SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 12261250 of 1808 papers

TitleStatusHype
FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection0
Frequency-aware GAN for Adversarial Manipulation Generation0
Frequency-Tuned Universal Adversarial Attacks0
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks0
From Sound Representation to Model Robustness0
GAIM: Attacking Graph Neural Networks via Adversarial Influence Maximization0
GasHis-Transformer: A Multi-scale Visual Transformer Approach for Gastric Histopathological Image Detection0
Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment0
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments0
Generalization to Mitigate Synonym Substitution Attacks0
Generating Adversarial Attacks in the Latent Space0
Generating Adversarial Examples with an Optimized Quality0
Generating Adversarial Inputs Using A Black-box Differential Technique0
Generating Black-Box Adversarial Examples in Sparse Domain0
Generating Out of Distribution Adversarial Attack using Latent Space Poisoning0
Generating Semantic Adversarial Examples via Feature Manipulation0
Generating Semantically Valid Adversarial Questions for TableQA0
Generating Unrestricted Adversarial Examples via Three Parameters0
Generating Valid and Natural Adversarial Examples with Large Language Models0
Generating Watermarked Adversarial Texts0
Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing0
Generative Adversarial Patches for Physical Attacks on Cross-Modal Pedestrian Re-Identification0
Global Robustness Verification Networks0
Golden Ratio Search: A Low-Power Adversarial Attack for Deep Learning based Modulation Classification0
Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world0
Show:102550
← PrevPage 50 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified