SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 576600 of 1808 papers

TitleStatusHype
Adversarial Exposure Attack on Diabetic Retinopathy Imagery Grading0
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models0
A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models0
Adversarial Attack by Limited Point Cloud Surface Modifications0
Architecture Selection via the Trade-off Between Accuracy and Robustness0
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement0
Adversarial Attack Based on Prediction-Correction0
Adversarial Examples in Deep Learning: Characterization and Divergence0
Improving VAEs' Robustness to Adversarial Attack0
A Practical and Stealthy Adversarial Attack for Cyber-Physical Applications0
A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems0
Effective faking of verbal deception detection with target-aligned adversarial attacks0
Effects of Forward Error Correction on Communications Aware Evasion Attacks0
Applying Tensor Decomposition to image for Robustness against Adversarial Attack0
Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks0
Application of Adversarial Examples to Physical ECG Signals0
Adversarial Examples for Model-Based Control: A Sensitivity Analysis0
Active Sentence Learning by Adversarial Uncertainty Sampling in Discrete Space0
Physical-World Optical Adversarial Attacks on 3D Face Recognition0
Adversarial Example Detection Using Latent Neighborhood Graph0
A Perceptual Distortion Reduction Framework: Towards Generating Adversarial Examples with High Perceptual Quality and Attack Success Rate0
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning0
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique0
Anti-Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization0
Adversarial Attack and Defense on Point Sets0
Show:102550
← PrevPage 24 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified