Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1801.02610
Cited By
Generating Adversarial Examples with Adversarial Networks
8 January 2018
Chaowei Xiao
Bo Li
Jun-Yan Zhu
Warren He
M. Liu
D. Song
GAN
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Generating Adversarial Examples with Adversarial Networks"
50 / 380 papers shown
Title
Semantic Adversarial Attacks on Face Recognition through Significant Attributes
Yasmeen M. Khedr
Yifeng Xiong
Kun He
AAML
38
2
0
28 Jan 2023
Provable Unrestricted Adversarial Training without Compromise with Generalizability
Lili Zhang
Ning Yang
Yanchao Sun
Philip S. Yu
AAML
30
2
0
22 Jan 2023
Meta Generative Attack on Person Reidentification
M. I. A V Subramanyam
AAML
33
8
0
16 Jan 2023
Generalizable Black-Box Adversarial Attack with Meta Learning
Fei Yin
Yong Zhang
Baoyuan Wu
Yan Feng
Jingyi Zhang
Yanbo Fan
Yujiu Yang
AAML
39
27
0
01 Jan 2023
Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles
Hyung-Jin Yoon
H. Jafarnejadsani
P. Voulgaris
AAML
19
5
0
28 Dec 2022
EDoG: Adversarial Edge Detection For Graph Neural Networks
Xiaojun Xu
Yue Yu
Hanzhang Wang
Alok Lal
C.A. Gunter
Bo Li
AAML
32
10
0
27 Dec 2022
Learning Antidote Data to Individual Unfairness
Peizhao Li
Ethan Xia
Hongfu Liu
FedML
FaML
24
9
0
29 Nov 2022
Imperceptible Adversarial Attack via Invertible Neural Networks
Zihan Chen
Zifan Wang
Junjie Huang
Wentao Zhao
Xiao Liu
Dejian Guan
AAML
41
20
0
28 Nov 2022
Localized Shortcut Removal
Nicolas Müller
Jochen Jacobs
Jennifer Williams
Konstantin Böttinger
25
0
0
24 Nov 2022
Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor
Zhao Yang
Fengyang Deng
Linxi Han
16
2
0
25 Oct 2022
LOT: Layer-wise Orthogonal Training on Improving
ℓ
2
\ell_2
ℓ
2
Certified Robustness
Xiaojun Xu
Linyi Li
Bo Li
OOD
AAML
41
34
0
20 Oct 2022
Towards Generating Adversarial Examples on Mixed-type Data
Han Xu
Menghai Pan
Zhimeng Jiang
Huiyuan Chen
Xiaoting Li
Mahashweta Das
Hao Yang
AAML
SILM
23
0
0
17 Oct 2022
On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses
Anshuman Chhabra
Ashwin Sekhari
P. Mohapatra
OOD
AAML
50
8
0
04 Oct 2022
Robustness Certification of Visual Perception Models via Camera Motion Smoothing
Hanjiang Hu
Zuxin Liu
Linyi Li
Jiacheng Zhu
Ding Zhao
AAML
39
6
0
04 Oct 2022
Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Jiancong Xiao
Liusha Yang
Yanbo Fan
Jue Wang
Zhimin Luo
OOD
25
13
0
02 Oct 2022
Physical Adversarial Attack meets Computer Vision: A Decade Survey
Hui Wei
Hao Tang
Xuemei Jia
Zhixiang Wang
Han-Bing Yu
Zhubo Li
Shiníchi Satoh
Luc Van Gool
Zheng Wang
AAML
38
44
0
30 Sep 2022
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang
Wen Yao
Tingsong Jiang
Guijian Tang
Xiaoqian Chen
AAML
71
38
0
28 Sep 2022
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Abhishek Aich
Shasha Li
Chengyu Song
Ulugbek S. Kamilov
S. Krishnamurthy
Amit K. Roy-Chowdhury
AAML
32
8
0
20 Sep 2022
GAMA: Generative Adversarial Multi-Object Scene Attacks
Abhishek Aich
Calvin-Khang Ta
Akash Gupta
Chengyu Song
S. Krishnamurthy
Ulugbek S. Kamilov
Amit K. Roy-Chowdhury
AAML
56
17
0
20 Sep 2022
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Yulong Cao
Chaowei Xiao
Anima Anandkumar
Danfei Xu
Marco Pavone
AAML
32
65
0
19 Sep 2022
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition
Qidong Huang
Xiaoyi Dong
DongDong Chen
Hang Zhou
Weiming Zhang
Kui Zhang
Gang Hua
Nenghai Yu
3DPC
34
12
0
16 Sep 2022
CARE: Certifiably Robust Learning with Reasoning via Variational Inference
Jiawei Zhang
Linyi Li
Ce Zhang
Bo Li
AAML
OOD
48
8
0
12 Sep 2022
Evaluating the Susceptibility of Pre-Trained Language Models via Handcrafted Adversarial Examples
Hezekiah J. Branch
Jonathan Rodriguez Cefalu
Jeremy McHugh
Leyla Hujer
Aditya Bahl
Daniel del Castillo Iglesias
Ron Heichman
Ramesh Darwishi
ELM
SILM
AAML
18
49
0
05 Sep 2022
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
16
0
0
31 Aug 2022
Chosen methods of improving small object recognition with weak recognizable features
Magdalena Stachoñ
Marcin Pietroñ
24
0
0
29 Aug 2022
PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition
Jiachen Sun
Weili Nie
Zhiding Yu
Z. Morley Mao
Chaowei Xiao
DiffM
34
25
0
21 Aug 2022
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Yulong Wang
Minghui Zhao
Shenghong Li
Xinnan Yuan
W. Ni
18
15
0
19 Aug 2022
Discovering Bugs in Vision Models using Off-the-shelf Image Generation and Captioning
Olivia Wiles
Isabela Albuquerque
Sven Gowal
VLM
43
47
0
18 Aug 2022
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator
Xiang Gao
Cheng Luo
Qinliang Lin
Weicheng Xie
Minmin Liu
Linlin Shen
Keerthy Kusumam
Siyang Song
19
5
0
12 Aug 2022
Adversarial Camouflage for Node Injection Attack on Graphs
Shuchang Tao
Qi Cao
Huawei Shen
Yunfan Wu
Liang Hou
Fei Sun
Xueqi Cheng
AAML
GNN
35
22
0
03 Aug 2022
Decorrelative Network Architecture for Robust Electrocardiogram Classification
Christopher Wiedeman
Ge Wang
OOD
13
2
0
19 Jul 2022
Adversarially-Aware Robust Object Detector
Ziyi Dong
Pengxu Wei
Liang Lin
AAML
ObjD
22
27
0
13 Jul 2022
Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches
Zhiyuan Cheng
James Liang
Hongjun Choi
Guanhong Tao
Zhiwen Cao
Dongfang Liu
Xiangyu Zhang
AAML
MDE
25
81
0
11 Jul 2022
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Chang Yue
Peizhuo Lv
Ruigang Liang
Kai Chen
AAML
36
10
0
09 Jul 2022
Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Lele Wang
B. Liu
UQCV
23
4
0
29 Jun 2022
Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles
Chen Lin
Si Chen
Meifang Zeng
Sheng Zhang
Min Gao
Hui Li
AAML
18
35
0
23 Jun 2022
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
52
8
0
14 Jun 2022
Infrared Invisible Clothing:Hiding from Infrared Detectors at Multiple Angles in Real World
Xiaopei Zhu
Zhan Hu
Siyuan Huang
Jianmin Li
Xiaolin Hu
AAML
28
55
0
12 May 2022
Software Testing for Machine Learning
D. Marijan
A. Gotlieb
AAML
30
27
0
30 Apr 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICV
AAML
21
45
0
26 Apr 2022
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
Jiawei Zhang
Jinwei Wang
Hao Wang
X. Luo
AAML
25
28
0
26 Apr 2022
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
Zhuang Qian
Kaizhu Huang
Qiufeng Wang
Xu-Yao Zhang
OOD
AAML
ObjD
54
72
0
26 Mar 2022
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning
Gorka Abad
Servio Paguada
Oguzhan Ersoy
S. Picek
Víctor Julio Ramírez-Durán
A. Urbieta
FedML
31
6
0
16 Mar 2022
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
B. Zolbayar
Ryan Sheatsley
Patrick McDaniel
Mike Weisman
Sencun Zhu
Shitong Zhu
S. Krishnamurthy
GAN
AAML
25
14
0
13 Mar 2022
An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks
Anirudh Yadav
Ashutosh Upadhyay
S. Sharanya
AAML
12
6
0
11 Mar 2022
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer
Shengshan Hu
Xiaogeng Liu
Yechao Zhang
Minghui Li
L. Zhang
Hai Jin
Libing Wu
AAML
PICV
40
91
0
07 Mar 2022
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models
Peng Kuang
Xiaowei Dong
Henry Xue
Zhifei Zhang
Weifeng Chiu
Tao Wei
Kui Ren
AAML
21
71
0
03 Mar 2022
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking
Changhong Fu
Sihang Li
Xinnan Yuan
Junjie Ye
Ziang Cao
Fangqiang Ding
AAML
27
20
0
03 Mar 2022
Improving Robustness of Convolutional Neural Networks Using Element-Wise Activation Scaling
Zhi-Yuan Zhang
Di Liu
AAML
9
1
0
24 Feb 2022
Universal adversarial perturbation for remote sensing images
Qingyu Wang
Jin Tang
Z. Yin
Bin Luo
AAML
30
5
0
22 Feb 2022
Previous
1
2
3
4
5
6
7
8
Next