SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 14011450 of 1808 papers

TitleStatusHype
Second-Order NLP Adversarial ExamplesCode0
A Study for Universal Adversarial Attacks on Texture Recognition0
CorrAttack: Black-box Adversarial Attack with Structured Search0
A Deep Genetic Programming based Methodology for Art Media Classification Robust to Adversarial Perturbations0
An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood0
Adversarial Attacks Against Deep Learning Systems for ICD-9 Code Assignment0
Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations0
Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers0
Adversarial Exposure Attack on Diabetic Retinopathy Imagery Grading0
Bias Field Poses a Threat to DNN-based X-Ray Recognition0
Learning to Attack: Towards Textual Adversarial Attacking in Real-world Situations0
Adversarial Rain Attack and Defensive Deraining for DNN Perception0
MultAV: Multiplicative Adversarial Videos0
Label Smoothing and Adversarial Robustness0
Decision-based Universal Adversarial AttackCode0
Switching Transferable Gradient Directions for Query-Efficient Black-Box Adversarial AttacksCode0
Input Hessian Regularization of Neural Networks0
A black-box adversarial attack for poisoning clusteringCode0
Adversarial attacks on deep learning models for fatty liver disease classification by modification of ultrasound image reconstruction method0
Adversarially Robust Neural Architectures0
Adversarial Eigen Attack on Black-Box Models0
SIGL: Securing Software Installations Through Deep Graph Learning0
Point Adversarial Self Mining: A Simple Method for Facial Expression Recognition0
An Adversarial Attack Defending System for Securing In-Vehicle Networks0
PermuteAttack: Counterfactual Explanation of Machine Learning Credit ScorecardsCode0
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses0
A New Perspective on Stabilizing GANs training: Direct Adversarial TrainingCode0
Accelerated Zeroth-Order and First-Order Momentum Methods from Mini to Minimax Optimization0
Improving adversarial robustness of deep neural networks by using semantic information0
Model Robustness with Text Classification: Semantic-preserving adversarial attacks0
FireBERT: Hardening BERT-based classifiers against adversarial attackCode0
Visual Attack and Defense on Text0
Stabilizing Deep Tomographic Reconstruction0
Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks0
Physical Adversarial Attack on Vehicle Detector in the Carla Simulator0
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs0
Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data0
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning0
Towards Accuracy-Fairness Paradox: Adversarial Example-based Data Augmentation for Visual Debiasing0
From Sound Representation to Model Robustness0
Adversarial Privacy-preserving FilterCode0
T-BFA: Targeted Bit-Flip Adversarial Weight AttackCode0
Exploiting vulnerabilities of deep neural networks for privacy protectionCode0
DDR-ID: Dual Deep Reconstruction Networks Based Image Decomposition for Anomaly Detection0
Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense0
Accelerated Stochastic Gradient-free and Projection-free MethodsCode0
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack0
Generating Adversarial Inputs Using A Black-box Differential Technique0
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs0
On Data Augmentation and Adversarial Risk: An Empirical Analysis0
Show:102550
← PrevPage 29 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified