SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 751800 of 1808 papers

TitleStatusHype
Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks0
Natural Color Fool: Towards Boosting Black-box Unrestricted AttacksCode1
Jitter Does Matter: Adapting Gaze Estimation to New Domains0
Robust Fair Clustering: A Novel Fairness Attack and Defense FrameworkCode0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
On Attacking Out-Domain Uncertainty Estimation in Deep Neural Networks0
PlugAT: A Plug and Play Module to Defend against Textual Adversarial Attack0
Can We Really Trust Explanations? Evaluating the Stability of Feature Attribution Explanation Methods via Adversarial Attack0
Hiding Visual Information via Obfuscating Adversarial PerturbationsCode1
Physical Adversarial Attack meets Computer Vision: A Decade SurveyCode1
A Survey on Physical Adversarial Attack in Computer Vision0
Activation Learning by Local Competitions0
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution LearningCode1
Fair Robust Active Learning by Joint Inconsistency0
Adversarial Color Projection: A Projector-based Physical Attack to DNNs0
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction0
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition modelsCode0
Robust Constrained Reinforcement Learning0
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking ModelsCode1
PointACL:Adversarial Contrastive Learning for Robust Point Clouds Representation under Adversarial AttackCode0
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective AttackCode1
ADMM based Distributed State Observer Design under Sparse Sensor Attacks0
PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models0
Sample Complexity of an Adversarial Attack on UCB-based Best-arm Identification Policy0
Generate synthetic samples from tabular dataCode0
Scattering Model Guided Adversarial Examples for SAR Target Recognition: Attack and DefenseCode1
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature RandomizationCode0
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples0
Impact of Scaled Image on Robustness of Deep Neural Networks0
A Black-Box Attack on Optical Character Recognition Systems0
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm0
Unrestricted Black-box Adversarial Attack Using GAN with Limited QueriesCode1
Bidirectional Contrastive Split Learning for Visual Question Answering0
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy ProtectionCode0
Different Spectral Representations in Optimized Artificial Neural Networks and BrainsCode0
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks0
UKP-SQuARE v2: Explainability and Adversarial Attacks for Trustworthy QACode1
Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment0
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
InvisibiliTee: Angle-agnostic Cloaking from Person-Tracking Systems with a TeeCode1
MENLI: Robust Evaluation Metrics from Natural Language InferenceCode1
A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design0
Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless NetworksCode1
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator0
Design of secure and robust cognitive system for malware detection0
Multiclass ASMA vs Targeted PGD Attack in Image Segmentation0
Look Closer to Your Enemy: Learning to Attack via Teacher-Student MimickingCode0
LGV: Boosting Adversarial Example Transferability from Large Geometric VicinityCode1
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception0
Versatile Weight Attack via Flipping Limited BitsCode0
Show:102550
← PrevPage 16 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified