SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 526550 of 1808 papers

TitleStatusHype
Adversarial Attack on Deep Cross-Modal Hamming Retrieval0
Adversarial Learning of Deepfakes in Accounting0
Attacking Perceptual Similarity Metrics0
Attacking Important Pixels for Anchor-free Detectors0
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain0
Attack Deterministic Conditional Image Generative Models for Diverse and Controllable Generation0
Enhancing Transformation-based Defenses using a Distribution Classifier0
Attack-Agnostic Adversarial Detection0
A Thorough Comparison Study on Adversarial Attacks and Defenses for Common Thorax Disease Classification in Chest X-rays0
Adversarial Interaction Attacks: Fooling AI to Misinterpret Human Intentions0
AT-GAN: An Adversarial Generative Model for Non-constrained Adversarial Examples0
Semantically Stealthy Adversarial Attacks against Segmentation Models0
Device-aware Optical Adversarial Attack for a Portable Projector-camera System0
AT-GAN: An Adversarial Generator Model for Non-constrained Adversarial Examples0
Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions0
Adversarial Attack Framework on Graph Embedding Models with Limited Knowledge0
ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech0
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial Attack against Infrared Pedestrian Detectors0
Adaptive Adversarial Attack on Scene Text Recognition0
DFT-Based Adversarial Attack Detection in MRI Brain Imaging: Enhancing Diagnostic Accuracy in Alzheimer's Case Studies0
A Survey on Physical Adversarial Attacks against Face Recognition Systems0
A Survey on Physical Adversarial Attack in Computer Vision0
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Adversarial Imitation Attack0
Show:102550
← PrevPage 22 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified