SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 276300 of 1808 papers

TitleStatusHype
RayS: A Ray Searching Method for Hard-label Adversarial AttackCode1
Differentiable Language Model Adversarial Attacks on Categorical Sequence ClassifiersCode1
Boosting Black-Box Attack with Partially Transferred Conditional Adversarial DistributionCode1
Adversarial Self-Supervised Contrastive LearningCode1
Targeted Adversarial Perturbations for Monocular Depth PredictionCode1
Interpolation between Residual and Non-Residual NetworksCode1
Pick-Object-Attack: Type-Specific Adversarial Attack for Object DetectionCode1
Defending and Harnessing the Bit-Flip Based Adversarial Weight AttackCode1
Benchmarking Adversarial Robustness on Image ClassificationCode1
On Intrinsic Dataset Properties for Adversarial Machine LearningCode1
Defending Your Voice: Adversarial Attack on Voice ConversionCode1
Improve robustness of DNN for ECG signal classification:a noise-to-signal ratio perspectiveCode1
Attacking Recommender Systems with Augmented User ProfilesCode1
BayesOpt Adversarial AttackCode1
Sign Bits Are All You Need for Black-Box AttacksCode1
Towards Feature Space Adversarial AttackCode1
BERT-ATTACK: Adversarial Attack Against BERT Using BERTCode1
Adversarial Attack on Deep Learning-Based Splice LocalizationCode1
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-RankingCode1
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible NoisesCode1
Motion-Excited Sampler: Video Adversarial Attack with Sparked PriorCode1
Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation SystemsCode1
Adversarial Ranking Attack and DefenseCode1
Stabilizing Differentiable Architecture Search via Perturbation-based RegularizationCode1
Watch out! Motion is Blurring the Vision of Your Deep Neural NetworksCode1
Show:102550
← PrevPage 12 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified