SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 901950 of 1808 papers

TitleStatusHype
Input-specific Attention Subnetworks for Adversarial Detection0
Exploring High-Order Structure for Robust Graph Structure Learning0
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement0
Efficient Neural Network Analysis with Sum-of-InfeasibilitiesCode2
Perturbations in the Wild: Leveraging Human-Written Text Perturbations for Realistic Adversarial Attack and DefenseCode0
Alleviating Adversarial Attacks on Variational Autoencoders with MCMCCode1
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression0
AutoAdversary: A Pixel Pruning Method for Sparse Adversarial Attack0
DTA: Physical Camouflage Attacks using Differentiable Transformation Network0
Defending Against Adversarial Attack in ECG Classification with Adversarial Distillation Training0
Efficient universal shuffle attack for visual object tracking0
An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacksCode1
Block-Sparse Adversarial Attack to Fool Transformer-Based Text ClassifiersCode0
Frequency-driven Imperceptible Adversarial Attack on Semantic SimilarityCode1
Harmonicity Plays a Critical Role in DNN Based Versus in Biologically-Inspired Monaural Speech Segregation Systems0
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural PhenomenonCode1
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art0
A^3D: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks0
Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV TrackingCode1
Adversarial attacks on neural networks through canonical Riemannian foliationsCode0
Detecting Adversarial Perturbations in Multi-Task PerceptionCode0
Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey0
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias0
Critical Checkpoints for Evaluating Defence Models Against Adversarial Attack and Robustness0
Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing0
Recent Advances in Reliable Deep Graph Learning: Inherent Noise, Distribution Shift, and Adversarial Attack0
Random Walks for Adversarial MeshesCode1
Universal Adversarial Examples in Remote Sensing: Methodology and BenchmarkCode1
Adversarial Attack and Defense of YOLO Detectors in Autonomous Driving ScenariosCode1
Adversarial Attack and Defense for Non-Parametric Two-Sample TestsCode0
Attacking c-MARL More Effectively: A Data Driven Approach0
Layer-wise Regularized Adversarial Training using Layers Sustainability Analysis (LSA) frameworkCode1
Rate Coding or Direct Coding: Which One is Better for Accurate, Robust, and Energy-efficient Spiking Neural Networks?Code1
Adversarial Robustness in Deep Learning: Attacks on Fragile Neurons0
Scale-Invariant Adversarial Attack for Evaluating and Enhancing Adversarial Defenses0
Feature Visualization within an Automated Design Assessment leveraging Explainable Artificial Intelligence Methods0
Gradient-guided Unsupervised Text Style Transfer via Contrastive Learning0
Robust Unpaired Single Image Super-Resolution of Faces0
Toward Enhanced Robustness in Unsupervised Graph Representation Learning: A Graph Information Bottleneck Perspective0
Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges0
Cheating Automatic Short Answer Grading: On the Adversarial Usage of Adjectives and AdverbsCode0
Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagationCode1
TextHacker: Learning based Hybrid Local Search Algorithm for Text Hard-label Adversarial AttackCode0
Bridge the Gap Between CV and NLP! A Gradient-based Textual Adversarial Attack Framework0
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock PredictionCode1
Phrase-level Textual Adversarial Attack with Label Preservation0
Residue-Based Natural Language Adversarial Attack Detection0
SSCAE: A Novel Semantic, Syntactic, and Context-Aware Natural Language Adversarial Example Generator0
ALA: Naturalness-aware Adversarial Lightness Attack0
On Adversarial Robustness of Trajectory Prediction for Autonomous VehiclesCode1
Show:102550
← PrevPage 19 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified