ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2211.09565
  4. Cited By
Towards Good Practices in Evaluating Transfer Adversarial Attacks

Towards Good Practices in Evaluating Transfer Adversarial Attacks

17 November 2022
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
    AAML
ArXivPDFHTML

Papers citing "Towards Good Practices in Evaluating Transfer Adversarial Attacks"

20 / 20 papers shown
Title
On the Adversarial Transferability of Generalized "Skip Connections"
On the Adversarial Transferability of Generalized "Skip Connections"
Yisen Wang
Yichuan Mo
Dongxian Wu
Mingjie Li
Xingjun Ma
Zhouchen Lin
AAML
21
2
0
11 Oct 2024
Geometric Remove-and-Retrain (GOAR): Coordinate-Invariant eXplainable AI
  Assessment
Geometric Remove-and-Retrain (GOAR): Coordinate-Invariant eXplainable AI Assessment
Yong-Hyun Park
Junghoon Seo
Bomseok Park
Seongsu Lee
Junghyo Jo
AAML
32
0
0
17 Jul 2024
Enhancing robustness of data-driven SHM models: adversarial training
  with circle loss
Enhancing robustness of data-driven SHM models: adversarial training with circle loss
Xiangli Yang
Xijie Deng
Hanwei Zhang
Yang Zou
Jianxi Yang
AAML
27
0
0
20 Jun 2024
Rethinking PGD Attack: Is Sign Function Necessary?
Rethinking PGD Attack: Is Sign Function Necessary?
Junjie Yang
Tianlong Chen
Xuxi Chen
Zhangyang Wang
Yingbin Liang
AAML
23
1
0
03 Dec 2023
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial
  Examples and Robust Training of Deep Neural Networks for Tabular Data
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Thibault Simonetto
Salah Ghamizi
Antoine Desjardins
Maxime Cordy
Yves Le Traon
OOD
AAML
11
3
0
08 Nov 2023
Towards Evaluating Transfer-based Attacks Systematically, Practically,
  and Fairly
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly
Qizhang Li
Yiwen Guo
Wangmeng Zuo
Hao Chen
ELM
AAML
25
2
0
02 Nov 2023
PubDef: Defending Against Transfer Attacks From Public Models
PubDef: Defending Against Transfer Attacks From Public Models
Chawin Sitawarin
Jaewon Chang
David Huang
Wesson Altoyan
David A. Wagner
AAML
24
5
0
26 Oct 2023
A Survey on Transferability of Adversarial Examples across Deep Neural
  Networks
A Survey on Transferability of Adversarial Examples across Deep Neural Networks
Jindong Gu
Xiaojun Jia
Pau de Jorge
Wenqain Yu
Xinwei Liu
...
Anjun Hu
Ashkan Khakzar
Zhijiang Li
Xiaochun Cao
Philip H. S. Torr
AAML
22
26
0
26 Oct 2023
SoK: Pitfalls in Evaluating Black-Box Attacks
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya
Anshuman Suri
Tingwei Zhang
Jingtao Hong
Yuan Tian
David E. Evans
AAML
24
6
0
26 Oct 2023
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake
  Detection
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Weijie Wang
Zhengyu Zhao
N. Sebe
Bruno Lepri
AAML
32
2
0
03 Sep 2023
Robustness Over Time: Understanding Adversarial Examples' Effectiveness
  on Longitudinal Versions of Large Language Models
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models
Yugeng Liu
Tianshuo Cong
Zhengyu Zhao
Michael Backes
Yun Shen
Yang Zhang
AAML
33
6
0
15 Aug 2023
Generative Watermarking Against Unauthorized Subject-Driven Image
  Synthesis
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Y. Ma
Zhengyu Zhao
Xinlei He
Zheng Li
Michael Backes
Yang Zhang
AAML
WIGM
9
21
0
13 Jun 2023
Going Further: Flatness at the Rescue of Early Stopping for Adversarial
  Example Transferability
Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability
Martin Gubri
Maxime Cordy
Yves Le Traon
AAML
8
3
1
05 Apr 2023
How to choose your best allies for a transferable attack?
How to choose your best allies for a transferable attack?
Thibault Maho
Seyed-Mohsen Moosavi-Dezfooli
Teddy Furon
AAML
6
1
0
05 Apr 2023
Boosting the Adversarial Transferability of Surrogate Models with Dark
  Knowledge
Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge
Dingcheng Yang
Zihao Xiao
Wenjian Yu
AAML
15
5
0
16 Jun 2022
Diffusion Models for Adversarial Purification
Diffusion Models for Adversarial Purification
Weili Nie
Brandon Guo
Yujia Huang
Chaowei Xiao
Arash Vahdat
Anima Anandkumar
WIGM
195
415
0
16 May 2022
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for
  Black-box Domains
Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Qilong Zhang
Xiaodan Li
YueFeng Chen
Jingkuan Song
Lianli Gao
Yuan He
Hui Xue
AAML
62
64
0
27 Jan 2022
Admix: Enhancing the Transferability of Adversarial Attacks
Admix: Enhancing the Transferability of Adversarial Attacks
Xiaosen Wang
Xu He
Jingdong Wang
Kun He
AAML
68
192
0
31 Jan 2021
Densely Connected Convolutional Networks
Densely Connected Convolutional Networks
Gao Huang
Zhuang Liu
L. V. D. van der Maaten
Kilian Q. Weinberger
PINN
3DV
247
36,237
0
25 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
250
5,830
0
08 Jul 2016
1