jitao Sang
AAML
VPVLM
VLM
30
18
0
19 Nov 2023
Certified Robustness via Dynamic Margin Maximization and Improved Lipschitz Regularization
Certified Robustness via Dynamic Margin Maximization and Improved Lipschitz Regularization
Mahyar Fazlyab
Taha Entesari
Aniket Roy
Ramalingam Chellappa
AAML
16
11
0
29 Sep 2023
Boosting Adversarial Transferability by Block Shuffle and Rotation
Boosting Adversarial Transferability by Block Shuffle and Rotation
Kunyu Wang
Xu He
Wenxuan Wang
Xiaosen Wang
AAML
28
36
0
20 Aug 2023
Amplification trojan network: Attack deep neural networks by amplifying
  their inherent weakness
Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness
Zhan Hu
Jun Zhu
Bo Zhang
Xiaolin Hu
AAML
24
2
0
28 May 2023
On the Importance of Backbone to the Adversarial Robustness of Object Detectors
On the Importance of Backbone to the Adversarial Robustness of Object Detectors
Xiao-Li Li
Hang Chen
Xiaolin Hu
AAML
38
4
0
27 May 2023
IDEA: Invariant Defense for Graph Adversarial Robustness
IDEA: Invariant Defense for Graph Adversarial Robustness
Shuchang Tao
Qi Cao
Huawei Shen
Yunfan Wu
Bingbing Xu
Xueqi Cheng
AAML
OOD
32
6
0
25 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
37
50
0
18 May 2023
Diversifying the High-level Features for better Adversarial
  Transferability
Diversifying the High-level Features for better Adversarial Transferability
Zhiyuan Wang
Zeliang Zhang
Siyuan Liang
Xiaosen Wang
AAML
42
18
0
20 Apr 2023
Generating Adversarial Examples with Better Transferability via Masking
  Unimportant Parameters of Surrogate Model
Generating Adversarial Examples with Better Transferability via Masking Unimportant Parameters of Surrogate Model
Dingcheng Yang
Wenjian Yu
Zihao Xiao
Jiaqi Luo
AAML
DiffM
21
5
0
14 Apr 2023
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Huanran Chen
Yichi Zhang
Yinpeng Dong
Xiao Yang
Hang Su
Junyi Zhu
AAML
28
56
0
16 Mar 2023
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Yuguang Yao
Jiancheng Liu
Yifan Gong
Xiaoming Liu
Yanzhi Wang
X. Lin
Sijia Liu
AAML
MLAU
29
1
0
13 Mar 2023
A Comprehensive Study on Robustness of Image Classification Models:
  Benchmarking and Rethinking
A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking
Chang-Shu Liu
Yinpeng Dong
Wenzhao Xiang
X. Yang
Hang Su
Junyi Zhu
YueFeng Chen
Yuan He
H. Xue
Shibao Zheng
OOD
VLM
AAML
33
72
0
28 Feb 2023
Less is More: Data Pruning for Faster Adversarial Training
Less is More: Data Pruning for Faster Adversarial Training
Yize Li
Pu Zhao
X. Lin
B. Kailkhura
Ryan Goldh
AAML
15
9
0
23 Feb 2023
Improving Adversarial Transferability with Scheduled Step Size and Dual
  Example
Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Zeliang Zhang
Peihan Liu
Xiaosen Wang
Chenliang Xu
AAML
32
3
0
30 Jan 2023
Adversarial Example Defense via Perturbation Grading Strategy
Adversarial Example Defense via Perturbation Grading Strategy
Shaowei Zhu
Wanli Lyu
Bin Li
Z. Yin
Bin Luo
AAML
27
1
0
16 Dec 2022
General Adversarial Defense Against Black-box Attacks via Pixel Level
  and Feature Level Distribution Alignments
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments
Xiaogang Xu
Hengshuang Zhao
Philip H. S. Torr
Jiaya Jia
AAML
26
2
0
11 Dec 2022
Boosting the Transferability of Adversarial Attacks with Global Momentum
  Initialization
Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Jiafeng Wang
Zhaoyu Chen
Kaixun Jiang
Dingkang Yang
Lingyi Hong
Pinxue Guo
Yan Wang
Wenqiang Zhang
AAML
26
27
0
21 Nov 2022
Towards Robust Dataset Learning
Towards Robust Dataset Learning
Yihan Wu
Xinda Li
Florian Kerschbaum
Heng Huang
Hongyang R. Zhang
DD
OOD
43
10
0
19 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial
  Viewpoints
ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints
Yinpeng Dong
Shouwei Ruan
Hang Su
Cai Kang
Xingxing Wei
Junyi Zhu
AAML
30
50
0
08 Oct 2022
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Shengming Yuan
Qilong Zhang
Lianli Gao
Yaya Cheng
Jingkuan Song
AAML
24
42
0
05 Oct 2022
Strong Transferable Adversarial Attacks via Ensembled Asymptotically
  Normal Distribution Learning
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution Learning
Zhengwei Fang
Rui Wang
Tao Huang
L. Jing
AAML
16
5
0
24 Sep 2022
Saliency Guided Adversarial Training for Learning Generalizable Features
  with Applications to Medical Imaging Classification System
Saliency Guided Adversarial Training for Learning Generalizable Features with Applications to Medical Imaging Classification System
Xin Li
Yao Qiang
Chengyin Li
Sijia Liu
D. Zhu
OOD
MedIm
29
4
0
09 Sep 2022
Improving Adversarial Robustness via Mutual Information Estimation
Improving Adversarial Robustness via Mutual Information Estimation
Dawei Zhou
Nannan Wang
Xinbo Gao
Bo Han
Xiaoyu Wang
Yibing Zhan
Tongliang Liu
AAML
16
15
0
25 Jul 2022
Towards Efficient Adversarial Training on Vision Transformers
Towards Efficient Adversarial Training on Vision Transformers
Boxi Wu
Jindong Gu
Zhifeng Li
Deng Cai
Xiaofei He
Wei Liu
ViT
AAML
43
37
0
21 Jul 2022
Frequency Domain Model Augmentation for Adversarial Attack
Frequency Domain Model Augmentation for Adversarial Attack
Yuyang Long
Qi-li Zhang
Boheng Zeng
Lianli Gao
Xianglong Liu
Jian Zhang
Jingkuan Song
AAML
26
154
0
12 Jul 2022
Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust
  Deep Neural Architectures
Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust Deep Neural Architectures
Jia-Wei Liu
Ran Cheng
Yaochu Jin
AAML
24
7
0
12 Jul 2022
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
30
5
0
16 Jun 2022
AI Ethics Issues in Real World: Evidence from AI Incident Database
AI Ethics Issues in Real World: Evidence from AI Incident Database
Mengyi Wei
Zhixuan Zhou
11
40
0
15 Jun 2022
Wavelet Regularization Benefits Adversarial Training
Wavelet Regularization Benefits Adversarial Training
Jun Yan
Huilin Yin
Xiaoyang Deng
Zi-qin Zhao
Wancheng Ge
Hao Zhang
Gerhard Rigoll
AAML
19
2
0
08 Jun 2022
Attack-Agnostic Adversarial Detection
Attack-Agnostic Adversarial Detection
Jiaxin Cheng
Mohamed Hussein
J. Billa
Wael AbdAlmageed
AAML
23
0
0
01 Jun 2022
Transferable Adversarial Attack based on Integrated Gradients
Transferable Adversarial Attack based on Integrated Gradients
Y. Huang
A. Kong
AAML
35
50
0
26 May 2022
Robust Representation via Dynamic Feature Aggregation
Robust Representation via Dynamic Feature Aggregation
Haozhe Liu
Haoqin Ji
Yuexiang Li
Nanjun He
Haoqian Wu
Feng Liu
Linlin Shen
Yefeng Zheng
AAML
OOD
32
3
0
16 May 2022
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial
  Attacks
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks
Siddhartha Datta
AAML
34
4
0
15 May 2022
Self-recoverable Adversarial Examples: A New Effective Protection
  Mechanism in Social Networks
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
25
28
0
26 Apr 2022
123
Next