ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.08352
  4. Cited By
Unrestricted Adversarial Examples

Unrestricted Adversarial Examples

22 September 2018
Tom B. Brown
Nicholas Carlini
Chiyuan Zhang
Catherine Olsson
Paul Christiano
Ian Goodfellow
    AAML
ArXiv (abs)PDFHTML

Papers citing "Unrestricted Adversarial Examples"

50 / 73 papers shown
Generalizability vs. Counterfactual Explainability Trade-Off
Generalizability vs. Counterfactual Explainability Trade-Off
Fabiano Veglianti
Flavio Giorgi
Fabrizio Silvestri
Gabriele Tolomei
275
0
0
29 May 2025
NatADiff: Adversarial Boundary Guidance for Natural Adversarial Diffusion
NatADiff: Adversarial Boundary Guidance for Natural Adversarial Diffusion
Max Collins
Jordan Vice
T. French
Lin Wang
DiffM
332
2
0
27 May 2025
Adversarial ML Problems Are Getting Harder to Solve and to Evaluate
Adversarial ML Problems Are Getting Harder to Solve and to Evaluate
Javier Rando
Jie Zhang
Nicholas Carlini
F. Tramèr
AAMLELM
465
25
0
04 Feb 2025
Jailbreak Defense in a Narrow Domain: Limitations of Existing Methods
  and a New Transcript-Classifier Approach
Jailbreak Defense in a Narrow Domain: Limitations of Existing Methods and a New Transcript-Classifier Approach
T. T. Wang
John Hughes
Henry Sleight
Rylan Schaeffer
Rajashree Agrawal
Fazl Barez
Mrinank Sharma
Jesse Mu
Nir Shavit
Ethan Perez
AAML
485
6
0
03 Dec 2024
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters AugmentationComputer Vision and Pattern Recognition (CVPR), 2024
Fengfan Zhou
Bangjie Yin
Hefei Ling
Qianyu Zhou
Wenxuan Wang
AAML
529
0
0
23 Nov 2024
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Fengfan Zhou
Qianyu Zhou
Hefei Ling
Xuequan Lu
AAML
603
3
0
27 May 2024
Defending Against Unforeseen Failure Modes with Latent Adversarial Training
Defending Against Unforeseen Failure Modes with Latent Adversarial Training
Stephen Casper
Lennart Schulze
Oam Patel
Dylan Hadfield-Menell
AAML
817
69
0
08 Mar 2024
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust DefenseIEEE Access (IEEE Access), 2024
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
387
9
0
11 Feb 2024
Sparse and Transferable Universal Singular Vectors Attack
Sparse and Transferable Universal Singular Vectors Attack
Kseniia Kuvshinova
Olga Tsymboi
Ivan Oseledets
AAML
297
0
0
25 Jan 2024
Rethinking Impersonation and Dodging Attacks on Face Recognition Systems
Rethinking Impersonation and Dodging Attacks on Face Recognition SystemsACM Multimedia (MM), 2024
Fengfan Zhou
Qianyu Zhou
Bangjie Yin
Hui Zheng
Xuequan Lu
Lizhuang Ma
Heifei Ling
AAML
421
10
0
17 Jan 2024
Efficient Key-Based Adversarial Defense for ImageNet by Using
  Pre-trained Model
Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained ModelIEEE Open Journal of Signal Processing (IEEE Open J. Signal Process.), 2023
AprilPyone Maungmaung
Isao Echizen
Hitoshi Kiya
VLMAAML
242
2
0
28 Nov 2023
A Survey on Transferability of Adversarial Examples across Deep Neural
  Networks
A Survey on Transferability of Adversarial Examples across Deep Neural Networks
Jindong Gu
Yang Liu
Pau de Jorge
Wenqain Yu
Xinwei Liu
...
Anjun Hu
Ashkan Khakzar
Zhijiang Li
Simeng Qin
Juil Sock
AAML
506
58
0
26 Oct 2023
On the Computational Entanglement of Distant Features in Adversarial
  Machine Learning
On the Computational Entanglement of Distant Features in Adversarial Machine Learning
Yen-Lung Lai
Xingbo Dong
Zhe Jin
AAML
580
0
0
27 Sep 2023
Semantic Adversarial Attacks via Diffusion Models
Semantic Adversarial Attacks via Diffusion ModelsBritish Machine Vision Conference (BMVC), 2023
Chenan Wang
Jinhao Duan
Chaowei Xiao
Edward Kim
Matthew C. Stamm
Kaidi Xu
DiffM
233
18
0
14 Sep 2023
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake
  Detection
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Weijie Wang
Zhengyu Zhao
Andrii Zadaianchuk
Bruno Lepri
AAML
306
3
0
03 Sep 2023
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A
  Survey
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A SurveyIEEE Access (IEEE Access), 2023
Hanieh Naderi
Ivan V. Bajić
3DPC
483
12
0
01 Jul 2023
You Don't Need Robust Machine Learning to Manage Adversarial Attack
  Risks
You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks
Edward Raff
M. Benaroch
Andrew L. Farris
AAML
253
6
0
16 Jun 2023
Automatically Auditing Large Language Models via Discrete Optimization
Automatically Auditing Large Language Models via Discrete OptimizationInternational Conference on Machine Learning (ICML), 2023
Erik Jones
Anca Dragan
Aditi Raghunathan
Jacob Steinhardt
293
228
0
08 Mar 2023
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters
  Substitution
Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution
Ming-Kuai Zhou
Xiaobing Pei
AAML
203
0
0
31 Aug 2022
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries
Dongbin Na
Sangwoo Ji
Jong Kim
AAML
334
32
0
24 Aug 2022
Adversarial Training for High-Stakes Reliability
Adversarial Training for High-Stakes ReliabilityNeural Information Processing Systems (NeurIPS), 2022
Daniel M. Ziegler
Seraphina Nix
Lawrence Chan
Tim Bauman
Peter Schmidt-Nielsen
...
Noa Nabeshima
Benjamin Weinstein-Raun
D. Haas
Buck Shlegeris
Nate Thomas
AAML
674
76
0
03 May 2022
StyleFool: Fooling Video Classification Systems via Style Transfer
StyleFool: Fooling Video Classification Systems via Style TransferIEEE Symposium on Security and Privacy (IEEE S&P), 2022
Yu Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
AAML
601
30
0
30 Mar 2022
Attacking deep networks with surrogate-based adversarial black-box
  methods is easy
Attacking deep networks with surrogate-based adversarial black-box methods is easyInternational Conference on Learning Representations (ICLR), 2022
Nicholas A. Lord
Romain Mueller
Luca Bertinetto
AAMLMLAU
322
32
0
16 Mar 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning ModelsAAAI Conference on Artificial Intelligence (AAAI), 2022
Pin-Yu Chen
Sijia Liu
AAML
436
24
0
15 Feb 2022
Towards Transferable Unrestricted Adversarial Examples with Minimum
  Changes
Towards Transferable Unrestricted Adversarial Examples with Minimum Changes
Fangcheng Liu
Chaoning Zhang
Hongyang R. Zhang
AAML
347
24
0
04 Jan 2022
LTD: Low Temperature Distillation for Gradient Masking-free Adversarial Training
LTD: Low Temperature Distillation for Gradient Masking-free Adversarial TrainingACM Transactions on Cyber-Physical Systems (ACM TCPS), 2021
Erh-Chung Chen
Che-Rung Lee
AAML
417
27
0
03 Nov 2021
Adversarial Attack by Limited Point Cloud Surface Modifications
Adversarial Attack by Limited Point Cloud Surface Modifications
Atrin Arya
Hanieh Naderi
S. Kasaei
AAML3DPC
217
7
0
07 Oct 2021
Robustness and Generalization via Generative Adversarial Training
Robustness and Generalization via Generative Adversarial TrainingIEEE International Conference on Computer Vision (ICCV), 2021
Omid Poursaeed
Tianxing Jiang
Harry Yang
Serge Belongie
SerNam Lim
OODAAML
203
35
0
06 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
544
315
0
01 Aug 2021
An Adversarially-Learned Turing Test for Dialog Generation Models
An Adversarially-Learned Turing Test for Dialog Generation Models
Xiang Gao
Yizhe Zhang
Michel Galley
Bill Dolan
AAML
167
2
0
16 Apr 2021
Domain Invariant Adversarial Learning
Domain Invariant Adversarial Learning
Matan Levi
Idan Attias
A. Kontorovich
AAMLOOD
610
11
0
01 Apr 2021
Generating Unrestricted Adversarial Examples via Three Parameters
Generating Unrestricted Adversarial Examples via Three ParametersMultimedia tools and applications (MTA), 2021
Hanieh Naderi
Leili Goli
S. Kasaei
241
9
0
13 Mar 2021
Tiny Adversarial Mulit-Objective Oneshot Neural Architecture Search
Tiny Adversarial Mulit-Objective Oneshot Neural Architecture SearchComplex & Intelligent Systems (CIS), 2021
Guoyang Xie
Jinbao Wang
Guo-Ding Yu
Feng Zheng
Yaochu Jin
AAML
183
7
0
28 Feb 2021
Understanding the Error in Evaluating Adversarial Robustness
Understanding the Error in Evaluating Adversarial Robustness
Pengfei Xia
Wandi Qiao
Hongjing Niu
Bin Li
AAMLELM
256
5
0
07 Jan 2021
Composite Adversarial Attacks
Composite Adversarial AttacksAAAI Conference on Artificial Intelligence (AAAI), 2020
Xiaofeng Mao
YueFeng Chen
Shuhui Wang
Hang Su
Yuan He
Hui Xue
AAML
207
59
0
10 Dec 2020
RobustBench: a standardized adversarial robustness benchmark
RobustBench: a standardized adversarial robustness benchmark
Francesco Croce
Maksym Andriushchenko
Vikash Sehwag
Edoardo Debenedetti
Nicolas Flammarion
M. Chiang
Prateek Mittal
Matthias Hein
VLM
880
863
0
19 Oct 2020
Jointly Optimizing Preprocessing and Inference for DNN-based Visual
  Analytics
Jointly Optimizing Preprocessing and Inference for DNN-based Visual AnalyticsProceedings of the VLDB Endowment (PVLDB), 2020
Daniel Kang
A. Mathur
Teja Veeramacheneni
Peter Bailis
Matei A. Zaharia
248
49
0
25 Jul 2020
Security and Machine Learning in the Real World
Security and Machine Learning in the Real World
Ivan Evtimov
Weidong Cui
Ece Kamar
Emre Kıcıman
Tadayoshi Kohno
Haibin Zhang
AAML
152
16
0
13 Jul 2020
Perceptual Adversarial Robustness: Defense Against Unseen Threat Models
Perceptual Adversarial Robustness: Defense Against Unseen Threat ModelsInternational Conference on Learning Representations (ICLR), 2020
Cassidy Laidlaw
Sahil Singla
Soheil Feizi
AAMLOOD
582
215
0
22 Jun 2020
Towards Robustness against Unsuspicious Adversarial Examples
Towards Robustness against Unsuspicious Adversarial Examples
Liang Tong
Minzhe Guo
A. Prakash
Yevgeniy Vorobeychik
AAML
341
0
0
08 May 2020
Adversarial Training against Location-Optimized Adversarial Patches
Adversarial Training against Location-Optimized Adversarial Patches
Sukrut Rao
David Stutz
Bernt Schiele
AAML
439
114
0
05 May 2020
Adversarial Attacks and Defenses: An Interpretation Perspective
Adversarial Attacks and Defenses: An Interpretation Perspective
Ninghao Liu
Mengnan Du
Ruocheng Guo
Huan Liu
Helen Zhou
AAML
246
8
0
23 Apr 2020
Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Blind Adversarial Pruning: Balance Accuracy, Efficiency and RobustnessIEEE International Conference on Multimedia and Expo (ICME), 2020
Haidong Xie
Lixin Qian
Xueshuang Xiang
Naijin Liu
AAML
127
1
0
10 Apr 2020
Breaking certified defenses: Semantic adversarial examples with spoofed
  robustness certificates
Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificatesInternational Conference on Learning Representations (ICLR), 2020
Amin Ghiasi
Ali Shafahi
Tom Goldstein
209
57
0
19 Mar 2020
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
  Adversarial Robustness
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial RobustnessComputer Vision and Pattern Recognition (CVPR), 2020
Ahmadreza Jeddi
M. Shafiee
Michelle Karg
C. Scharfenberger
A. Wong
OODAAML
443
74
0
02 Mar 2020
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition
Temporal Sparse Adversarial Attack on Sequence-based Gait RecognitionPattern Recognition (Pattern Recognit.), 2020
Ziwen He
Wei Wang
Jing Dong
Tieniu Tan
AAML
276
33
0
22 Feb 2020
Random Smoothing Might be Unable to Certify $\ell_\infty$ Robustness for
  High-Dimensional Images
Random Smoothing Might be Unable to Certify ℓ∞\ell_\inftyℓ∞​ Robustness for High-Dimensional ImagesJournal of machine learning research (JMLR), 2020
Avrim Blum
Travis Dick
N. Manoj
Hongyang R. Zhang
AAML
372
83
0
10 Feb 2020
Adversarial Color Enhancement: Generating Unrestricted Adversarial
  Images by Optimizing a Color Filter
Adversarial Color Enhancement: Generating Unrestricted Adversarial Images by Optimizing a Color Filter
Subrat Kishore Dutta
Zhuoran Liu
Martha Larson
334
1
0
03 Feb 2020
Evaluating Robustness to Context-Sensitive Feature Perturbations of
  Different Granularities
Evaluating Robustness to Context-Sensitive Feature Perturbations of Different Granularities
Isaac Dunn
Laura Hanu
Hadrien Pouget
Daniel Kroening
T. Melham
AAML
233
4
0
29 Jan 2020
Identifying Model Weakness with Adversarial Examiner
Identifying Model Weakness with Adversarial ExaminerAAAI Conference on Artificial Intelligence (AAAI), 2019
Michelle Shu
Chenxi Liu
Weichao Qiu
Alan Yuille
AAMLELM
240
23
0
25 Nov 2019
12
Next
Page 1 of 2