SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 11011125 of 1808 papers

TitleStatusHype
Discriminator-Free Generative Adversarial AttackCode1
Examining the Human Perceptibility of Black-Box Adversarial Attacks on Face Recognition0
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features0
Self-Supervised Contrastive Learning with Adversarial Perturbations for Defending Word Substitution-based AttacksCode0
Adversarial Attack for Uncertainty Estimation: Identifying Critical Regions in Neural Networks0
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning0
Using BERT Encoding to Tackle the Mad-lib Attack in SMS Spam DetectionCode0
EvoBA: An Evolution Strategy as a Strong Baseline forBlack-Box Adversarial AttacksCode0
Noise-based cyberattacks generating fake P300 waves in brain–computer interfacesCode0
Learning to Detect Adversarial Examples Based on Class Scores0
Analytically Tractable Hidden-States Inference in Bayesian Neural Networks0
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples0
DVS-Attacks: Adversarial Attacks on Dynamic Vision Sensors for Spiking Neural NetworksCode0
Bio-Inspired Adversarial Attack Against Deep Neural Networks0
In-distribution adversarial attacks on object recognition models using gradient-free searchCode0
Attack Transferability Characterization for Adversarially Robust Multi-label ClassificationCode0
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack0
Adversarial Attack on Graph Neural Networks as An Influence Maximization ProblemCode1
Attack to Fool and Explain Deep Networks0
Strategically-timed State-Observation Attacks on Deep Reinforcement Learning Agents0
Is It Time to Redefine the Classification Task for Deep Learning Systems?0
Adversarial Interaction Attacks: Fooling AI to Misinterpret Human Intentions0
Limited Budget Adversarial Attack Against Online Image Stream0
Light Lies: Optical Adversarial Attack0
Now You See It, Now You Dont: Adversarial Vulnerabilities in Computational Pathology0
Show:102550
← PrevPage 45 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified