SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 601625 of 1808 papers

TitleStatusHype
AN-GCN: An Anonymous Graph Convolutional Network Defense Against Edge-Perturbing Attack0
A Non-monotonic Smooth Activation Function0
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Enhancing Transferability of Adversarial Attacks with GE-AdvGAN+: A Comprehensive Framework for Gradient Editing0
Evaluating Adversarial Robustness on Document Image Classification0
Evaluations and Methods for Explanation through Robustness Analysis0
Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense0
Adversarial defenses via a mixture of generators0
An Incremental Gray-box Physical Adversarial Attack on Neural Network Training0
Adversarial Defense based on Structure-to-Signal Autoencoders0
Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations0
An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks0
Adversarial Data Encryption0
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms0
DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning0
Adversarial Color Projection: A Projector-based Physical Attack to DNNs0
A critique of the DeepSec Platform for Security Analysis of Deep Learning Models0
Enhanced Urban Region Profiling with Adversarial Self-Supervised Learning for Robust Forecasting and Security0
Adversarial Body Shape Search for Legged Robots0
An Empirical Study on Adversarial Attack on NMT: Languages and Positions Matter0
Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features0
A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks0
Device-aware Optical Adversarial Attack for a Portable Projector-camera System0
Detecting and Segmenting Adversarial Graphics Patterns from Images0
Show:102550
← PrevPage 25 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified