SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 9761000 of 1808 papers

TitleStatusHype
Robust Constrained Reinforcement Learning0
Robust Deep Learning Models Against Semantic-Preserving Adversarial Attack0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey0
Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack0
Robustness of Bayesian Neural Networks to White-Box Adversarial Attacks0
Robustness of Explanation Methods for NLP Models0
Testing robustness of predictions of trained classifiers against naturally occurring perturbations0
Robustness of Selected Learning Models under Label-Flipping Attack0
Robust Optimal Power Flow Against Adversarial Attacks: A Tri-Level Optimization Approach0
Robust Physical-World Attacks on Face Recognition0
Robust saliency maps with distribution-preserving decoys0
SecureSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition0
Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness0
Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack0
Robust Superpixel-Guided Attentional Adversarial Attack0
Robust Text CAPTCHAs Using Adversarial Examples0
Robust Transfer Learning with Pretrained Language Models through Adapters0
Robust Unpaired Single Image Super-Resolution of Faces0
Toward Enhanced Robustness in Unsupervised Graph Representation Learning: A Graph Information Bottleneck Perspective0
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp0
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints0
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation0
SAD: Saliency-based Defenses Against Adversarial Examples0
Safeguarding Vision-Language Models Against Patched Visual Prompt Injectors0
Show:102550
← PrevPage 40 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified