SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 14511500 of 1808 papers

TitleStatusHype
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain0
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment0
Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial AttacksCode0
Query-Free Adversarial Transfer via Undertrained Surrogates0
Generating Adversarial Examples with an Optimized Quality0
Adversarial Attacks for Multi-view Deep Models0
Local Competition and Uncertainty for Adversarial Robustness in Deep Learning0
REGroup: Rank-aggregating Ensemble of Generative Classifiers for Robust PredictionsCode0
OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training0
Classifier-independent Lower-Bounds for Adversarial Robustness0
D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack0
Adversarial Attack Vulnerability of Medical Image Analysis Systems: Unexplored FactorsCode0
On the Tightness of Semidefinite Relaxations for Certifying Robustness to Adversarial Examples0
Global Robustness Verification Networks0
What Machines See Is Not What They Get: Fooling Scene Text Recognition Models With Adversarial Text Images0
ILFO: Adversarial Attack on Adaptive Neural Networks0
Modeling Biological Immunity to Adversarial Examples0
One-Shot Adversarial Attacks on Visual Tracking With Dual Attention0
Polishing Decision-Based Adversarial Noise With a Customized Sampling0
Robust Superpixel-Guided Attentional Adversarial Attack0
Evaluations and Methods for Explanation through Robustness Analysis0
Effects of Forward Error Correction on Communications Aware Evasion Attacks0
Generating Semantically Valid Adversarial Questions for TableQA0
Adversarial Attack on Hierarchical Graph Pooling Neural Networks0
Investigating Vulnerability to Adversarial Examples on Multimodal Data Fusion in Deep Learning0
Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack0
An Adversarial Approach for Explaining the Predictions of Deep Neural NetworksCode0
Universalization of any adversarial attack using very few test examplesCode0
Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning0
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers0
Class-Aware Domain Adaptation for Improving Adversarial Robustness0
AN-GCN: An Anonymous Graph Convolutional Network Defense Against Edge-Perturbing Attack0
Depth-2 Neural Networks Under a Data-Poisoning AttackCode0
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier0
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability0
Minority Reports Defense: Defending Against Adversarial Patches0
Transferable Perturbations of Deep Feature Distributions0
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model0
On the Optimal Interaction Range for Multi-Agent Systems Under Adversarial Attack0
Improved Adversarial Training via Learned Optimizer0
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty0
A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers0
Adversarial Attacks and Defenses: An Interpretation Perspective0
Headless Horseman: Adversarial Attacks on Transfer Learning Models0
Dynamic Knowledge Graph-based Dialogue Generation with Improved Adversarial Meta-Learning0
Active Sentence Learning by Adversarial Uncertainty Sampling in Discrete Space0
Extending Adversarial Attacks to Produce Adversarial Class Probability DistributionsCode0
Towards Transferable Adversarial Attack against Deep Face Recognition0
Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images0
SimAug: Learning Robust Representations from 3D Simulation for Pedestrian Trajectory Prediction in Unseen CamerasCode0
Show:102550
← PrevPage 30 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified