SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 451500 of 1808 papers

TitleStatusHype
Black-box Adversarial ML Attack on Modulation Classification0
Black-Box Decision based Adversarial Attack with Symmetric α-stable Distribution0
Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation0
Black-box Targeted Adversarial Attack on Segment Anything (SAM)0
Automated Decision-based Adversarial Attacks0
Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring0
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey0
Adjust-free adversarial example generation in speech recognition using evolutionary multi-objective optimization under black-box condition0
Boosting Adversarial Transferability of MLP-Mixer0
Boosting Adversarial Transferability through Enhanced Momentum0
AutoAdversary: A Pixel Pruning Method for Sparse Adversarial Attack0
Adaptive Meta-learning-based Adversarial Training for Robust Automatic Modulation Classification0
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality0
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective0
Augmented Adversarial Trigger Learning0
Boosting Black-Box Adversarial Attacks with Meta Learning0
Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors0
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection0
DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation0
Aug-ILA: More Transferable Intermediate Level Attacks with Augmented References0
Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness0
Adverseness vs. Equilibrium: Exploring Graph Adversarial Resilience through Dynamic Equilibrium0
Audio Adversarial Examples: Attacks Using Vocal Masks0
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning0
Attribution for Enhanced Explanation with Transferable Adversarial eXploration0
Bregman Linearized Augmented Lagrangian Method for Nonconvex Constrained Stochastic Zeroth-order Optimization0
Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness0
Adversarial Attack on Facial Recognition using Visible Light0
Attribution-driven Causal Analysis for Detection of Adversarial Examples0
Attribute-Guided Encryption with Facial Texture Masking0
Making Corgis Important for Honeycomb Classification: Adversarial Attacks on Concept-based Explainability Tools0
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack0
Btech thesis report on adversarial attack detection and purification of adverserially attacked images0
BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries0
Adversarial Attacks and Defenses: An Interpretation Perspective0
CAAD 2018: Iterative Ensemble Adversarial Attack0
CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator0
AdvMask: A Sparse Adversarial Attack Based Data Augmentation Method for Image Classification0
Attention, Please! Adversarial Defense via Activation Rectification and Preservation0
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network0
Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?0
Can We Really Trust Explanations? Evaluating the Stability of Feature Attribution Explanation Methods via Adversarial Attack0
Adversarially Robust Neural Architectures0
Adversarial Attack on Deep Product Quantization Network for Image Retrieval0
CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification0
Capsule Neural Networks as Noise Stabilizer for Time Series Data0
DA^3: A Distribution-Aware Adversarial Attack against Language Models0
Darknet Traffic Classification and Adversarial Attacks0
Show:102550
← PrevPage 10 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified