SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 926950 of 1808 papers

TitleStatusHype
A Generative Adversarial Attack for Multilingual Text Classifiers0
Imperceptible CMOS camera dazzle for adversarial attacks on deep neural networks0
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification0
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation0
Implicit Euler Skip Connections: Enhancing Adversarial Robustness via Numerical Stability0
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language Models0
Improved Adversarial Training via Learned Optimizer0
Utilizing Adversarial Targeted Attacks to Boost Adversarial Robustness0
A General Black-box Adversarial Attack on Graph-based Fake News Detectors0
Improving adversarial robustness of deep neural networks by using semantic information0
AGATE: Stealthy Black-box Watermarking for Multimodal Model Copyright Protection0
Enhancing Transferability of Adversarial Examples with Spatial Momentum0
Improving Adversarial Transferability with Scheduled Step Size and Dual Example0
Improving Deep Learning Model Robustness Against Adversarial Attack by Increasing the Network Capacity0
Improving Gradient-based Adversarial Training for Text Classification by Contrastive Learning and Auto-Encoder0
Improving Network Interpretability via Explanation Consistency Evaluation0
Improving Neural Network Robustness through Neighborhood Preserving Layers0
A Framework for Verification of Wasserstein Adversarial Robustness0
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator0
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks0
Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations0
Improving Robustness of Task Oriented Dialog Systems0
ODE guided Neural Data Augmentation Techniques for Time Series Data and its Benefits on Robustness0
A Framework for Understanding Model Extraction Attack and Defense0
The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection0
Show:102550
← PrevPage 38 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified