SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 11011150 of 1808 papers

TitleStatusHype
The FEVER2.0 Shared Task0
The Impacts of Unanswerable Questions on the Robustness of Machine Reading Comprehension Models0
There are No Bit Parts for Sign Bits in Black-Box Attacks0
The Relationship Between Network Similarity and Transferability of Adversarial Attacks0
Thundernna: a white box adversarial attack0
Thwarting finite difference adversarial attacks with output randomization0
Time-aware Gradient Attack on Dynamic Network Link Prediction0
To be Robust and to be Fair: Aligning Fairness with Robustness0
To Each (Textual Sequence) Its Own: Improving Memorized-Data Unlearning in Large Language Models0
BOSH: An Efficient Meta Algorithm for Decision-based Attacks0
Towards Accuracy-Fairness Paradox: Adversarial Example-based Data Augmentation for Visual Debiasing0
Towards Adversarially Robust Deep Image Denoising0
Towards a Novel Perspective on Adversarial Examples Driven by Frequency0
Towards A Unified Min-Max Framework for Adversarial Exploration and Robustness0
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios0
Towards Building a Robust Toxicity Predictor0
Towards Calibration Enhanced Network by Inverse Adversarial Attack0
Towards Certified Defense for Unrestricted Adversarial Attacks0
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty0
Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer0
Fooling Network Interpretation in Image Classification0
Towards Interpretability of Speech Pause in Dementia Detection using Adversarial Learning0
Towards Leveraging the Information of Gradients in Optimization-based Adversarial Attack0
Towards more transferable adversarial attack in black-box manner0
Towards Natural Robustness Against Adversarial Examples0
Toward Spiking Neural Network Local Learning Modules Resistant to Adversarial Attacks0
Towards Security Threats of Deep Learning Systems: A Survey0
Towards Robust and Secure Embodied AI: A Survey on Vulnerabilities and Attacks0
Towards Robustness of Deep Neural Networks via Regularization0
Towards Robust Neural Image Compression: Adversarial Attack and Model Finetuning0
Towards Robust Speech-to-Text Adversarial Attack0
Towards Sybil Resilience in Decentralized Learning0
Towards the Transferable Audio Adversarial Attack via Ensemble Methods0
Towards Transferable Adversarial Attack against Deep Face Recognition0
Towards Transferable Adversarial Attacks with Centralized Perturbation0
Learning to Attack with Fewer Pixels: A Probabilistic Post-hoc Framework for Refining Arbitrary Dense Adversarial Attacks0
Towards Universal Physical Attacks On Cascaded Camera-Lidar 3D Object Detection Models0
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence0
Tracking the Copyright of Large Vision-Language Models through Parameter Learning Adversarial Images0
Data Poisoning Attack Aiming the Vulnerability of Continual Learning0
TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation0
Transferable Adversarial Attack for Both Vision Transformers and Convolutional Networks via Momentum Integrated Gradients0
Transferable Adversarial Attack on Image Tampering Localization0
Transferable Adversarial Examples for Anchor Free Object Detection0
Transferable and Configurable Audio Adversarial Attack from Low-Level Features0
Transferable Learned Image Compression-Resistant Adversarial Perturbations0
Transferable Perturbations of Deep Feature Distributions0
Transferable Physical Attack against Object Detection with Separable Attention0
Tropical Attention: Neural Algorithmic Reasoning for Combinatorial Algorithms0
Trustworthy Actionable Perturbations0
Show:102550
← PrevPage 23 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified