ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1801.02610
  4. Cited By
Generating Adversarial Examples with Adversarial Networks

Generating Adversarial Examples with Adversarial Networks

8 January 2018
Chaowei Xiao
Bo Li
Jun-Yan Zhu
Warren He
M. Liu
D. Song
    GAN
    AAML
ArXivPDFHTML

Papers citing "Generating Adversarial Examples with Adversarial Networks"

50 / 380 papers shown
Title
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
30
12
0
21 Jul 2020
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
AdvFoolGen: Creating Persistent Troubles for Deep Classifiers
Yuzhen Ding
Nupur Thakur
Baoxin Li
AAML
24
3
0
20 Jul 2020
Learning perturbation sets for robust machine learning
Learning perturbation sets for robust machine learning
Eric Wong
J. Zico Kolter
OOD
8
80
0
16 Jul 2020
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing
  Flows
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
19
66
0
15 Jul 2020
Fast Real-time Counterfactual Explanations
Fast Real-time Counterfactual Explanations
Yunxia Zhao
17
15
0
11 Jul 2020
Generating Adversarial Inputs Using A Black-box Differential Technique
Generating Adversarial Inputs Using A Black-box Differential Technique
J. Matos
Lucas C. Cordeiro
Marcelo d’Amorim
Xiaowei Huang
AAML
8
0
0
10 Jul 2020
Black-box Adversarial Example Generation with Normalizing Flows
Black-box Adversarial Example Generation with Normalizing Flows
H. M. Dolatabadi
S. Erfani
C. Leckie
AAML
29
3
0
06 Jul 2020
On Data Augmentation and Adversarial Risk: An Empirical Analysis
On Data Augmentation and Adversarial Risk: An Empirical Analysis
Hamid Eghbalzadeh
Khaled Koutini
Paul Primus
Verena Haunschmid
Michal Lewandowski
Werner Zellinger
Bernhard A. Moser
Gerhard Widmer
AAML
22
9
0
06 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
38
51
0
01 Jul 2020
GAP++: Learning to generate target-conditioned adversarial examples
GAP++: Learning to generate target-conditioned adversarial examples
Xiaofeng Mao
YueFeng Chen
Yuhong Li
Yuan He
Hui Xue
AAML
18
8
0
09 Jun 2020
Distributional Robustness with IPMs and links to Regularization and GANs
Distributional Robustness with IPMs and links to Regularization and GANs
Hisham Husain
24
21
0
08 Jun 2020
QEBA: Query-Efficient Boundary-Based Blackbox Attack
QEBA: Query-Efficient Boundary-Based Blackbox Attack
Huichen Li
Xiaojun Xu
Xiaolu Zhang
Shuang Yang
Bo Li
AAML
21
178
0
28 May 2020
ShapeAdv: Generating Shape-Aware Adversarial 3D Point Clouds
ShapeAdv: Generating Shape-Aware Adversarial 3D Point Clouds
Kibok Lee
Zhuoyuan Chen
Xinchen Yan
R. Urtasun
Ersin Yumer
3DPC
23
30
0
24 May 2020
Model-Based Robust Deep Learning: Generalizing to Natural,
  Out-of-Distribution Data
Model-Based Robust Deep Learning: Generalizing to Natural, Out-of-Distribution Data
Alexander Robey
Hamed Hassani
George J. Pappas
OOD
43
42
0
20 May 2020
Synthesizing Unrestricted False Positive Adversarial Objects Using
  Generative Models
Synthesizing Unrestricted False Positive Adversarial Objects Using Generative Models
Martin Kotuliak
Sandro Schönborn
Andrei Dan
GAN
AAML
14
1
0
19 May 2020
Bias-based Universal Adversarial Patch Attack for Automatic Check-out
Bias-based Universal Adversarial Patch Attack for Automatic Check-out
Aishan Liu
Jiakai Wang
Xianglong Liu
Bowen Cao
Chongzhi Zhang
Hang Yu
AAML
16
5
0
19 May 2020
Attacking Recommender Systems with Augmented User Profiles
Attacking Recommender Systems with Augmented User Profiles
Chen Lin
Si Chen
Hui Li
Yanghua Xiao
Lianyun Li
Qiang Yang
AAML
23
82
0
17 May 2020
Universal Adversarial Attacks with Natural Triggers for Text
  Classification
Universal Adversarial Attacks with Natural Triggers for Text Classification
Liwei Song
Xinwei Yu
Hsuan-Tung Peng
Karthik Narasimhan
SILM
AAML
38
75
0
01 May 2020
Exploiting Defenses against GAN-Based Feature Inference Attacks in Federated Learning
Exploiting Defenses against GAN-Based Feature Inference Attacks in Federated Learning
Xinjian Luo
Xiangqi Zhu
FedML
78
25
0
27 Apr 2020
Improved Adversarial Training via Learned Optimizer
Improved Adversarial Training via Learned Optimizer
Yuanhao Xiong
Cho-Jui Hsieh
AAML
28
30
0
25 Apr 2020
Ensemble Generative Cleaning with Feedback Loops for Defending
  Adversarial Attacks
Ensemble Generative Cleaning with Feedback Loops for Defending Adversarial Attacks
Jianhe Yuan
Zhihai He
AAML
32
22
0
23 Apr 2020
Transferable, Controllable, and Inconspicuous Adversarial Attacks on
  Person Re-identification With Deep Mis-Ranking
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
AAML
22
83
0
08 Apr 2020
Adversarial Attacks on Monocular Depth Estimation
Adversarial Attacks on Monocular Depth Estimation
Ziqi Zhang
Xinge Zhu
Yingwei Li
Xiangqun Chen
Yao Guo
AAML
MDE
30
25
0
23 Mar 2020
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises
B. Yan
Dong Wang
Huchuan Lu
Xiaoyun Yang
AAML
12
71
0
21 Mar 2020
RAB: Provable Robustness Against Backdoor Attacks
RAB: Provable Robustness Against Backdoor Attacks
Maurice Weber
Xiaojun Xu
Bojan Karlas
Ce Zhang
Bo Li
AAML
24
161
0
19 Mar 2020
Face-Off: Adversarial Face Obfuscation
Face-Off: Adversarial Face Obfuscation
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
PICV
27
44
0
19 Mar 2020
Adversarial Camouflage: Hiding Physical-World Attacks with Natural
  Styles
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
167
224
0
08 Mar 2020
TSS: Transformation-Specific Smoothing for Robustness Certification
TSS: Transformation-Specific Smoothing for Robustness Certification
Linyi Li
Maurice Weber
Xiaojun Xu
Luka Rimanic
B. Kailkhura
Tao Xie
Ce Zhang
Bo Li
AAML
43
56
0
27 Feb 2020
Improving Robustness of Deep-Learning-Based Image Reconstruction
Improving Robustness of Deep-Learning-Based Image Reconstruction
Ankit Raj
Y. Bresler
Bo Li
OOD
AAML
29
50
0
26 Feb 2020
Adversarial Distributional Training for Robust Deep Learning
Adversarial Distributional Training for Robust Deep Learning
Yinpeng Dong
Zhijie Deng
Tianyu Pang
Hang Su
Jun Zhu
OOD
27
121
0
14 Feb 2020
Category-wise Attack: Transferable Adversarial Examples for Anchor Free
  Object Detection
Category-wise Attack: Transferable Adversarial Examples for Anchor Free Object Detection
Quanyu Liao
Xin Wang
Bin Kong
Siwei Lyu
Youbing Yin
Qi Song
Xi Wu
AAML
20
8
0
10 Feb 2020
AI-GAN: Attack-Inspired Generation of Adversarial Examples
AI-GAN: Attack-Inspired Generation of Adversarial Examples
Tao Bai
Jun Zhao
Jinlin Zhu
Shoudong Han
Jiefeng Chen
Bo Li
Alex C. Kot
GAN
39
48
0
06 Feb 2020
An Analysis of Adversarial Attacks and Defenses on Autonomous Driving
  Models
An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Yao Deng
Xi Zheng
Tianyi Zhang
Chen Chen
Guannan Lou
Miryung Kim
AAML
16
141
0
06 Feb 2020
Elephant in the Room: An Evaluation Framework for Assessing Adversarial
  Examples in NLP
Elephant in the Room: An Evaluation Framework for Assessing Adversarial Examples in NLP
Ying Xu
Xu Zhong
Antonio Jimeno Yepes
Jey Han Lau
AAML
30
10
0
22 Jan 2020
Adversarial symmetric GANs: bridging adversarial samples and adversarial
  networks
Adversarial symmetric GANs: bridging adversarial samples and adversarial networks
Faqiang Liu
M. Xu
Guoqi Li
Jing Pei
Luping Shi
R. Zhao
AAML
GAN
24
11
0
20 Dec 2019
$n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically
  Manipulated Classifiers
nnn-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
AAML
18
6
0
19 Dec 2019
CAG: A Real-time Low-cost Enhanced-robustness High-transferability
  Content-aware Adversarial Attack Generator
CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator
Huy Phan
Yi Xie
Siyu Liao
Jie Chen
Bo Yuan
AAML
24
20
0
16 Dec 2019
Towards a Robust Classifier: An MDL-Based Method for Generating
  Adversarial Examples
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples
B. Asadi
Vijay Varadharajan
AAML
23
3
0
11 Dec 2019
Achieving Robustness in the Wild via Adversarial Mixing with
  Disentangled Representations
Achieving Robustness in the Wild via Adversarial Mixing with Disentangled Representations
Sven Gowal
Chongli Qin
Po-Sen Huang
taylan. cemgil
Krishnamurthy Dvijotham
Timothy A. Mann
Pushmeet Kohli
AAML
OOD
26
57
0
06 Dec 2019
Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Hanwei Zhang
Yannis Avrithis
Teddy Furon
Laurent Amsaleg
AAML
20
45
0
04 Dec 2019
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas
Yuxuan Zhang
Florian Kerschbaum
MLAU
FedML
AAML
39
145
0
02 Dec 2019
Approximating Human Judgment of Generated Image Quality
Approximating Human Judgment of Generated Image Quality
Y. A. Kolchinski
Sharon Zhou
Shengjia Zhao
Mitchell L. Gordon
Stefano Ermon
EGVM
6
4
0
30 Nov 2019
SpoC: Spoofing Camera Fingerprints
SpoC: Spoofing Camera Fingerprints
D. Cozzolino
Justus Thies
Andreas Rossler
Matthias Nießner
L. Verdoliva
33
38
0
27 Nov 2019
One Man's Trash is Another Man's Treasure: Resisting Adversarial
  Examples by Adversarial Examples
One Man's Trash is Another Man's Treasure: Resisting Adversarial Examples by Adversarial Examples
Chang Xiao
Changxi Zheng
AAML
25
19
0
25 Nov 2019
Fine-grained Synthesis of Unrestricted Adversarial Examples
Fine-grained Synthesis of Unrestricted Adversarial Examples
Omid Poursaeed
Tianxing Jiang
Yordanos Goshu
Harry Yang
Serge J. Belongie
Ser-Nam Lim
AAML
37
13
0
20 Nov 2019
Generate (non-software) Bugs to Fool Classifiers
Generate (non-software) Bugs to Fool Classifiers
Hiromu Yakura
Youhei Akimoto
Jun Sakuma
AAML
25
10
0
20 Nov 2019
Black-Box Adversarial Attack with Transferable Model-based Embedding
Black-Box Adversarial Attack with Transferable Model-based Embedding
Zhichao Huang
Tong Zhang
19
118
0
17 Nov 2019
SMART: Skeletal Motion Action Recognition aTtack
SMART: Skeletal Motion Action Recognition aTtack
He Wang
Feixiang He
Zexi Peng
Yong-Liang Yang
Tianjia Shao
Kun Zhou
David C. Hogg
AAML
31
5
0
16 Nov 2019
Adversarial Examples in Modern Machine Learning: A Review
Adversarial Examples in Modern Machine Learning: A Review
R. Wiyatno
Anqi Xu
Ousmane Amadou Dia
A. D. Berker
AAML
21
104
0
13 Nov 2019
Few-Features Attack to Fool Machine Learning Models through Mask-Based
  GAN
Few-Features Attack to Fool Machine Learning Models through Mask-Based GAN
Feng Chen
Yunkai Shang
Bo Xu
Jincheng Hu
GAN
AAML
21
3
0
12 Nov 2019
Previous
12345678
Next