SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 301325 of 1808 papers

TitleStatusHype
Renofeation: A Simple Transfer Learning Method for Improved Adversarial RobustnessCode1
Adversarial Attack on Community Detection by Hiding IndividualsCode1
Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object TrackingCode1
T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted AttackCode1
Square Attack: a query-efficient black-box adversarial attack via random searchCode1
Nesterov Accelerated Gradient and Scale Invariance for Adversarial AttacksCode1
Natural Adversarial ExamplesCode1
Provably Robust Deep Learning via Adversarially Trained Smoothed ClassifiersCode1
High Frequency Component Helps Explain the Generalization of Convolutional Neural NetworksCode1
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object TrackingCode1
Adversarial Training for Free!Code1
Wasserstein Adversarial Examples via Projected Sinkhorn IterationsCode1
On Evaluating Adversarial RobustnessCode1
Theoretically Principled Trade-off between Robustness and AccuracyCode1
Distributionally Adversarial AttackCode1
Local Gradients Smoothing: Defense against localized adversarial attacksCode1
Generalizable Data-free Objective for Crafting Universal Adversarial PerturbationsCode1
Towards Deep Learning Models Resistant to Adversarial AttacksCode1
Adversarial Examples for Semantic Segmentation and Object DetectionCode1
Deep Variational Information BottleneckCode1
3DGAA: Realistic and Robust 3D Gaussian-based Adversarial Attack for Autonomous Driving0
VIP: Visual Information Protection through Adversarial Attacks on Vision-Language ModelsCode0
Identifying the Smallest Adversarial Load Perturbations that Render DC-OPF InfeasibleCode0
3D Gaussian Splatting Driven Multi-View Robust Physical Adversarial Camouflage GenerationCode0
Robustness of Misinformation Classification Systems to Adversarial Examples Through BeamAttackCode0
Show:102550
← PrevPage 13 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified