SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 9511000 of 1808 papers

TitleStatusHype
Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement Analysis0
Towards Adversarially Robust Deep Image Denoising0
Adversarially Robust Classification by Conditional Generative Model Inversion0
Similarity-based Gray-box Adversarial Attack Against Deep Face RecognitionCode0
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints0
Towards Transferable Unrestricted Adversarial Examples with Minimum ChangesCode1
Towards Efficient Data Free Black-Box Adversarial AttackCode1
Bounded Adversarial Attack on Deep Content FeaturesCode0
Exploring Effective Data for Surrogate Training Towards Black-Box AttackCode1
360-Attack: Distortion-Aware Perturbations From Perspective-Views0
Appearance and Structure Aware Robust Deep Visual Graph Matching: Attack, Defense and BeyondCode1
Adversarial Attack via Dual-Stage Network ErosionCode0
A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs0
Adversarial Attack for Asynchronous Event-based Data0
Task and Model Agnostic Adversarial Attack on Graph Neural NetworksCode0
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-ArtCode1
A Theoretical View of Linear Backpropagation and Its ConvergenceCode0
TASA: Twin Answer Sentences Attack for Adversarial Context Generation in Question Answering0
Reasoning Chain Based Adversarial Attack for Multi-hop Question Answering0
Dynamics-aware Adversarial Attack of 3D Sparse Convolution NetworkCode0
Towards Robust Neural Image Compression: Adversarial Attack and Model Finetuning0
NOMARO: Defending against Adversarial Attacks by NOMA-Inspired Reconstruction OperationCode0
Triangle Attack: A Query-efficient Decision-based Adversarial AttackCode1
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare0
Learning to Learn Transferable AttackCode0
How Private Is Your RL Policy? An Inverse RL Based Analysis FrameworkCode0
Amicable Aid: Perturbing Images to Improve Classification Performance0
SNEAK: Synonymous Sentences-Aware Adversarial Attack on Natural Language Video Localization0
ML Attack Models: Adversarial Attacks and Data Poisoning Attacks0
Stochastic Local Winner-Takes-All Networks Enable Profound Adversarial RobustnessCode1
A Unified Framework for Adversarial Attack and Defense in Constrained Feature SpaceCode1
Exploring the Vulnerability of Natural Language Processing Models via Universal Adversarial TextsCode0
Pyramid Adversarial Training Improves ViT PerformanceCode0
MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical Pretrained Models Against Adversarial Attack0
Adaptive Perturbation for Adversarial Attack0
Adaptive Image Transformations for Transfer-based Adversarial AttackCode0
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network0
Thundernna: a white box adversarial attack0
Heterogeneous Architecture Search Approach within Adversarial Dynamic Defense Framework0
Metamorphic Adversarial Detection Pipeline for Face Recognition Systems0
A Practical and Stealthy Adversarial Attack for Cyber-Physical Applications0
Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial TransferabilityCode1
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition ModelCode1
Fooling Adversarial Training with Inducing Noise0
Enhanced countering adversarial attacks via input denoising and feature restoringCode0
A Review of Adversarial Attack and Defense for Classification MethodsCode1
Tracklet-Switch Adversarial Attack against Pedestrian Multi-Object Tracking TrackersCode1
Generating Unrestricted 3D Adversarial Point CloudsCode0
Robust and Effective Grammatical Error Correction with Simple Cycle Self-Augmenting0
Input-specific Attention Subnetworks for Adversarial Detection0
Show:102550
← PrevPage 20 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified