SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 101125 of 1808 papers

TitleStatusHype
CosPGD: an efficient white-box adversarial attack for pixel-wise prediction tasksCode1
On the Adversarial Robustness of Camera-based 3D Object DetectionCode1
Proximal Splitting Adversarial Attack for Semantic SegmentationCode1
Boosting Adversarial Transferability via Gradient Relevance AttackCode1
RIATIG: Reliable and Imperceptible Adversarial Text-to-Image Generation With Natural PromptsCode1
Generalizable Black-Box Adversarial Attack with Meta LearningCode1
Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch AttacksCode1
Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face RecognitionCode1
HOTCOLD Block: Fooling Thermal Infrared Detectors with a Novel Wearable DesignCode1
Imperceptible Adversarial Attack via Invertible Neural NetworksCode1
SAGA: Spectral Adversarial Geometric Attack on 3D MeshesCode1
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box AttackCode1
T-SEA: Transfer-based Self-Ensemble Attack on Object DetectionCode1
MORA: Improving Ensemble Robustness Evaluation with Model-Reweighing AttackCode1
Preserving Semantics in Textual Adversarial AttacksCode1
Are AlphaZero-like Agents Robust to Adversarial Perturbations?Code1
Rethinking Image Restoration for Object DetectionCode1
Rethinking and Improving Robustness of Convolutional Neural Networks: a Shapley Value-based Approach in Frequency DomainCode1
Universal Perturbation Attack on Differentiable No-Reference Image- and Video-Quality MetricsCode1
Character-level White-Box Adversarial Attacks against Transformers via Attachable Subwords SubstitutionCode1
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial PerturbationCode1
Natural Color Fool: Towards Boosting Black-box Unrestricted AttacksCode1
Physical Adversarial Attack meets Computer Vision: A Decade SurveyCode1
Hiding Visual Information via Obfuscating Adversarial PerturbationsCode1
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution LearningCode1
Show:102550
← PrevPage 5 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified