SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13011350 of 1808 papers

TitleStatusHype
Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification0
Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?0
Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery DetectionCode1
Object Hider: Adversarial Patch Attack Against Object DetectorsCode1
GreedyFool: Distortion-Aware Sparse Adversarial AttackCode1
Maximum Mean Discrepancy Test is Aware of Adversarial AttacksCode1
An Efficient Adversarial Attack for Tree EnsemblesCode1
Defense-guided Transferable Adversarial Attacks0
Rewriting Meaningful Sentences via Conditional BERT Sampling and an application on fooling text classifiers0
Learning Black-Box Attackers with Transferable Priors and Query FeedbackCode0
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set0
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic TradersCode1
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing0
Generalizing Universal Adversarial Attacks Beyond Additive PerturbationsCode1
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning0
Explain2Attack: Text Adversarial Attacks via Cross-Domain InterpretabilityCode0
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial AttackCode0
Towards Resistant Audio Adversarial ExamplesCode1
An Evasion Attack against Stacked Capsule AutoencoderCode0
Learning to Attack with Fewer Pixels: A Probabilistic Post-hoc Framework for Refining Arbitrary Dense Adversarial Attacks0
An Analysis of Robustness of Non-Lipschitz NetworksCode0
EFSG: Evolutionary Fooling Sentences Generator0
Learning Task-aware Robust Deep Learning Systems0
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems0
Adversarial attacks on audio source separation0
Adversarial Patch Attacks on Monocular Depth Estimation Networks0
Second-Order NLP Adversarial ExamplesCode0
A Study for Universal Adversarial Attacks on Texture Recognition0
Adversarial Attack and Defense of Structured Prediction ModelsCode1
CorrAttack: Black-box Adversarial Attack with Structured Search0
A Deep Genetic Programming based Methodology for Art Media Classification Robust to Adversarial Perturbations0
An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood0
Adversarial Attacks Against Deep Learning Systems for ICD-9 Code Assignment0
Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations0
Improving Query Efficiency of Black-box Adversarial AttackCode1
Adversarial Examples in Deep Learning for Multivariate Time Series RegressionCode1
Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers0
Stereopagnosia: Fooling Stereo Networks with Adversarial PerturbationsCode1
Adversarial Exposure Attack on Diabetic Retinopathy Imagery Grading0
Adversarial Rain Attack and Defensive Deraining for DNN Perception0
Learning to Attack: Towards Textual Adversarial Attacking in Real-world Situations0
Bias Field Poses a Threat to DNN-based X-Ray Recognition0
Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object DetectionCode1
OpenAttack: An Open-source Textual Adversarial Attack ToolkitCode1
MultAV: Multiplicative Adversarial Videos0
Label Smoothing and Adversarial Robustness0
Contextualized Perturbation for Textual Adversarial AttackCode1
Decision-based Universal Adversarial AttackCode0
Switching Transferable Gradient Directions for Query-Efficient Black-Box Adversarial AttacksCode0
Input Hessian Regularization of Neural Networks0
Show:102550
← PrevPage 27 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified