SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13011325 of 1808 papers

TitleStatusHype
Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification0
Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?0
Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery DetectionCode1
Object Hider: Adversarial Patch Attack Against Object DetectorsCode1
GreedyFool: Distortion-Aware Sparse Adversarial AttackCode1
Maximum Mean Discrepancy Test is Aware of Adversarial AttacksCode1
An Efficient Adversarial Attack for Tree EnsemblesCode1
Defense-guided Transferable Adversarial Attacks0
Rewriting Meaningful Sentences via Conditional BERT Sampling and an application on fooling text classifiers0
Learning Black-Box Attackers with Transferable Priors and Query FeedbackCode0
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set0
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic TradersCode1
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing0
Generalizing Universal Adversarial Attacks Beyond Additive PerturbationsCode1
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning0
Explain2Attack: Text Adversarial Attacks via Cross-Domain InterpretabilityCode0
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial AttackCode0
Towards Resistant Audio Adversarial ExamplesCode1
An Evasion Attack against Stacked Capsule AutoencoderCode0
Learning to Attack with Fewer Pixels: A Probabilistic Post-hoc Framework for Refining Arbitrary Dense Adversarial Attacks0
An Analysis of Robustness of Non-Lipschitz NetworksCode0
EFSG: Evolutionary Fooling Sentences Generator0
Learning Task-aware Robust Deep Learning Systems0
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems0
Adversarial attacks on audio source separation0
Show:102550
← PrevPage 53 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified