ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.08489
  4. Cited By
Do Adversarially Robust ImageNet Models Transfer Better?
v1v2 (latest)

Do Adversarially Robust ImageNet Models Transfer Better?

Neural Information Processing Systems (NeurIPS), 2020
16 July 2020
Hadi Salman
Andrew Ilyas
Logan Engstrom
Ashish Kapoor
Aleksander Madry
ArXiv (abs)PDFHTML

Papers citing "Do Adversarially Robust ImageNet Models Transfer Better?"

50 / 299 papers shown
Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division Areas
Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division AreasApplied Informatics (AI), 2025
Issa Oe
Keiichiro Yamamura
Hiroki Ishikura
Ryo Hamahira
Katsuki Fujisawa
AAML
477
1
0
29 Nov 2025
Toward Understanding the Transferability of Adversarial Suffixes in Large Language Models
Toward Understanding the Transferability of Adversarial Suffixes in Large Language Models
Sarah Ball
Niki Hasrati
Alexander Robey
Avi Schwarzschild
Frauke Kreuter
Zico Kolter
Andrej Risteski
AAML
344
0
0
24 Oct 2025
Revisiting the Relation Between Robustness and Universality
Revisiting the Relation Between Robustness and Universality
M. Klabunde
L. Caspari
F. Lemmerich
AAML
158
0
0
22 Oct 2025
Generalist++: A Meta-learning Framework for Mitigating Trade-off in Adversarial Training
Generalist++: A Meta-learning Framework for Mitigating Trade-off in Adversarial Training
Yisen Wang
Yichuan Mo
Hongjun Wang
Junyi Li
Zhouchen Lin
AAML
180
2
0
15 Oct 2025
Beyond Pixels: A Differentiable Pipeline for Probing Neuronal Selectivity in 3D
Beyond Pixels: A Differentiable Pipeline for Probing Neuronal Selectivity in 3D
Pavithra Elumalai
Mohammad Ali Bashiri
Goirik Chakrabarty
Polina Turishcheva
Fabian H. Sinz
3DV
141
1
0
15 Oct 2025
Scalable Energy-Based Models via Adversarial Training: Unifying Discrimination and Generation
Scalable Energy-Based Models via Adversarial Training: Unifying Discrimination and Generation
Xuwang Yin
Claire Zhang
Julie Steele
Nir Shavit
T. T. Wang
536
0
0
13 Oct 2025
Adversarial Examples Are Not Bugs, They Are Superposition
Adversarial Examples Are Not Bugs, They Are Superposition
Liv Gorton
Owen Lewis
AAML
262
8
0
24 Aug 2025
TAIGen: Training-Free Adversarial Image Generation via Diffusion Models
TAIGen: Training-Free Adversarial Image Generation via Diffusion Models
Susim Roy
Anubhooti Jain
Mayank Vatsa
Richa Singh
DiffMVLM
250
2
0
20 Aug 2025
DASH: A Meta-Attack Framework for Synthesizing Effective and Stealthy Adversarial Examples
DASH: A Meta-Attack Framework for Synthesizing Effective and Stealthy Adversarial Examples
Abdullah Al Nomaan Nafi
Habibur Rahaman
Zafaryab Haider
Tanzim Mahfuz
Fnu Suya
Swarup Bhunia
Prabuddha Chakraborty
AAML
238
2
0
18 Aug 2025
Theoretical Analysis of Relative Errors in Gradient Computations for Adversarial Attacks with CE Loss
Theoretical Analysis of Relative Errors in Gradient Computations for Adversarial Attacks with CE Loss
Yunrui Yu
Hang Su
Cheng-zhong Xu
Zhizhong Su
Jun Zhu
226
1
0
30 Jul 2025
Boosting Generative Adversarial Transferability with Self-supervised Vision Transformer Features
Boosting Generative Adversarial Transferability with Self-supervised Vision Transformer Features
Shangbo Wu
Yu-an Tan
Ruinan Ma
Wencong Ma
Dehua Zhu
Yuanzhang Li
ViT
267
3
0
26 Jun 2025
Stretching Beyond the Obvious: A Gradient-Free Framework to Unveil the Hidden Landscape of Visual Invariance
Stretching Beyond the Obvious: A Gradient-Free Framework to Unveil the Hidden Landscape of Visual Invariance
Lorenzo Tausani
P. Muratore
Morgan B. Talbot
Giacomo Amerio
Gabriel Kreiman
D. Zoccolan
AAML
274
0
0
20 Jun 2025
Exploring Visual Prompting: Robustness Inheritance and Beyond
Exploring Visual Prompting: Robustness Inheritance and Beyond
Qi Li
Liangzhi Li
Zhouqiang Jiang
Bowen Wang
Keke Tang
VPVLMVLM
256
0
0
07 Jun 2025
Towards Cross-Domain Multi-Targeted Adversarial Attacks
Towards Cross-Domain Multi-Targeted Adversarial Attacks
Taïga Gonçalves
Tomo Miyazaki
S. Omachi
OODAAML
431
0
0
27 May 2025
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation
Peiran Sun
AAML
359
0
0
25 May 2025
TAROT: Towards Essentially Domain-Invariant Robustness with Theoretical Justification
TAROT: Towards Essentially Domain-Invariant Robustness with Theoretical JustificationComputer Vision and Pattern Recognition (CVPR), 2025
Dongyoon Yang
Jihu Lee
Yongdai Kim
350
1
0
10 May 2025
Diffusion-based Adversarial Purification from the Perspective of the Frequency Domain
Diffusion-based Adversarial Purification from the Perspective of the Frequency Domain
Gaozheng Pei
Ke Ma
Yingfei Sun
Qianqian Xu
Qingming Huang
DiffM
608
5
0
02 May 2025
Examining the Impact of Optical Aberrations to Image Classification and Object Detection Models
Examining the Impact of Optical Aberrations to Image Classification and Object Detection ModelsIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2025
Patrick Müller
Alexander Braun
Margret Keuper
376
4
0
25 Apr 2025
RaPA: Enhancing Transferable Targeted Attacks via Random Parameter Pruning
RaPA: Enhancing Transferable Targeted Attacks via Random Parameter Pruning
Tongrui Su
Qingbin Li
Shengyu Zhu
Wei Chen
Xueqi Cheng
AAMLSILM
473
1
0
24 Apr 2025
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation
Meixi Zheng
Kehan Wu
Yanbo Fan
Rui Huang
Baoyuan Wu
AAML
313
0
0
23 Apr 2025
Defending Against Frequency-Based Attacks with Diffusion Models
Defending Against Frequency-Based Attacks with Diffusion Models
Fatemeh Amerehi
Patrick Healy
AAML
397
1
0
15 Apr 2025
Beyond Accuracy: What Matters in Designing Well-Behaved Image Classification Models?
Beyond Accuracy: What Matters in Designing Well-Behaved Image Classification Models?
Robin Hesse
Doğukan Bağcı
Bernt Schiele
Simone Schaub-Meyer
Stefan Roth
VLM
537
0
0
21 Mar 2025
MAME: Multidimensional Adaptive Metamer Exploration with Human Perceptual Feedback
MAME: Multidimensional Adaptive Metamer Exploration with Human Perceptual Feedback
Mina Kamao
Hayato Ono
Ayumu Yamashita
Kaoru Amano
Masataka Sawayama
259
0
0
17 Mar 2025
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial AttacksNeural Information Processing Systems (NeurIPS), 2025
Jin Li
Ziqiang He
Anwei Luo
Jian-Fang Hu
Zhong Wang
Xiangui Kang
DiffM
364
11
0
12 Mar 2025
E$^2$AT: Multimodal Jailbreak Defense via Dynamic Joint Optimization for Multimodal Large Language Models
E2^22AT: Multimodal Jailbreak Defense via Dynamic Joint Optimization for Multimodal Large Language Models
Liming Lu
Shuchao Pang
Yaning Tan
Haotian Zhu
Xiyu Zeng
Aishan Liu
Yunhuai Liu
Yongbin Zhou
AAML
568
17
0
05 Mar 2025
One Stone, Two Birds: Enhancing Adversarial Defense Through the Lens of Distributional Discrepancy
One Stone, Two Birds: Enhancing Adversarial Defense Through the Lens of Distributional Discrepancy
Jiacheng Zhang
Benjamin I. P. Rubinstein
Jing Zhang
Yifan Zhang
402
0
0
04 Mar 2025
Model-Free Adversarial Purification via Coarse-To-Fine Tensor Network Representation
Model-Free Adversarial Purification via Coarse-To-Fine Tensor Network Representation
Guang Lin
D. Nguyen
Zerui Tao
Konstantinos Slavakis
Toshihisa Tanaka
Qibin Zhao
AAML
411
1
0
25 Feb 2025
Killing it with Zero-Shot: Adversarially Robust Novelty Detection
Killing it with Zero-Shot: Adversarially Robust Novelty DetectionIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2024
Hossein Mirzaei
Mohammad Jafari
Hamid Reza Dehbashi
Zeinab Sadat Taghavi
Mohammad Sabokrou
M. Rohban
362
4
0
28 Jan 2025
MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework
MOS-Attack: A Scalable Multi-objective Adversarial Attack FrameworkComputer Vision and Pattern Recognition (CVPR), 2025
Ping Guo
Cheng Gong
Xi Lin
Fei Liu
Zhichao Lu
Gang Qu
Zhenkun Wang
AAML
413
2
0
13 Jan 2025
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
RobustBlack: Challenging Black-Box Adversarial Attacks on State-of-the-Art Defenses
Mohamed Djilani
Salah Ghamizi
Maxime Cordy
562
1
0
30 Dec 2024
Learning Where to Edit Vision Transformers
Learning Where to Edit Vision TransformersNeural Information Processing Systems (NeurIPS), 2024
Yunqiao Yang
Long-Kai Huang
Shengzhuang Chen
Kede Ma
Ying Wei
KELM
336
4
0
04 Nov 2024
On the Robustness of Adversarial Training Against Uncertainty Attacks
On the Robustness of Adversarial Training Against Uncertainty AttacksPattern Recognition (Pattern Recogn.), 2024
Emanuele Ledda
Giovanni Scodeller
Daniele Angioni
Giorgio Piras
Antonio Emanuele Cinà
Giorgio Fumera
Battista Biggio
Fabio Roli
AAML
495
3
0
29 Oct 2024
Adversarial Training: A Survey
Adversarial Training: A Survey
Mengnan Zhao
Lihe Zhang
Jingwen Ye
Huchuan Lu
Baocai Yin
Xinchao Wang
AAML
342
13
0
19 Oct 2024
How Do Training Methods Influence the Utilization of Vision Models?
How Do Training Methods Influence the Utilization of Vision Models?
Paul Gavrikov
Shashank Agnihotri
Margret Keuper
J. Keuper
389
2
0
18 Oct 2024
Attuned to Change: Causal Fine-Tuning under Latent-Confounded Shifts
Attuned to Change: Causal Fine-Tuning under Latent-Confounded Shifts
Jialin Yu
Yuxiang Zhou
Yulan He
Nevin L. Zhang
Ricardo Silva
Philip Torr
Ricardo M. A. Silva
476
0
0
18 Oct 2024
FedGTST: Boosting Global Transferability of Federated Models via
  Statistics Tuning
FedGTST: Boosting Global Transferability of Federated Models via Statistics TuningNeural Information Processing Systems (NeurIPS), 2024
Peizhi Niu
Chao Pan
Rasoul Etesami
Han Zhao
S. Rasoul Etesami
FedMLAAML
316
0
0
16 Oct 2024
Low-Rank Adversarial PGD Attack
Low-Rank Adversarial PGD Attack
Dayana Savostianova
Emanuele Zangrando
Francesco Tudisco
AAML
315
5
0
16 Oct 2024
S$^4$ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
S4^44ST: A Strong, Self-transferable, faSt, and Simple Scale Transformation for Transferable Targeted Attack
Yongxiang Liu
Bowen Peng
Li Liu
Xuzhao Li
850
0
0
13 Oct 2024
Characterizing Model Robustness via Natural Input Gradients
Characterizing Model Robustness via Natural Input GradientsEuropean Conference on Computer Vision (ECCV), 2024
Adrian Rodriguez-Munoz
Tongzhou Wang
Antonio Torralba
AAML
381
4
0
30 Sep 2024
Self-Masking Networks for Unsupervised Adaptation
Self-Masking Networks for Unsupervised AdaptationGerman Conference on Pattern Recognition (DAGM), 2024
Alfonso Taboada Warmerdam
Mathilde Caron
Yuki M. Asano
362
2
0
11 Sep 2024
Safetywashing: Do AI Safety Benchmarks Actually Measure Safety Progress?
Safetywashing: Do AI Safety Benchmarks Actually Measure Safety Progress?
Richard Ren
Steven Basart
Adam Khoja
Alice Gatti
Long Phan
...
Alexander Pan
Gabriel Mukobi
Ryan H. Kim
Stephen Fitz
Dan Hendrycks
ELM
386
64
0
31 Jul 2024
PartImageNet++ Dataset: Scaling up Part-based Models for Robust
  Recognition
PartImageNet++ Dataset: Scaling up Part-based Models for Robust Recognition
Xiao-Li Li
Yining Liu
Na Dong
Sitian Qin
Xiaolin Hu
374
8
0
15 Jul 2024
How Aligned are Different Alignment Metrics?
How Aligned are Different Alignment Metrics?
Jannis Ahlert
Thomas Klein
Felix Wichmann
Robert Geirhos
410
8
0
10 Jul 2024
Understanding the Role of Invariance in Transfer Learning
Understanding the Role of Invariance in Transfer Learning
Till Speicher
Vedant Nanda
Krishna P. Gummadi
SSLOOD
378
1
0
05 Jul 2024
Which Backbone to Use: A Resource-efficient Domain Specific Comparison for Computer Vision
Which Backbone to Use: A Resource-efficient Domain Specific Comparison for Computer Vision
Pranav Jeevan
Amit Sethi
VLM
552
12
0
09 Jun 2024
DifAttack++: Query-Efficient Black-Box Adversarial Attack via Hierarchical Disentangled Feature Space in Cross-Domain
DifAttack++: Query-Efficient Black-Box Adversarial Attack via Hierarchical Disentangled Feature Space in Cross-Domain
Jun Liu
Jiantao Zhou
Jiandian Zeng
Jinyu Tian
Zheng Li
434
2
0
05 Jun 2024
ZeroPur: Succinct Training-Free Adversarial Purification
ZeroPur: Succinct Training-Free Adversarial Purification
Xiuli Bi
Zonglin Yang
Bo Liu
Xiaodong Cun
Chi-Man Pun
582
1
0
05 Jun 2024
Parallel Backpropagation for Shared-Feature Visualization
Parallel Backpropagation for Shared-Feature VisualizationNeural Information Processing Systems (NeurIPS), 2024
Alexander Lappe
Anna Bognár
Ghazaleh Ghamkhari Nejad
A. Mukovskiy
Lucas M. Martini
Martin A. Giese
Rufin Vogels
FAtt
196
4
0
16 May 2024
The Pitfalls and Promise of Conformal Inference Under Adversarial
  Attacks
The Pitfalls and Promise of Conformal Inference Under Adversarial AttacksInternational Conference on Machine Learning (ICML), 2024
Ziquan Liu
Yufei Cui
Yan Yan
Yi Tian Xu
Xiangyang Ji
Xue Liu
Antoni B. Chan
AAML
352
9
0
14 May 2024
Improving Transferable Targeted Adversarial Attack via Normalized Logit
  Calibration and Truncated Feature Mixing
Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature MixingIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2024
Juanjuan Weng
Zhiming Luo
Shaozi Li
AAML
337
4
0
10 May 2024
123456
Next
Page 1 of 6