SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 451475 of 1808 papers

TitleStatusHype
Black-box Adversarial ML Attack on Modulation Classification0
Black-Box Decision based Adversarial Attack with Symmetric α-stable Distribution0
Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation0
Black-box Targeted Adversarial Attack on Segment Anything (SAM)0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples0
AutoAdversary: A Pixel Pruning Method for Sparse Adversarial Attack0
Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring0
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey0
Adjust-free adversarial example generation in speech recognition using evolutionary multi-objective optimization under black-box condition0
Boosting Adversarial Transferability of MLP-Mixer0
Boosting Adversarial Transferability through Enhanced Momentum0
Adaptive Meta-learning-based Adversarial Training for Robust Automatic Modulation Classification0
Boosting Adversarial Transferability using Dynamic Cues0
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality0
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective0
Augmented Adversarial Trigger Learning0
Boosting Black-Box Adversarial Attacks with Meta Learning0
Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors0
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection0
Aug-ILA: More Transferable Intermediate Level Attacks with Augmented References0
Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness0
Audio Adversarial Examples: Attacks Using Vocal Masks0
Attribution for Enhanced Explanation with Transferable Adversarial eXploration0
Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness0
Show:102550
← PrevPage 19 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified