SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 651675 of 1808 papers

TitleStatusHype
Feature Space Perturbations Yield More Transferable Adversarial ExamplesCode0
Transferability Bound Theory: Exploring Relationship between Adversarial Transferability and FlatnessCode0
2D-Malafide: Adversarial Attacks Against Face Deepfake Detection SystemsCode0
Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systemsCode0
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of ArtifactsCode0
FDA: Feature Disruptive AttackCode0
Fast Adversarial CNN-based Perturbation Attack of No-Reference Image Quality MetricsCode0
Fashion-Guided Adversarial Attack on Person SegmentationCode0
Adversarial Attacks on Deep Neural Networks for Time Series ClassificationCode0
Fast Inference of Removal-Based Node InfluenceCode0
Generating Unrestricted 3D Adversarial Point CloudsCode0
Explaining Adversarial Robustness of Neural Networks from Clustering Effect PerspectiveCode0
Controversial stimuli: pitting neural networks against each other as models of human recognitionCode0
AICAttack: Adversarial Image Captioning Attack with Attention-Based OptimizationCode0
Exploiting vulnerabilities of deep neural networks for privacy protectionCode0
Expanding Scope: Adapting English Adversarial Attacks to ChineseCode0
Accelerating Monte Carlo Bayesian Inference via Approximating Predictive Uncertainty over SimplexCode0
DVS-Attacks: Adversarial Attacks on Dynamic Vision Sensors for Spiking Neural NetworksCode0
Explainable and Safe Reinforcement Learning for Autonomous Air MobilityCode0
Dynamically Disentangling Social Bias from Task-Oriented Representations with Adversarial AttackCode0
A Hierarchical Feature Constraint to Camouflage Medical Adversarial AttacksCode0
Excess Capacity and Backdoor PoisoningCode0
New Adversarial Image Detection Based on Sentiment AnalysisCode0
Dynamics-aware Adversarial Attack of 3D Sparse Convolution NetworkCode0
Explainable Graph Neural Networks Under FireCode0
Show:102550
← PrevPage 27 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified