SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 951975 of 1808 papers

TitleStatusHype
Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing0
The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness0
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation0
THE EFFECT OF ADVERSARIAL TRAINING: A THEORETICAL CHARACTERIZATION0
Improving the Transferability of Adversarial Attacks on Face Recognition with Beneficial Perturbation Feature Augmentation0
Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature Mixing0
Improving Visual Quality and Transferability of Adversarial Attacks on Face Recognition Simultaneously with Adversarial Restoration0
Improving Visual Quality of Unrestricted Adversarial Examples with Wavelet-VAE0
Influence Based Defense Against Data Poisoning Attacks in Online Learning0
"Influence Sketching": Finding Influential Samples In Large-Scale Regressions0
Information Importance-Aware Defense against Adversarial Attack for Automatic Modulation Classification:An XAI-Based Approach0
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction0
Inline Detection of DGA Domains Using Side Information0
Input Hessian Regularization of Neural Networks0
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain0
Input-specific Attention Subnetworks for Adversarial Detection0
Input-specific Attention Subnetworks for Adversarial Detection0
The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI0
Intermediate Level Adversarial Attack for Enhanced Transferability0
Intermediate Outputs Are More Sensitive Than You Think0
Internal Wasserstein Distance for Adversarial Attack and Defense0
Interpolation between CNNs and ResNets0
A Framework for Adversarial Analysis of Decision Support Systems Prior to Deployment0
Interpreting and Evaluating Neural Network Robustness0
Interpreting Hidden Semantics in the Intermediate Layers of 3D Point Cloud Classification Neural Network0
Show:102550
← PrevPage 39 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified