ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1810.00069
  4. Cited By
Adversarial Attacks and Defences: A Survey

Adversarial Attacks and Defences: A Survey

28 September 2018
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
    AAMLOOD
ArXiv (abs)PDFHTML

Papers citing "Adversarial Attacks and Defences: A Survey"

50 / 330 papers shown
Title
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
126
12
0
21 Jun 2023
NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations
NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations
Y. Fu
Ye Yuan
Souvik Kundu
Shang Wu
Shunyao Zhang
Yingyan Lin
AAML
124
6
0
10 Jun 2023
Divide and Repair: Using Options to Improve Performance of Imitation
  Learning Against Adversarial Demonstrations
Divide and Repair: Using Options to Improve Performance of Imitation Learning Against Adversarial Demonstrations
P. Dasgupta
AAML
18
0
0
07 Jun 2023
The Chai Platform's AI Safety Framework
The Chai Platform's AI Safety Framework
Xiaoding Lu
Aleksey Korshuk
Z. Liu
W. Beauchamp
64
2
0
05 Jun 2023
Enhance Diffusion to Improve Robust Generalization
Enhance Diffusion to Improve Robust Generalization
Jianhui Sun
Sanchit Sinha
Aidong Zhang
69
4
0
05 Jun 2023
Adversarial Attack On Yolov5 For Traffic And Road Sign Detection
Adversarial Attack On Yolov5 For Traffic And Road Sign Detection
Sanyam Jain
AAML
90
0
0
27 May 2023
Modeling Adversarial Attack on Pre-trained Language Models as Sequential
  Decision Making
Modeling Adversarial Attack on Pre-trained Language Models as Sequential Decision Making
Xuanjie Fang
Sijie Cheng
Yang Liu
Wen Wang
AAML
63
9
0
27 May 2023
A Tale of Two Approximations: Tightening Over-Approximation for DNN
  Robustness Verification via Under-Approximation
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation
Zhiyi Xue
Si Liu
Zhaodi Zhang
Yiting Wu
Hao Fei
AAML
47
2
0
26 May 2023
Fantastic DNN Classifiers and How to Identify them without Data
Fantastic DNN Classifiers and How to Identify them without Data
Nathaniel R. Dean
D. Sarkar
58
1
0
24 May 2023
Causality-Aided Trade-off Analysis for Machine Learning Fairness
Causality-Aided Trade-off Analysis for Machine Learning Fairness
Zhenlan Ji
Pingchuan Ma
Shuai Wang
Yanhui Li
FaML
107
8
0
22 May 2023
UP5: Unbiased Foundation Model for Fairness-aware Recommendation
UP5: Unbiased Foundation Model for Fairness-aware Recommendation
Wenyue Hua
Yingqiang Ge
Shuyuan Xu
Jianchao Ji
Yongfeng Zhang
106
52
0
20 May 2023
ChatGPT-Like Large-Scale Foundation Models for Prognostics and Health
  Management: A Survey and Roadmaps
ChatGPT-Like Large-Scale Foundation Models for Prognostics and Health Management: A Survey and Roadmaps
Yanfang Li
Huan Wang
Muxia Sun
LM&MAAI4TSAI4CE
99
56
0
10 May 2023
A Survey on the Robustness of Computer Vision Models against Common
  Corruptions
A Survey on the Robustness of Computer Vision Models against Common Corruptions
Shunxin Wang
Raymond N. J. Veldhuis
Christoph Brune
N. Strisciuglio
OODVLM
127
14
0
10 May 2023
Communication-Robust Multi-Agent Learning by Adaptable Auxiliary
  Multi-Agent Adversary Generation
Communication-Robust Multi-Agent Learning by Adaptable Auxiliary Multi-Agent Adversary Generation
Lei Yuan
F. Chen
Zhongzhan Zhang
Yang Yu
AAML
97
10
0
09 May 2023
Learngene: Inheriting Condensed Knowledge from the Ancestry Model to
  Descendant Models
Learngene: Inheriting Condensed Knowledge from the Ancestry Model to Descendant Models
Qiufeng Wang
Xu Yang
Shuxia Lin
Jing Wang
Xin Geng
80
13
0
03 May 2023
Adversary Aware Continual Learning
Adversary Aware Continual Learning
Muhammad Umer
R. Polikar
AAML
64
3
0
27 Apr 2023
Expand-and-Cluster: Parameter Recovery of Neural Networks
Expand-and-Cluster: Parameter Recovery of Neural Networks
Flavio Martinelli
Berfin Simsek
W. Gerstner
Johanni Brea
144
8
0
25 Apr 2023
Security and Privacy Issues for Urban Smart Traffic Infrastructure
Anubhab Baksi
A. I. S. Khalil
Anupam Chattopadhyay
70
0
0
17 Apr 2023
To be Robust and to be Fair: Aligning Fairness with Robustness
To be Robust and to be Fair: Aligning Fairness with Robustness
Junyi Chai
Xiaoqian Wang
89
2
0
31 Mar 2023
Fooling the Image Dehazing Models by First Order Gradient
Fooling the Image Dehazing Models by First Order Gradient
Jie Gui
Xiaofeng Cong
Chengwei Peng
Yuan Yan Tang
James T. Kwok
AAML
47
9
0
30 Mar 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial
  Robustness
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILMAAML
96
11
0
17 Mar 2023
DeeBBAA: A benchmark Deep Black Box Adversarial Attack against
  Cyber-Physical Power Systems
DeeBBAA: A benchmark Deep Black Box Adversarial Attack against Cyber-Physical Power Systems
A. Bhattacharjee
T. K. Saha
Ashu Verma
Sukumar Mishra
AAML
8
3
0
16 Mar 2023
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Adversarial Attacks on Machine Learning in Embedded and IoT Platforms
Christian Westbrook
S. Pasricha
AAML
65
3
0
03 Mar 2023
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions
  with Community-Driven Insights
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
Jay Jacobs
Sasha Romanosky
Octavian Suciuo
Benjamin Edwards
Armin Sarabi
46
22
0
27 Feb 2023
GLOW: Global Layout Aware Attacks on Object Detection
GLOW: Global Layout Aware Attacks on Object Detection
Buyu Liu
BaoJun
Jianping Fan
Xi Peng
Kui Ren
Jun Yu
AAML
41
0
0
27 Feb 2023
Chaotic Variational Auto encoder-based Adversarial Machine Learning
Chaotic Variational Auto encoder-based Adversarial Machine Learning
Pavan Venkata Sainadh Reddy
Yelleti Vivek
Gopi Pranay
V. Ravi
DRLAAML
71
1
0
25 Feb 2023
Shortcut Detection with Variational Autoencoders
Shortcut Detection with Variational Autoencoders
Nicolas Müller
Simon Roschmann
Shahbaz Khan
Philip Sperl
Konstantin Böttinger
AAMLDRL
65
2
0
08 Feb 2023
Efficient XAI Techniques: A Taxonomic Survey
Efficient XAI Techniques: A Taxonomic Survey
Yu-Neng Chuang
Guanchu Wang
Fan Yang
Zirui Liu
Xuanting Cai
Mengnan Du
Helen Zhou
74
34
0
07 Feb 2023
Effectiveness of Moving Target Defenses for Adversarial Attacks in
  ML-based Malware Detection
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
53
2
0
01 Feb 2023
Identifying Adversarially Attackable and Robust Samples
Identifying Adversarially Attackable and Robust Samples
Vyas Raina
Mark Gales
AAML
79
3
0
30 Jan 2023
Uncovering Adversarial Risks of Test-Time Adaptation
Uncovering Adversarial Risks of Test-Time Adaptation
Tong Wu
Feiran Jia
Xiangyu Qi
Jiachen T. Wang
Vikash Sehwag
Saeed Mahloujifar
Prateek Mittal
AAMLTTA
116
9
0
29 Jan 2023
A Comparative Study of Image Disguising Methods for Confidential
  Outsourced Learning
A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning
Sagar Sharma
Yuechun Gu
Keke Chen
60
0
0
31 Dec 2022
GAN-based Domain Inference Attack
GAN-based Domain Inference Attack
Yuechun Gu
Keke Chen
48
11
0
22 Dec 2022
DISCO: Adversarial Defense with Local Implicit Functions
DISCO: Adversarial Defense with Local Implicit Functions
Chih-Hui Ho
Nuno Vasconcelos
AAML
128
39
0
11 Dec 2022
Enhancing Quantum Adversarial Robustness by Randomized Encodings
Enhancing Quantum Adversarial Robustness by Randomized Encodings
Weiyuan Gong
D. Yuan
Weikang Li
D. Deng
AAML
103
19
0
05 Dec 2022
Understanding the Vulnerability of Skeleton-based Human Activity
  Recognition via Black-box Attack
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack
Yunfeng Diao
He Wang
Tianjia Shao
Yong-Liang Yang
Kun Zhou
David C. Hogg
Meng Wang
AAML
71
7
0
21 Nov 2022
DualApp: Tight Over-Approximation for Neural Network Robustness
  Verification via Under-Approximation
DualApp: Tight Over-Approximation for Neural Network Robustness Verification via Under-Approximation
Yiting Wu
Zhaodi Zhang
Zhiyi Xue
Si Liu
Hao Fei
AAML
51
0
0
21 Nov 2022
PrivacyProber: Assessment and Detection of Soft-Biometric
  Privacy-Enhancing Techniques
PrivacyProber: Assessment and Detection of Soft-Biometric Privacy-Enhancing Techniques
Peter Rot
Peter Peer
Vitomir vStruc
PICV
38
12
0
16 Nov 2022
Robust DNN Surrogate Models with Uncertainty Quantification via
  Adversarial Training
Robust DNN Surrogate Models with Uncertainty Quantification via Adversarial Training
Lixiang Zhang
Jia Li
AAML
74
0
0
10 Nov 2022
Visually Adversarial Attacks and Defenses in the Physical World: A
  Survey
Visually Adversarial Attacks and Defenses in the Physical World: A Survey
Xingxing Wei
Bangzheng Pu
Jiefan Lu
Baoyuan Wu
AAML
135
11
0
03 Nov 2022
Ares: A System-Oriented Wargame Framework for Adversarial ML
Ares: A System-Oriented Wargame Framework for Adversarial ML
Farhan Ahmed
Pratik Vaishnavi
Kevin Eykholt
Amir Rahmati
AAML
70
7
0
24 Oct 2022
Scaling Laws for Reward Model Overoptimization
Scaling Laws for Reward Model Overoptimization
Leo Gao
John Schulman
Jacob Hilton
ALM
128
569
0
19 Oct 2022
Machine Generated Text: A Comprehensive Survey of Threat Models and
  Detection Methods
Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods
Evan Crothers
Nathalie Japkowicz
H. Viktor
DeLMO
142
113
0
13 Oct 2022
Efficient Adversarial Training without Attacking: Worst-Case-Aware
  Robust Reinforcement Learning
Efficient Adversarial Training without Attacking: Worst-Case-Aware Robust Reinforcement Learning
Yongyuan Liang
Yanchao Sun
Ruijie Zheng
Furong Huang
OODAAMLOffRL
48
50
0
12 Oct 2022
On Optimal Learning Under Targeted Data Poisoning
On Optimal Learning Under Targeted Data Poisoning
Steve Hanneke
Amin Karbasi
Mohammad Mahmoody
Idan Mehalel
Shay Moran
AAMLFedML
54
8
0
06 Oct 2022
A Comprehensive Review of Trends, Applications and Challenges In
  Out-of-Distribution Detection
A Comprehensive Review of Trends, Applications and Challenges In Out-of-Distribution Detection
Navid Ghassemi
E. F. Ersi
AAMLOODD
88
4
0
26 Sep 2022
PINCH: An Adversarial Extraction Attack Framework for Deep Learning
  Models
PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models
William Hackett
Stefan Trawicki
Zhengxin Yu
N. Suri
Peter Garraghan
MIACVAAML
37
3
0
13 Sep 2022
Data Provenance via Differential Auditing
Data Provenance via Differential Auditing
Xin Mu
Ming Pang
Feida Zhu
36
1
0
04 Sep 2022
Affective Manifolds: Modeling Machine's Mind to Like, Dislike, Enjoy,
  Suffer, Worry, Fear, and Feel Like A Human
Affective Manifolds: Modeling Machine's Mind to Like, Dislike, Enjoy, Suffer, Worry, Fear, and Feel Like A Human
Benyamin Ghojogh
41
1
0
29 Aug 2022
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Yisroel Mirsky
50
2
0
17 Aug 2022
Previous
1234567
Next