SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 9511000 of 1808 papers

TitleStatusHype
Effective Targeted Attacks for Adversarial Self-Supervised Learning0
Learning Transferable Adversarial Robust Representations via Multi-view Consistency0
Beyond Model Interpretability: On the Faithfulness and Adversarial Robustness of Contrastive Textual ExplanationsCode0
Probabilistic Categorical Adversarial Attack & Adversarial Training0
Object-Attentional Untargeted Adversarial Attack0
Dynamics-aware Adversarial Attack of Adaptive Neural NetworksCode0
AccelAT: A Framework for Accelerating the Adversarial Training of Deep Neural Networks through Accuracy GradientCode0
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition0
Adversarial Attack Against Image-Based Localization Neural Networks0
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems0
Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks0
Jitter Does Matter: Adapting Gaze Estimation to New Domains0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Robust Fair Clustering: A Novel Fairness Attack and Defense FrameworkCode0
On Attacking Out-Domain Uncertainty Estimation in Deep Neural Networks0
PlugAT: A Plug and Play Module to Defend against Textual Adversarial Attack0
Can We Really Trust Explanations? Evaluating the Stability of Feature Attribution Explanation Methods via Adversarial Attack0
A Survey on Physical Adversarial Attack in Computer Vision0
Activation Learning by Local Competitions0
Fair Robust Active Learning by Joint Inconsistency0
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction0
Adversarial Color Projection: A Projector-based Physical Attack to DNNs0
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition modelsCode0
PointACL:Adversarial Contrastive Learning for Robust Point Clouds Representation under Adversarial AttackCode0
Robust Constrained Reinforcement Learning0
Sample Complexity of an Adversarial Attack on UCB-based Best-arm Identification Policy0
PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models0
ADMM based Distributed State Observer Design under Sparse Sensor Attacks0
Generate synthetic samples from tabular dataCode0
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature RandomizationCode0
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples0
Impact of Scaled Image on Robustness of Deep Neural Networks0
A Black-Box Attack on Optical Character Recognition Systems0
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm0
Bidirectional Contrastive Split Learning for Visual Question Answering0
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy ProtectionCode0
Different Spectral Representations in Optimized Artificial Neural Networks and BrainsCode0
Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment0
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks0
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design0
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator0
Multiclass ASMA vs Targeted PGD Attack in Image Segmentation0
Design of secure and robust cognitive system for malware detection0
Look Closer to Your Enemy: Learning to Attack via Teacher-Student MimickingCode0
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception0
Versatile Weight Attack via Flipping Limited BitsCode0
Rethinking Textual Adversarial Defense for Pre-trained Language Models0
Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks0
Decorrelative Network Architecture for Robust Electrocardiogram ClassificationCode0
Show:102550
← PrevPage 20 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified