ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.08072
  4. Cited By
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

17 September 2019
Han Xu
Yao Ma
Haochen Liu
Debayan Deb
Hui Liu
Jiliang Tang
Anil K. Jain
    AAML
ArXivPDFHTML

Papers citing "Adversarial Attacks and Defenses in Images, Graphs and Text: A Review"

50 / 70 papers shown
Title
REVEAL: Multi-turn Evaluation of Image-Input Harms for Vision LLM
REVEAL: Multi-turn Evaluation of Image-Input Harms for Vision LLM
Madhur Jindal
Saurabh Deshpande
AAML
43
0
0
07 May 2025
Fast Adversarial Training with Weak-to-Strong Spatial-Temporal Consistency in the Frequency Domain on Videos
Fast Adversarial Training with Weak-to-Strong Spatial-Temporal Consistency in the Frequency Domain on Videos
Songping Wang
Hanqing Liu
Yueming Lyu
Xiantao Hu
Ziwen He
W. Wang
Caifeng Shan
L. Wang
AAML
42
0
0
21 Apr 2025
LaDTalk: Latent Denoising for Synthesizing Talking Head Videos with High Frequency Details
LaDTalk: Latent Denoising for Synthesizing Talking Head Videos with High Frequency Details
Jian Yang
Xukun Wang
Wentao Wang
Guoming Li
Qihang Fang
Ruihong Yuan
Tianyang Wang
Jason Zhaoxin Fan
Yeying Jin
Zhaoxin Fan
VGen
41
1
0
01 Oct 2024
ID-Free Not Risk-Free: LLM-Powered Agents Unveil Risks in ID-Free Recommender Systems
ID-Free Not Risk-Free: LLM-Powered Agents Unveil Risks in ID-Free Recommender Systems
Z. Wang
Min Gao
Junliang Yu
Xinyi Gao
Quoc Viet Hung Nguyen
S. Sadiq
Hongzhi Yin
AAML
34
3
0
18 Sep 2024
Evaluating Model Robustness Using Adaptive Sparse L0 Regularization
Evaluating Model Robustness Using Adaptive Sparse L0 Regularization
Weiyou Liu
Zhenyang Li
Weitong Chen
AAML
20
1
0
28 Aug 2024
On Feasibility of Intent Obfuscating Attacks
On Feasibility of Intent Obfuscating Attacks
Zhaobin Li
Patrick Shafto
AAML
24
0
0
22 Jul 2024
Adversarial Evasion Attack Efficiency against Large Language Models
Adversarial Evasion Attack Efficiency against Large Language Models
João Vitorino
Eva Maia
Isabel Praça
AAML
31
2
0
12 Jun 2024
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited
  Black-box Scenario
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Renyang Liu
Kwok-Yan Lam
Wei Zhou
Sixing Wu
Jun Zhao
Dongting Hu
Mingming Gong
AAML
24
0
0
30 Mar 2024
Benchmarking the Robustness of Temporal Action Detection Models Against
  Temporal Corruptions
Benchmarking the Robustness of Temporal Action Detection Models Against Temporal Corruptions
Runhao Zeng
Xiaoyong Chen
Jiaming Liang
Huisi Wu
Guangzhong Cao
Yong Guo
AAML
32
3
0
29 Mar 2024
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
53
3
0
20 Nov 2023
On existence, uniqueness and scalability of adversarial robustness
  measures for AI classifiers
On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers
I. Horenko
AAML
13
2
0
19 Oct 2023
Evading Detection Actively: Toward Anti-Forensics against Forgery
  Localization
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
Long Zhuo
Shenghai Luo
Shunquan Tan
Han Chen
Bin Li
Jiwu Huang
AAML
24
0
0
16 Oct 2023
Robustified ANNs Reveal Wormholes Between Human Category Percepts
Robustified ANNs Reveal Wormholes Between Human Category Percepts
Guy Gaziv
Michael J. Lee
J. DiCarlo
AAML
10
6
0
14 Aug 2023
Face Encryption via Frequency-Restricted Identity-Agnostic Attacks
Xinjie Dong
Rui Wang
Siyuan Liang
Aishan Liu
Lihua Jing
AAML
PICV
24
8
0
11 Aug 2023
The GANfather: Controllable generation of malicious activity to improve
  defence systems
The GANfather: Controllable generation of malicious activity to improve defence systems
Ricardo Pereira
Jacopo Bono
João Tiago Ascensão
David Oliveira Aparício
Pedro Ribeiro
P. Bizarro
AAML
21
2
0
25 Jul 2023
Robust Ranking Explanations
Robust Ranking Explanations
Chao Chen
Chenghua Guo
Guixiang Ma
Ming Zeng
Xi Zhang
Sihong Xie
FAtt
AAML
25
0
0
08 Jul 2023
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A
  Survey
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey
Hanieh Naderi
Ivan V. Bajić
3DPC
19
7
0
01 Jul 2023
Graph-based methods coupled with specific distributional distances for
  adversarial attack detection
Graph-based methods coupled with specific distributional distances for adversarial attack detection
dwight nwaigwe
Lucrezia Carboni
Martial Mermillod
Sophie Achard
M. Dojat
AAML
19
3
0
31 May 2023
A Survey of Safety and Trustworthiness of Large Language Models through
  the Lens of Verification and Validation
A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation
Xiaowei Huang
Wenjie Ruan
Wei Huang
Gao Jin
Yizhen Dong
...
Sihao Wu
Peipei Xu
Dengyu Wu
André Freitas
Mustafa A. Mustafa
ALM
27
81
0
19 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks &
  Defenses
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
30
48
0
18 May 2023
Implementing Responsible AI: Tensions and Trade-Offs Between Ethics
  Aspects
Implementing Responsible AI: Tensions and Trade-Offs Between Ethics Aspects
Conrad Sanderson
David M. Douglas
Qinghua Lu
29
11
0
17 Apr 2023
Towards Reasonable Budget Allocation in Untargeted Graph Structure
  Attacks via Gradient Debias
Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias
Zihan Liu
Yun Luo
Lirong Wu
Zicheng Liu
Stan Z. Li
AAML
8
25
0
29 Mar 2023
Continual Graph Learning: A Survey
Continual Graph Learning: A Survey
Qiao Yuan
S. Guan
Pin Ni
Tianlun Luo
Ka Lok Man
Prudence W. H. Wong
Victor I. Chang
CLL
24
14
0
28 Jan 2023
Adversarial AI in Insurance: Pervasiveness and Resilience
Adversarial AI in Insurance: Pervasiveness and Resilience
E. Luciano
Matteo Cattaneo
Ron S. Kenett
AAML
16
1
0
17 Jan 2023
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting
  Models
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models
F. Liu
Haowen Liu
Wenzhao Jiang
OOD
64
33
0
05 Oct 2022
A Comprehensive Review of Trends, Applications and Challenges In
  Out-of-Distribution Detection
A Comprehensive Review of Trends, Applications and Challenges In Out-of-Distribution Detection
Navid Ghassemi
E. F. Ersi
AAML
OODD
13
4
0
26 Sep 2022
Synthetic Data in Human Analysis: A Survey
Synthetic Data in Human Analysis: A Survey
Indu Joshi
Marcel Grimmer
Christian Rathgeb
Christoph Busch
F. Brémond
A. Dantcheva
20
46
0
19 Aug 2022
Almost-Orthogonal Layers for Efficient General-Purpose Lipschitz
  Networks
Almost-Orthogonal Layers for Efficient General-Purpose Lipschitz Networks
Bernd Prach
Christoph H. Lampert
30
35
0
05 Aug 2022
Distributed Adversarial Training to Robustify Deep Neural Networks at
  Scale
Distributed Adversarial Training to Robustify Deep Neural Networks at Scale
Gaoyuan Zhang
Songtao Lu
Yihua Zhang
Xiangyi Chen
Pin-Yu Chen
Quanfu Fan
Lee Martie
L. Horesh
Min-Fong Hong
Sijia Liu
OOD
22
12
0
13 Jun 2022
Face Verification Bypass
Face Verification Bypass
Sanjana Sarda
CVBM
16
0
0
28 Mar 2022
Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML
  Systems
Attacks, Defenses, And Tools: A Framework To Facilitate Robust AI/ML Systems
Mohamad Fazelnia
I. Khokhlov
Mehdi Mirakhorli
AAML
16
5
0
18 Feb 2022
Adversarial Attacks and Defense Methods for Power Quality Recognition
Adversarial Attacks and Defense Methods for Power Quality Recognition
Jiwei Tian
Buhong Wang
Jing Li
Zhen Wang
Mete Ozay
AAML
10
0
0
11 Feb 2022
Robust Graph Representation Learning for Local Corruption Recovery
Robust Graph Representation Learning for Local Corruption Recovery
Bingxin Zhou
Yuanhong Jiang
Yu Guang Wang
Jingwei Liang
Junbin Gao
Shirui Pan
Xiaoqun Zhang
OOD
28
12
0
10 Feb 2022
Post-Training Detection of Backdoor Attacks for Two-Class and
  Multi-Attack Scenarios
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Zhen Xiang
David J. Miller
G. Kesidis
AAML
12
46
0
20 Jan 2022
Model Stealing Attacks Against Inductive Graph Neural Networks
Model Stealing Attacks Against Inductive Graph Neural Networks
Yun Shen
Xinlei He
Yufei Han
Yang Zhang
14
60
0
15 Dec 2021
Poisoning Knowledge Graph Embeddings via Relation Inference Patterns
Poisoning Knowledge Graph Embeddings via Relation Inference Patterns
Peru Bhardwaj
John D. Kelleher
Luca Costabello
Declan O’Sullivan
56
20
0
11 Nov 2021
Adversarial Attacks on Knowledge Graph Embeddings via Instance
  Attribution Methods
Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods
Peru Bhardwaj
John D. Kelleher
Luca Costabello
Declan O’Sullivan
10
20
0
04 Nov 2021
Multi-Glimpse Network: A Robust and Efficient Classification
  Architecture based on Recurrent Downsampled Attention
Multi-Glimpse Network: A Robust and Efficient Classification Architecture based on Recurrent Downsampled Attention
S. Tan
Runpei Dong
Kaisheng Ma
20
2
0
03 Nov 2021
Multi-concept adversarial attacks
Multi-concept adversarial attacks
Vibha Belavadi
Yan Zhou
Murat Kantarcioglu
B. Thuraisingham
AAML
17
0
0
19 Oct 2021
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural
  Networks
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
C. Amarnath
Aishwarya H. Balwani
Kwondo Ma
Abhijit Chatterjee
AAML
11
3
0
16 Oct 2021
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text
  Style Transfer
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Fanchao Qi
Yangyi Chen
Xurui Zhang
Mukai Li
Zhiyuan Liu
Maosong Sun
AAML
SILM
77
175
0
14 Oct 2021
Introducing the DOME Activation Functions
Introducing the DOME Activation Functions
Mohamed E. Hussein
Wael AbdAlmageed
22
1
0
30 Sep 2021
Jointly Attacking Graph Neural Network and its Explanations
Jointly Attacking Graph Neural Network and its Explanations
Wenqi Fan
Wei Jin
Xiaorui Liu
Han Xu
Xianfeng Tang
Suhang Wang
Qing Li
Jiliang Tang
Jianping Wang
Charu C. Aggarwal
AAML
27
28
0
07 Aug 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Saeed Mian
Navid Kardan
M. Shah
AAML
22
234
0
01 Aug 2021
Imbalanced Adversarial Training with Reweighting
Imbalanced Adversarial Training with Reweighting
Wentao Wang
Han Xu
Xiaorui Liu
Yaxin Li
B. Thuraisingham
Jiliang Tang
17
16
0
28 Jul 2021
Survey: Leakage and Privacy at Inference Time
Survey: Leakage and Privacy at Inference Time
Marija Jegorova
Chaitanya Kaul
Charlie Mayor
Alison Q. OÑeil
Alexander Weir
Roderick Murray-Smith
Sotirios A. Tsaftaris
PILM
MIACV
17
71
0
04 Jul 2021
Localized Uncertainty Attacks
Localized Uncertainty Attacks
Ousmane Amadou Dia
Theofanis Karaletsos
C. Hazirbas
Cristian Canton Ferrer
I. Kabul
E. Meijer
AAML
19
2
0
17 Jun 2021
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure
  DNN Accelerators
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
AAML
MQ
17
18
0
16 Apr 2021
Mitigating Adversarial Attack for Compute-in-Memory Accelerator
  Utilizing On-chip Finetune
Mitigating Adversarial Attack for Compute-in-Memory Accelerator Utilizing On-chip Finetune
Shanshi Huang
Hongwu Jiang
Shimeng Yu
AAML
20
3
0
13 Apr 2021
A Backdoor Attack against 3D Point Cloud Classifiers
A Backdoor Attack against 3D Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPC
AAML
19
76
0
12 Apr 2021
12
Next