ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.00420
  4. Cited By
Obfuscated Gradients Give a False Sense of Security: Circumventing
  Defenses to Adversarial Examples
v1v2v3v4 (latest)

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples

1 February 2018
Anish Athalye
Nicholas Carlini
D. Wagner
    AAML
ArXiv (abs)PDFHTML

Papers citing "Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples"

50 / 1,983 papers shown
Local Gradients Smoothing: Defense against localized adversarial attacks
Local Gradients Smoothing: Defense against localized adversarial attacksIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2018
Muzammal Naseer
Salman H. Khan
Fatih Porikli
AAML
265
200
0
03 Jul 2018
Adversarial Robustness Toolbox v1.0.0
Adversarial Robustness Toolbox v1.0.0
Maria-Irina Nicolae
M. Sinn
Minh-Ngoc Tran
Beat Buesser
Ambrish Rawat
...
Nathalie Baracaldo
Bryant Chen
Heiko Ludwig
Ian Molloy
Ben Edwards
AAMLVLM
423
527
0
03 Jul 2018
Detection based Defense against Adversarial Examples from the
  Steganalysis Point of View
Detection based Defense against Adversarial Examples from the Steganalysis Point of View
Jiayang Liu
Weiming Zhang
Yiwei Zhang
Dongdong Hou
Yujia Liu
Hongyue Zha
Nenghai Yu
AAML
264
107
0
21 Jun 2018
Gradient Adversarial Training of Neural Networks
Gradient Adversarial Training of Neural Networks
Ayan Sinha
Zhao Chen
Vijay Badrinarayanan
Andrew Rabinovich
AAML
159
38
0
21 Jun 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
156
7
0
19 Jun 2018
Non-Negative Networks Against Adversarial Attacks
Non-Negative Networks Against Adversarial Attacks
William Fleshman
Edward Raff
Jared Sylvester
Steven Forsyth
Mark McLean
AAML
174
43
0
15 Jun 2018
Hardware Trojan Attacks on Neural Networks
Hardware Trojan Attacks on Neural Networks
Joseph Clements
Yingjie Lao
AAML
136
94
0
14 Jun 2018
Manifold Mixup: Better Representations by Interpolating Hidden States
Manifold Mixup: Better Representations by Interpolating Hidden States
Vikas Verma
Alex Lamb
Christopher Beckham
Amir Najafi
Alexia Jolicoeur-Martineau
Aaron Courville
David Lopez-Paz
Yoshua Bengio
AAMLDRL
251
37
0
13 Jun 2018
Monge blunts Bayes: Hardness Results for Adversarial Training
Monge blunts Bayes: Hardness Results for Adversarial Training
Zac Cranko
A. Menon
Richard Nock
Cheng Soon Ong
Zhan Shi
Christian J. Walder
AAML
167
17
0
08 Jun 2018
Revisiting Adversarial Risk
Revisiting Adversarial Risk
A. Suggala
Adarsh Prasad
Vaishnavh Nagarajan
Pradeep Ravikumar
AAML
203
20
0
07 Jun 2018
Killing four birds with one Gaussian process: the relation between
  different test-time attacks
Killing four birds with one Gaussian process: the relation between different test-time attacks
Kathrin Grosse
M. Smith
Michael Backes
AAML
181
2
0
06 Jun 2018
Resisting Adversarial Attacks using Gaussian Mixture Variational
  Autoencoders
Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders
Partha Ghosh
Arpan Losalka
Michael J. Black
AAML
240
81
0
31 May 2018
Scaling provable adversarial defenses
Scaling provable adversarial defenses
Eric Wong
Frank R. Schmidt
J. H. Metzen
J. Zico Kolter
AAML
292
464
0
31 May 2018
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural
  Networks
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
Kang Liu
Brendan Dolan-Gavitt
S. Garg
AAML
240
1,201
0
30 May 2018
Robustness May Be at Odds with Accuracy
Robustness May Be at Odds with Accuracy
Dimitris Tsipras
Shibani Santurkar
Logan Engstrom
Alexander Turner
Aleksander Madry
AAML
631
1,884
0
30 May 2018
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
MLAUAAML
333
432
0
30 May 2018
Adversarial Examples in Remote Sensing
Adversarial Examples in Remote Sensing
W. Czaja
Neil Fendley
M. Pekala
Christopher R. Ratto
I-J. Wang
AAML
90
76
0
28 May 2018
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
M. Alzantot
Yash Sharma
Supriyo Chakraborty
Huan Zhang
Cho-Jui Hsieh
Mani B. Srivastava
AAML
322
279
0
28 May 2018
Training verified learners with learned verifiers
Training verified learners with learned verifiers
Krishnamurthy Dvijotham
Sven Gowal
Robert Stanforth
Relja Arandjelović
Brendan O'Donoghue
J. Uesato
Pushmeet Kohli
OOD
264
172
0
25 May 2018
Adversarial examples from computational constraints
Adversarial examples from computational constraints
Sébastien Bubeck
Eric Price
Ilya P. Razenshteyn
AAML
406
235
0
25 May 2018
Towards the first adversarially robust neural network model on MNIST
Towards the first adversarially robust neural network model on MNIST
Lukas Schott
Jonas Rauber
Matthias Bethge
Wieland Brendel
AAMLOOD
353
380
0
23 May 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GANAAML
585
341
0
21 May 2018
Featurized Bidirectional GAN: Adversarial Defense via Adversarially
  Learned Semantic Inference
Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference
Ruying Bao
Sihang Liang
Qingcan Wang
GANAAML
136
15
0
21 May 2018
Towards Understanding Limitations of Pixel Discretization Against
  Adversarial Attacks
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Jiefeng Chen
Xi Wu
Vaibhav Rastogi
Yingyu Liang
S. Jha
AAML
280
23
0
20 May 2018
Gradient-Leaks: Understanding and Controlling Deanonymization in
  Federated Learning
Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning
Tribhuvanesh Orekondy
Seong Joon Oh
Yang Zhang
Bernt Schiele
Mario Fritz
PICVFedML
675
40
0
15 May 2018
Detecting Adversarial Samples for Deep Neural Networks through Mutation
  Testing
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing
Jingyi Wang
Jun Sun
Peixin Zhang
Xinyu Wang
AAML
192
41
0
14 May 2018
Curriculum Adversarial Training
Curriculum Adversarial Training
Qi-Zhi Cai
Min Du
Chang-rui Liu
Basel Alomair
AAML
177
182
0
13 May 2018
Breaking Transferability of Adversarial Samples with Randomness
Breaking Transferability of Adversarial Samples with Randomness
Yan Zhou
Murat Kantarcioglu
B. Xi
AAML
114
12
0
11 May 2018
Deep Nets: What have they ever done for Vision?
Deep Nets: What have they ever done for Vision?
Alan Yuille
Chenxi Liu
490
107
0
10 May 2018
Verisimilar Percept Sequences Tests for Autonomous Driving Intelligent
  Agent Assessment
Verisimilar Percept Sequences Tests for Autonomous Driving Intelligent Agent Assessment
Thomio Watanabe
D. Wolf
78
8
0
07 May 2018
PRADA: Protecting against DNN Model Stealing Attacks
PRADA: Protecting against DNN Model Stealing Attacks
Mika Juuti
S. Szyller
Samuel Marchal
Nadarajah Asokan
SILMAAML
499
488
0
07 May 2018
Adversarially Robust Generalization Requires More Data
Adversarially Robust Generalization Requires More Data
Ludwig Schmidt
Shibani Santurkar
Dimitris Tsipras
Kunal Talwar
Aleksander Madry
OODAAML
432
839
0
30 Apr 2018
VectorDefense: Vectorization as a Defense to Adversarial Examples
VectorDefense: Vectorization as a Defense to Adversarial ExamplesStudies in Computational Intelligence (SCI), 2018
V. Kabilan
Brandon L. Morris
Anh Totti Nguyen
AAML
145
22
0
23 Apr 2018
ADef: an Iterative Algorithm to Construct Adversarial Deformations
ADef: an Iterative Algorithm to Construct Adversarial DeformationsInternational Conference on Learning Representations (ICLR), 2018
Rima Alaifari
Giovanni S. Alberti
Tandri Gauksson
AAML
238
107
0
20 Apr 2018
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object
  Detector
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
Shang-Tse Chen
Cory Cornelius
Jason Martin
Duen Horng Chau
ObjD
441
457
0
16 Apr 2018
Adversarial Attacks Against Medical Deep Learning Systems
Adversarial Attacks Against Medical Deep Learning Systems
S. G. Finlayson
Hyung Won Chung
I. Kohane
Andrew L. Beam
SILMAAMLOODMedIm
298
252
0
15 Apr 2018
On the Limitation of MagNet Defense against $L_1$-based Adversarial
  Examples
On the Limitation of MagNet Defense against L1L_1L1​-based Adversarial Examples
Pei-Hsuan Lu
Pin-Yu Chen
Kang-Cheng Chen
Chia-Mu Yu
AAML
269
20
0
14 Apr 2018
On the Robustness of the CVPR 2018 White-Box Adversarial Example
  Defenses
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses
Anish Athalye
Nicholas Carlini
AAML
161
173
0
10 Apr 2018
Adversarial Training Versus Weight Decay
Adversarial Training Versus Weight Decay
A. Galloway
T. Tanay
Graham W. Taylor
AAML
229
23
0
10 Apr 2018
An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural
  Networks
An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks
Pu Zhao
Sijia Liu
Yanzhi Wang
Xinyu Lin
AAML
131
38
0
09 Apr 2018
Fortified Networks: Improving the Robustness of Deep Networks by
  Modeling the Manifold of Hidden Representations
Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations
Alex Lamb
Jonathan Binas
Anirudh Goyal
Dmitriy Serdyuk
Sandeep Subramanian
Alexia Jolicoeur-Martineau
Yoshua Bengio
OOD
212
45
0
07 Apr 2018
Unifying Bilateral Filtering and Adversarial Training for Robust Neural
  Networks
Unifying Bilateral Filtering and Adversarial Training for Robust Neural Networks
Neale Ratzlaff
Fuxin Li
AAMLFedML
113
1
0
05 Apr 2018
Defending against Adversarial Images using Basis Functions
  Transformations
Defending against Adversarial Images using Basis Functions Transformations
Uri Shaham
J. Garritano
Yutaro Yamada
Ethan Weinberger
A. Cloninger
Xiuyuan Cheng
Kelly P. Stanton
Y. Kluger
AAML
159
61
0
28 Mar 2018
On the Limitation of Local Intrinsic Dimensionality for Characterizing
  the Subspaces of Adversarial Examples
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
135
26
0
26 Mar 2018
Adversarial Defense based on Structure-to-Signal Autoencoders
Adversarial Defense based on Structure-to-Signal Autoencoders
Joachim Folz
Sebastián M. Palacio
Jörn Hees
Damian Borth
Andreas Dengel
AAML
141
34
0
21 Mar 2018
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems
Lei Ma
Felix Juefei Xu
Fuyuan Zhang
Jiyuan Sun
Minhui Xue
...
Ting Su
Li Li
Yang Liu
Jianjun Zhao
Yadong Wang
ELM
344
674
0
20 Mar 2018
A Dual Approach to Scalable Verification of Deep Networks
A Dual Approach to Scalable Verification of Deep Networks
Krishnamurthy Dvijotham
Dvijotham
Robert Stanforth
Sven Gowal
Timothy A. Mann
Pushmeet Kohli
249
407
0
17 Mar 2018
Adversarial Logit Pairing
Adversarial Logit Pairing
Harini Kannan
Alexey Kurakin
Ian Goodfellow
AAML
334
652
0
16 Mar 2018
Semantic Adversarial Examples
Semantic Adversarial Examples
Hossein Hosseini
Radha Poovendran
GANAAML
306
215
0
16 Mar 2018
Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial
  Examples
Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial ExamplesComputer Vision and Pattern Recognition (CVPR), 2018
Zihao Liu
Qi Liu
Tao Liu
Nuo Xu
Xue Lin
Yanzhi Wang
Wujie Wen
AAMLMQ
216
305
0
14 Mar 2018
Previous
123...383940
Next
Page 39 of 40
Pageof 40