SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 876900 of 1808 papers

TitleStatusHype
Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks0
Benchmarking Adversarial Robustness0
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline0
Generating Black-Box Adversarial Examples in Sparse Domain0
Harmonic Adversarial Attack Method0
Generating Adversarial Inputs Using A Black-box Differential Technique0
Generating Adversarial Examples with an Optimized Quality0
Generating Adversarial Attacks in the Latent Space0
Benchmarking Adversarially Robust Quantum Machine Learning at Scale0
Adversarial Attack on Skeleton-based Human Action Recognition0
Heating up decision boundaries: isocapacitory saturation, adversarial scenarios and generalization bounds0
Generalization to Mitigate Synonym Substitution Attacks0
Heterogeneous Architecture Search Approach within Adversarial Dynamic Defense Framework0
Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks0
BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization0
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments0
Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment0
Hiding Backdoors within Event Sequence Data via Poisoning Attacks0
CE-based white-box adversarial attacks will not work using super-fitting0
Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs0
Adversarial Attack on Sentiment Classification0
A Deep Genetic Programming based Methodology for Art Media Classification Robust to Adversarial Perturbations0
A Black-Box Attack on Optical Character Recognition Systems0
GasHis-Transformer: A Multi-scale Visual Transformer Approach for Gastric Histopathological Image Detection0
GAIM: Attacking Graph Neural Networks via Adversarial Influence Maximization0
Show:102550
← PrevPage 36 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified