ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.08072
  4. Cited By
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

17 September 2019
Han Xu
Yao Ma
Haochen Liu
Debayan Deb
Hui Liu
Jiliang Tang
Anil K. Jain
    AAML
ArXivPDFHTML

Papers citing "Adversarial Attacks and Defenses in Images, Graphs and Text: A Review"

50 / 58 papers shown
Title
REVEAL: Multi-turn Evaluation of Image-Input Harms for Vision LLM
REVEAL: Multi-turn Evaluation of Image-Input Harms for Vision LLM
Madhur Jindal
Saurabh Deshpande
AAML
43
0
0
07 May 2025
Fast Adversarial Training with Weak-to-Strong Spatial-Temporal Consistency in the Frequency Domain on Videos
Fast Adversarial Training with Weak-to-Strong Spatial-Temporal Consistency in the Frequency Domain on Videos
Songping Wang
Hanqing Liu
Yueming Lyu
Xiantao Hu
Ziwen He
W. Wang
Caifeng Shan
L. Wang
AAML
39
0
0
21 Apr 2025
LaDTalk: Latent Denoising for Synthesizing Talking Head Videos with High Frequency Details
LaDTalk: Latent Denoising for Synthesizing Talking Head Videos with High Frequency Details
Jian Yang
Xukun Wang
Wentao Wang
Guoming Li
Qihang Fang
Ruihong Yuan
Tianyang Wang
Jason Zhaoxin Fan
Yeying Jin
Zhaoxin Fan
VGen
41
1
0
01 Oct 2024
ID-Free Not Risk-Free: LLM-Powered Agents Unveil Risks in ID-Free Recommender Systems
ID-Free Not Risk-Free: LLM-Powered Agents Unveil Risks in ID-Free Recommender Systems
Z. Wang
Min Gao
Junliang Yu
Xinyi Gao
Quoc Viet Hung Nguyen
S. Sadiq
Hongzhi Yin
AAML
34
3
0
18 Sep 2024
Evaluating Model Robustness Using Adaptive Sparse L0 Regularization
Evaluating Model Robustness Using Adaptive Sparse L0 Regularization
Weiyou Liu
Zhenyang Li
Weitong Chen
AAML
20
1
0
28 Aug 2024
On Feasibility of Intent Obfuscating Attacks
On Feasibility of Intent Obfuscating Attacks
Zhaobin Li
Patrick Shafto
AAML
24
0
0
22 Jul 2024
Adversarial Evasion Attack Efficiency against Large Language Models
Adversarial Evasion Attack Efficiency against Large Language Models
João Vitorino
Eva Maia
Isabel Praça
AAML
31
2
0
12 Jun 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited
  Black-box Scenario
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Renyang Liu
Kwok-Yan Lam
Wei Zhou
Sixing Wu
Jun Zhao
Dongting Hu
Mingming Gong
AAML
24
0
0
30 Mar 2024
Benchmarking the Robustness of Temporal Action Detection Models Against
  Temporal Corruptions
Benchmarking the Robustness of Temporal Action Detection Models Against Temporal Corruptions
Runhao Zeng
Xiaoyong Chen
Jiaming Liang
Huisi Wu
Guangzhong Cao
Yong Guo
AAML
32
3
0
29 Mar 2024
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
51
3
0
20 Nov 2023
On existence, uniqueness and scalability of adversarial robustness
  measures for AI classifiers
On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers
I. Horenko
AAML
11
2
0
19 Oct 2023
Evading Detection Actively: Toward Anti-Forensics against Forgery
  Localization
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Long Zhuo
Shenghai Luo
Shunquan Tan
Han Chen
Bin Li
Jiwu Huang
AAML
18
0
0
16 Oct 2023
Robustified ANNs Reveal Wormholes Between Human Category Percepts
Robustified ANNs Reveal Wormholes Between Human Category Percepts
Guy Gaziv
Michael J. Lee
J. DiCarlo
AAML
8
6
0
14 Aug 2023
Face Encryption via Frequency-Restricted Identity-Agnostic Attacks
Xinjie Dong
Rui Wang
Siyuan Liang
Aishan Liu
Lihua Jing
AAML
PICV
24
8
0
11 Aug 2023
The GANfather: Controllable generation of malicious activity to improve
  defence systems
The GANfather: Controllable generation of malicious activity to improve defence systems
Ricardo Pereira
Jacopo Bono
João Tiago Ascensão
David Oliveira Aparício
Pedro Ribeiro
P. Bizarro
AAML
21
2
0
25 Jul 2023
Robust Ranking Explanations
Robust Ranking Explanations
Chao Chen
Chenghua Guo
Guixiang Ma
Ming Zeng
Xi Zhang
Sihong Xie
FAtt
AAML
25
0
0
08 Jul 2023
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A
  Survey
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey
Hanieh Naderi
Ivan V. Bajić
3DPC
19
7
0
01 Jul 2023
Graph-based methods coupled with specific distributional distances for
  adversarial attack detection
Graph-based methods coupled with specific distributional distances for adversarial attack detection
dwight nwaigwe
Lucrezia Carboni
Martial Mermillod
Sophie Achard
M. Dojat
AAML
19
3
0
31 May 2023
A Survey of Safety and Trustworthiness of Large Language Models through
  the Lens of Verification and Validation
A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation
Xiaowei Huang
Wenjie Ruan
Wei Huang
Gao Jin
Yizhen Dong
...
Sihao Wu
Peipei Xu
Dengyu Wu
André Freitas
Mustafa A. Mustafa
ALM
27
81
0
19 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
30
47
0
18 May 2023
Implementing Responsible AI: Tensions and Trade-Offs Between Ethics
  Aspects
Implementing Responsible AI: Tensions and Trade-Offs Between Ethics Aspects
Conrad Sanderson
David M. Douglas
Qinghua Lu
22
11
0
17 Apr 2023
Adversarial AI in Insurance: Pervasiveness and Resilience
Adversarial AI in Insurance: Pervasiveness and Resilience
E. Luciano
Matteo Cattaneo
Ron S. Kenett
AAML
14
1
0
17 Jan 2023
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting
  Models
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models
F. Liu
Haowen Liu
Wenzhao Jiang
OOD
64
33
0
05 Oct 2022
Synthetic Data in Human Analysis: A Survey
Synthetic Data in Human Analysis: A Survey
Indu Joshi
Marcel Grimmer
Christian Rathgeb
Christoph Busch
F. Brémond
A. Dantcheva
20
46
0
19 Aug 2022
Almost-Orthogonal Layers for Efficient General-Purpose Lipschitz
  Networks
Almost-Orthogonal Layers for Efficient General-Purpose Lipschitz Networks
Bernd Prach
Christoph H. Lampert
30
35
0
05 Aug 2022
Distributed Adversarial Training to Robustify Deep Neural Networks at
  Scale
Distributed Adversarial Training to Robustify Deep Neural Networks at Scale
Gaoyuan Zhang
Songtao Lu
Yihua Zhang
Xiangyi Chen
Pin-Yu Chen
Quanfu Fan
Lee Martie
L. Horesh
Min-Fong Hong
Sijia Liu
OOD
22
12
0
13 Jun 2022
Face Verification Bypass
Face Verification Bypass
Sanjana Sarda
CVBM
14
0
0
28 Mar 2022
Robust Graph Representation Learning for Local Corruption Recovery
Robust Graph Representation Learning for Local Corruption Recovery
Bingxin Zhou
Yuanhong Jiang
Yu Guang Wang
Jingwei Liang
Junbin Gao
Shirui Pan
Xiaoqun Zhang
OOD
28
12
0
10 Feb 2022
Model Stealing Attacks Against Inductive Graph Neural Networks
Model Stealing Attacks Against Inductive Graph Neural Networks
Yun Shen
Xinlei He
Yufei Han
Yang Zhang
14
60
0
15 Dec 2021
Adversarial Attacks on Knowledge Graph Embeddings via Instance
  Attribution Methods
Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods
Peru Bhardwaj
John D. Kelleher
Luca Costabello
Declan O’Sullivan
8
20
0
04 Nov 2021
Multi-Glimpse Network: A Robust and Efficient Classification
  Architecture based on Recurrent Downsampled Attention
Multi-Glimpse Network: A Robust and Efficient Classification Architecture based on Recurrent Downsampled Attention
S. Tan
Runpei Dong
Kaisheng Ma
17
2
0
03 Nov 2021
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural
  Networks
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
C. Amarnath
Aishwarya H. Balwani
Kwondo Ma
Abhijit Chatterjee
AAML
11
3
0
16 Oct 2021
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text
  Style Transfer
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Fanchao Qi
Yangyi Chen
Xurui Zhang
Mukai Li
Zhiyuan Liu
Maosong Sun
AAML
SILM
77
171
0
14 Oct 2021
Introducing the DOME Activation Functions
Introducing the DOME Activation Functions
Mohamed E. Hussein
Wael AbdAlmageed
20
1
0
30 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
22
234
0
01 Aug 2021
Survey: Leakage and Privacy at Inference Time
Survey: Leakage and Privacy at Inference Time
Marija Jegorova
Chaitanya Kaul
Charlie Mayor
Alison Q. OÑeil
Alexander Weir
Roderick Murray-Smith
Sotirios A. Tsaftaris
PILM
MIACV
17
71
0
04 Jul 2021
Localized Uncertainty Attacks
Localized Uncertainty Attacks
Ousmane Amadou Dia
Theofanis Karaletsos
C. Hazirbas
Cristian Canton Ferrer
I. Kabul
E. Meijer
AAML
17
2
0
17 Jun 2021
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure
  DNN Accelerators
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
AAML
MQ
12
18
0
16 Apr 2021
Mitigating Adversarial Attack for Compute-in-Memory Accelerator
  Utilizing On-chip Finetune
Mitigating Adversarial Attack for Compute-in-Memory Accelerator Utilizing On-chip Finetune
Shanshi Huang
Hongwu Jiang
Shimeng Yu
AAML
18
3
0
13 Apr 2021
A Backdoor Attack against 3D Point Cloud Classifiers
A Backdoor Attack against 3D Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPC
AAML
17
75
0
12 Apr 2021
Relating Adversarially Robust Generalization to Flat Minima
Relating Adversarially Robust Generalization to Flat Minima
David Stutz
Matthias Hein
Bernt Schiele
OOD
11
65
0
09 Apr 2021
The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review
  of Applications, Techniques, Challenges, and Future Research Directions
The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review of Applications, Techniques, Challenges, and Future Research Directions
Senthil Kumar Jagatheesaperumal
Mohamed Rahouti
Kashif Ahmad
Ala I. Al-Fuqaha
M. Guizani
AI4CE
16
19
0
06 Apr 2021
Robust Vision-Based Cheat Detection in Competitive Gaming
Robust Vision-Based Cheat Detection in Competitive Gaming
Aditya Jonnalagadda
I. Frosio
Seth Schneider
M. McGuire
Joohwan Kim
AAML
24
15
0
18 Mar 2021
Towards Adversarial-Resilient Deep Neural Networks for False Data
  Injection Attack Detection in Power Grids
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Hairong Qi
AAML
13
14
0
17 Feb 2021
Achieving Adversarial Robustness Requires An Active Teacher
Achieving Adversarial Robustness Requires An Active Teacher
Chao Ma
Lexing Ying
16
1
0
14 Dec 2020
Can Adversarial Weight Perturbations Inject Neural Backdoors?
Can Adversarial Weight Perturbations Inject Neural Backdoors?
Siddhant Garg
Adarsh Kumar
Vibhor Goel
Yingyu Liang
AAML
17
86
0
04 Aug 2020
Adversarial Example Games
Adversarial Example Games
A. Bose
Gauthier Gidel
Hugo Berrard
Andre Cianflone
Pascal Vincent
Simon Lacoste-Julien
William L. Hamilton
AAML
GAN
23
51
0
01 Jul 2020
Differentiable Language Model Adversarial Attacks on Categorical
  Sequence Classifiers
Differentiable Language Model Adversarial Attacks on Categorical Sequence Classifiers
I. Fursov
A. Zaytsev
Nikita Klyuchnikov
A. Kravchenko
E. Burnaev
AAML
SILM
16
5
0
19 Jun 2020
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses
Yaxin Li
Wei Jin
Han Xu
Jiliang Tang
AAML
9
128
0
13 May 2020
Learning to fool the speaker recognition
Learning to fool the speaker recognition
Jiguo Li
Xinfeng Zhang
Jizheng Xu
Li Zhang
Y. Wang
Siwei Ma
Wen Gao
AAML
22
21
0
07 Apr 2020
12
Next