SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 876900 of 1808 papers

TitleStatusHype
Improving Network Interpretability via Explanation Consistency Evaluation0
Bias Field Poses a Threat to DNN-based X-Ray Recognition0
Deep Learning for Robust and Explainable Models in Computer Vision0
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment0
Harmonic Adversarial Attack Method0
Harmonicity Plays a Critical Role in DNN Based Versus in Biologically-Inspired Monaural Speech Segregation Systems0
Biologically inspired protection of deep networks from adversarial attacks0
Adversarial Attacks on Traffic Sign Recognition: A Survey0
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data Augmentation0
Hear No Evil: Towards Adversarial Robustness of Automatic Speech Recognition via Multi-Task Learning0
Heating up decision boundaries: isocapacitory saturation, adversarial scenarios and generalization bounds0
An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks0
Adversarial Attack Against Images Classification based on Generative Adversarial Networks0
Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks0
Black-box Adversarial Attacks against Dense Retrieval Models: A Multi-view Contrastive Learning Method0
HGAttack: Transferable Heterogeneous Graph Adversarial Attack0
Improving Gradient-based Adversarial Training for Text Classification by Contrastive Learning and Auto-Encoder0
Hiding Backdoors within Event Sequence Data via Poisoning Attacks0
Improving Neural Network Robustness through Neighborhood Preserving Layers0
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems0
Boosting Adversarial Transferability for Hyperspectral Image Classification Using 3D Structure-invariant Transformation and Intermediate Feature Distance0
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks0
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems0
Enhancing Transferability of Adversarial Examples with Spatial Momentum0
An Actor-Critic Method for Simulation-Based Optimization0
Show:102550
← PrevPage 36 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified