SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 876900 of 1808 papers

TitleStatusHype
Decision-BADGE: Decision-based Adversarial Batch Attack with Directional Gradient EstimationCode0
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit CalibrationCode0
Adversarial Sampling for Fairness Testing in Deep Neural Network0
Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models0
Targeted Adversarial Attacks against Neural Machine TranslationCode0
AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems0
Adversarial Attack with Raindrops0
Contextual adversarial attack against aerial detection in the physical world0
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data Augmentation0
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks0
Boosting Adversarial Transferability using Dynamic Cues0
Variation Enhanced Attacks Against RRAM-based Neuromorphic Computing System0
An Incremental Gray-box Physical Adversarial Attack on Neural Network Training0
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective0
Towards Safer Generative Language Models: A Survey on Safety Risks, Evaluations, and Improvements0
Graph Adversarial Immunization for Certifiable RobustnessCode0
Threatening Patch Attacks on Object Detection in Optical Remote Sensing ImagesCode0
TextDefense: Adversarial Text Detection based on Word Importance Entropy0
Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend0
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification0
TransFool: An Adversarial Attack against Neural Machine Translation ModelsCode0
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks0
The Impacts of Unanswerable Questions on the Robustness of Machine Reading Comprehension Models0
Identifying Adversarially Attackable and Robust SamplesCode0
Improving Adversarial Transferability with Scheduled Step Size and Dual Example0
Show:102550
← PrevPage 36 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified