SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 10511075 of 1808 papers

TitleStatusHype
Empirical Study of the Decision Region and Robustness in Deep Neural Networks0
Neural Networks Playing Dough: Investigating Deep Cognition With a Gradient-Based Adversarial Attack0
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks0
NODEAttack: Adversarial Attack on the Energy Consumption of Neural ODEs0
Fooling Adversarial Training with Induction Noise0
One for Many: an Instagram inspired black-box adversarial attack0
Rethinking Adversarial Transferability from a Data Distribution Perspective0
Cluster Attack: Query-based Adversarial Attacks on Graphs with Graph-Dependent PriorsCode0
Breaking BERT: Understanding its Vulnerabilities for Named Entity Recognition through Adversarial AttackCode0
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers0
Robust Physical-World Attacks on Face Recognition0
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial AttackCode1
Universal Adversarial Attack on Deep Learning Based Prognostics0
Improving Gradient-based Adversarial Training for Text Classification by Contrastive Learning and Auto-Encoder0
PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification ModelsCode1
A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems0
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator0
Differential Privacy in Personalized Pricing with Nonparametric Demand Models0
Energy Attack: On Transferring Adversarial Examples0
Multi-granularity Textual Adversarial Attack with Behavior CloningCode1
Protein Folding Neural Networks Are Not Robust0
Membership Inference Attacks Against Temporally Correlated Data in Deep Reinforcement Learning0
Training Meta-Surrogate Model for Transferable Adversarial AttackCode0
Real-World Adversarial Examples involving Makeup Application0
Utilizing Adversarial Targeted Attacks to Boost Adversarial Robustness0
Show:102550
← PrevPage 43 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified