ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1810.00069
  4. Cited By
Adversarial Attacks and Defences: A Survey

Adversarial Attacks and Defences: A Survey

28 September 2018
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
    AAMLOOD
ArXiv (abs)PDFHTML

Papers citing "Adversarial Attacks and Defences: A Survey"

50 / 330 papers shown
Title
Adversarial Machine Learning in Text Analysis and Generation
Adversarial Machine Learning in Text Analysis and Generation
I. Alsmadi
AAML
112
5
0
14 Jan 2021
Adversarial Attack Attribution: Discovering Attributable Signals in
  Adversarial ML Attacks
Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks
Marissa Dotter
Sherry Xie
Keith Manville
Josh Harguess
Colin Busho
Mikel Rodriguez
AAML
37
2
0
08 Jan 2021
Socially Responsible AI Algorithms: Issues, Purposes, and Challenges
Socially Responsible AI Algorithms: Issues, Purposes, and Challenges
Lu Cheng
Kush R. Varshney
Huan Liu
FaML
157
152
0
01 Jan 2021
Generating Adversarial Examples in Chinese Texts Using Sentence-Pieces
Generating Adversarial Examples in Chinese Texts Using Sentence-Pieces
Linyang Li
Yunfan Shao
Demin Song
Xipeng Qiu
Xuanjing Huang
AAMLGAN
40
7
0
29 Dec 2020
Image Synthesis with Adversarial Networks: a Comprehensive Survey and
  Case Studies
Image Synthesis with Adversarial Networks: a Comprehensive Survey and Case Studies
Pourya Shamsolmoali
Masoumeh Zareapoor
Eric Granger
Huiyu Zhou
Ruili Wang
M. E. Celebi
Jie Yang
EGVM
124
142
0
26 Dec 2020
Exacerbating Algorithmic Bias through Fairness Attacks
Exacerbating Algorithmic Bias through Fairness Attacks
Ninareh Mehrabi
Muhammad Naveed
Fred Morstatter
Aram Galstyan
AAML
91
69
0
16 Dec 2020
A case for new neural network smoothness constraints
A case for new neural network smoothness constraints
Mihaela Rosca
T. Weber
Arthur Gretton
S. Mohamed
AAML
133
50
0
14 Dec 2020
An Empirical Review of Adversarial Defenses
An Empirical Review of Adversarial Defenses
Ayush Goel
AAML
32
0
0
10 Dec 2020
From a Fourier-Domain Perspective on Adversarial Examples to a Wiener
  Filter Defense for Semantic Segmentation
From a Fourier-Domain Perspective on Adversarial Examples to a Wiener Filter Defense for Semantic Segmentation
Nikhil Kapoor
Andreas Bär
Serin Varghese
Jan David Schneider
Fabian Hüger
Peter Schlicht
Tim Fingscheidt
AAML
64
10
0
02 Dec 2020
Spatially Correlated Patterns in Adversarial Images
Spatially Correlated Patterns in Adversarial Images
Nandish Chattopadhyay
Lionell Yip En Zhi
Bryan Tan Bing Xing
Anupam Chattopadhyay
AAML
30
2
0
21 Nov 2020
A Black-Box Attack Model for Visually-Aware Recommender Systems
A Black-Box Attack Model for Visually-Aware Recommender Systems
Rami Cohen
Oren Sar Shalom
Dietmar Jannach
A. Amir
50
28
0
05 Nov 2020
GreedyFool: Distortion-Aware Sparse Adversarial Attack
GreedyFool: Distortion-Aware Sparse Adversarial Attack
Xiaoyi Dong
Dongdong Chen
Jianmin Bao
Chuan Qin
Lu Yuan
Weiming Zhang
Nenghai Yu
Dong Chen
AAML
67
63
0
26 Oct 2020
Asymptotic Behavior of Adversarial Training in Binary Classification
Asymptotic Behavior of Adversarial Training in Binary Classification
Hossein Taheri
Ramtin Pedarsani
Christos Thrampoulidis
AAML
79
16
0
26 Oct 2020
Dynamic Adversarial Patch for Evading Object Detection Models
Dynamic Adversarial Patch for Evading Object Detection Models
Shahar Hoory
T. Shapira
A. Shabtai
Yuval Elovici
AAML
80
41
0
25 Oct 2020
Contrastive Learning with Adversarial Examples
Contrastive Learning with Adversarial Examples
Chih-Hui Ho
Nuno Vasconcelos
SSL
92
142
0
22 Oct 2020
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz
Nur Imtiazul Haque
A. Sikder
M. Rahman
A. S. Uluagac
AAML
87
72
0
07 Oct 2020
Global Optimization of Objective Functions Represented by ReLU Networks
Global Optimization of Objective Functions Represented by ReLU Networks
Christopher A. Strong
Haoze Wu
Aleksandar Zeljić
Kyle D. Julian
Guy Katz
Clark W. Barrett
Mykel J. Kochenderfer
AAML
57
33
0
07 Oct 2020
Second-Order NLP Adversarial Examples
Second-Order NLP Adversarial Examples
John X. Morris
AAML
40
0
0
05 Oct 2020
Query complexity of adversarial attacks
Query complexity of adversarial attacks
Grzegorz Gluch
R. Urbanke
AAML
56
5
0
02 Oct 2020
Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning
  Attacks
Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks
U. Shanthamallu
Jayaraman J. Thiagarajan
A. Spanias
AAML
52
16
0
30 Sep 2020
Crafting Adversarial Examples for Deep Learning Based Prognostics
  (Extended Version)
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Gautam Raj Mode
K. A. Hoque
AAML
66
19
0
21 Sep 2020
Information Laundering for Model Privacy
Information Laundering for Model Privacy
Xinran Wang
Yu Xiang
Jun Gao
Jie Ding
34
24
0
13 Sep 2020
SoK: Certified Robustness for Deep Neural Networks
SoK: Certified Robustness for Deep Neural Networks
Linyi Li
Tao Xie
Yue Liu
AAML
123
131
0
09 Sep 2020
Adversarial Machine Learning in Image Classification: A Survey Towards
  the Defender's Perspective
Adversarial Machine Learning in Image Classification: A Survey Towards the Defender's Perspective
G. R. Machado
Eugênio Silva
R. Goldschmidt
AAML
134
162
0
08 Sep 2020
Black Box to White Box: Discover Model Characteristics Based on
  Strategic Probing
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Josh Kalin
Matthew Ciolino
David Noever
Gerry V. Dozier
AAML
18
9
0
07 Sep 2020
Estimating the Brittleness of AI: Safety Integrity Levels and the Need
  for Testing Out-Of-Distribution Performance
Estimating the Brittleness of AI: Safety Integrity Levels and the Need for Testing Out-Of-Distribution Performance
A. Lohn
51
13
0
02 Sep 2020
An Adversarial Attack Defending System for Securing In-Vehicle Networks
An Adversarial Attack Defending System for Securing In-Vehicle Networks
Yi Li
Jing Lin
Kaiqi Xiong
AAML
94
16
0
25 Aug 2020
A Survey on Assessing the Generalization Envelope of Deep Neural
  Networks: Predictive Uncertainty, Out-of-distribution and Adversarial Samples
A Survey on Assessing the Generalization Envelope of Deep Neural Networks: Predictive Uncertainty, Out-of-distribution and Adversarial Samples
Julia Lust
Alexandru Paul Condurache
UQCVAAMLAI4CE
31
8
0
21 Aug 2020
Trust-Based Cloud Machine Learning Model Selection For Industrial IoT
  and Smart City Services
Trust-Based Cloud Machine Learning Model Selection For Industrial IoT and Smart City Services
Basheer Qolomany
Ihab Mohammed
Ala I. Al-Fuqaha
Mohsen Guizani
Junaid Qadir
42
36
0
11 Aug 2020
Optimizing Information Loss Towards Robust Neural Networks
Optimizing Information Loss Towards Robust Neural Networks
Philip Sperl
Konstantin Böttinger
AAML
45
3
0
07 Aug 2020
On Adversarial Robustness: A Neural Architecture Search perspective
On Adversarial Robustness: A Neural Architecture Search perspective
Chaitanya Devaguptapu
Devansh Agarwal
Gaurav Mittal
Pulkit Gopalani
V. Balasubramanian
OODAAML
68
34
0
16 Jul 2020
Data from Model: Extracting Data from Non-robust and Robust Models
Data from Model: Extracting Data from Non-robust and Robust Models
Philipp Benz
Chaoning Zhang
Tooba Imtiaz
In-So Kweon
65
7
0
13 Jul 2020
Generating Adversarial Inputs Using A Black-box Differential Technique
Generating Adversarial Inputs Using A Black-box Differential Technique
J. Matos
Lucas C. Cordeiro
Marcelo d’Amorim
Xiaowei Huang
AAML
21
0
0
10 Jul 2020
Learning while Respecting Privacy and Robustness to Distributional
  Uncertainties and Adversarial Data
Learning while Respecting Privacy and Robustness to Distributional Uncertainties and Adversarial Data
A. Sadeghi
Gang Wang
Meng Ma
G. Giannakis
OODFedML
24
4
0
07 Jul 2020
Decoder-free Robustness Disentanglement without (Additional) Supervision
Decoder-free Robustness Disentanglement without (Additional) Supervision
Yifei Wang
Dan Peng
Furui Liu
Zhenguo Li
Zhitang Chen
Jiansheng Yang
AAML
26
1
0
02 Jul 2020
Opportunities and Challenges in Deep Learning Adversarial Robustness: A
  Survey
Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey
S. Silva
Peyman Najafirad
AAMLOOD
99
135
0
01 Jul 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAMLGAN
100
52
0
01 Jul 2020
Determining Sequence of Image Processing Technique (IPT) to Detect
  Adversarial Attacks
Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Kishor Datta Gupta
Zahid Akhtar
D. Dasgupta
AAML
52
10
0
01 Jul 2020
Black-box Certification and Learning under Adversarial Perturbations
Black-box Certification and Learning under Adversarial Perturbations
H. Ashtiani
Vinayak Pathak
Ruth Urner
AAML
64
20
0
30 Jun 2020
REGroup: Rank-aggregating Ensemble of Generative Classifiers for Robust
  Predictions
REGroup: Rank-aggregating Ensemble of Generative Classifiers for Robust Predictions
Lokender Tiwari
Anish Madan
Saket Anand
Subhashis Banerjee
AAML
35
1
0
18 Jun 2020
Provable Training Set Debugging for Linear Regression
Provable Training Set Debugging for Linear Regression
Xiaomin Zhang
Xiaojin Zhu
Po-Ling Loh
53
0
0
16 Jun 2020
Towards AI Forensics: Did the Artificial Intelligence System Do It?
Towards AI Forensics: Did the Artificial Intelligence System Do It?
Johannes Schneider
Frank Breitinger
AAML
46
11
0
27 May 2020
Chat as Expected: Learning to Manipulate Black-box Neural Dialogue
  Models
Chat as Expected: Learning to Manipulate Black-box Neural Dialogue Models
Haochen Liu
Zhiwei Wang
Hanyu Wang
Jiliang Tang
AAML
95
15
0
27 May 2020
Arms Race in Adversarial Malware Detection: A Survey
Arms Race in Adversarial Malware Detection: A Survey
Deqiang Li
Qianmu Li
Yanfang Ye
Shouhuai Xu
AAML
103
52
0
24 May 2020
A survey on Adversarial Recommender Systems: from Attack/Defense
  strategies to Generative Adversarial Networks
A survey on Adversarial Recommender Systems: from Attack/Defense strategies to Generative Adversarial Networks
Yashar Deldjoo
Tommaso Di Noia
Felice Antonio Merra
AAML
41
6
0
20 May 2020
Attacking Recommender Systems with Augmented User Profiles
Attacking Recommender Systems with Augmented User Profiles
Chen Lin
Si Chen
Hui Li
Yanghua Xiao
Lianyun Li
Qiang Yang
AAML
72
83
0
17 May 2020
A Review of Computer Vision Methods in Network Security
A Review of Computer Vision Methods in Network Security
Jiawei Zhao
Rahat Masood
Suranga Seneviratne
AAML
44
48
0
07 May 2020
Generative Adversarial Networks (GANs Survey): Challenges, Solutions,
  and Future Directions
Generative Adversarial Networks (GANs Survey): Challenges, Solutions, and Future Directions
Divya Saxena
Jiannong Cao
AAMLAI4CE
156
305
0
30 Apr 2020
An Epistemic Approach to the Formal Specification of Statistical Machine
  Learning
An Epistemic Approach to the Formal Specification of Statistical Machine Learning
Yusuke Kawamoto
CML
23
5
0
27 Apr 2020
Privacy in Deep Learning: A Survey
Privacy in Deep Learning: A Survey
Fatemehsadat Mirshghallah
Mohammadkazem Taram
Praneeth Vepakomma
Abhishek Singh
Ramesh Raskar
H. Esmaeilzadeh
FedML
125
139
0
25 Apr 2020
Previous
1234567
Next