SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 751775 of 1808 papers

TitleStatusHype
Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks0
Natural Color Fool: Towards Boosting Black-box Unrestricted AttacksCode1
Jitter Does Matter: Adapting Gaze Estimation to New Domains0
Robust Fair Clustering: A Novel Fairness Attack and Defense FrameworkCode0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
On Attacking Out-Domain Uncertainty Estimation in Deep Neural Networks0
PlugAT: A Plug and Play Module to Defend against Textual Adversarial Attack0
Can We Really Trust Explanations? Evaluating the Stability of Feature Attribution Explanation Methods via Adversarial Attack0
Physical Adversarial Attack meets Computer Vision: A Decade SurveyCode1
Hiding Visual Information via Obfuscating Adversarial PerturbationsCode1
A Survey on Physical Adversarial Attack in Computer Vision0
Activation Learning by Local Competitions0
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution LearningCode1
Fair Robust Active Learning by Joint Inconsistency0
Adversarial Color Projection: A Projector-based Physical Attack to DNNs0
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction0
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition modelsCode0
TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective AttackCode1
Robust Constrained Reinforcement Learning0
PointACL:Adversarial Contrastive Learning for Robust Point Clouds Representation under Adversarial AttackCode0
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking ModelsCode1
ADMM based Distributed State Observer Design under Sparse Sensor Attacks0
PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models0
Sample Complexity of an Adversarial Attack on UCB-based Best-arm Identification Policy0
Generate synthetic samples from tabular dataCode0
Show:102550
← PrevPage 31 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified