SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13511375 of 1808 papers

TitleStatusHype
A black-box adversarial attack for poisoning clusteringCode0
Adversarial Attack on Large Scale GraphCode1
Adversarial attacks on deep learning models for fatty liver disease classification by modification of ultrasound image reconstruction method0
Adversarially Robust Neural Architectures0
Adversarial Eigen Attack on Black-Box Models0
Point Adversarial Self Mining: A Simple Method for Facial Expression Recognition0
SIGL: Securing Software Installations Through Deep Graph Learning0
An Adversarial Attack Defending System for Securing In-Vehicle Networks0
PermuteAttack: Counterfactual Explanation of Machine Learning Credit ScorecardsCode0
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses0
A New Perspective on Stabilizing GANs training: Direct Adversarial TrainingCode0
Accelerated Zeroth-Order and First-Order Momentum Methods from Mini to Minimax Optimization0
Adversarial Attack and Defense Strategies for Deep Speaker Recognition SystemsCode1
Improving adversarial robustness of deep neural networks by using semantic information0
Model Robustness with Text Classification: Semantic-preserving adversarial attacks0
FireBERT: Hardening BERT-based classifiers against adversarial attackCode0
Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text AttacksCode1
Visual Attack and Defense on Text0
Robust Deep Reinforcement Learning through Adversarial LossCode1
Stabilizing Deep Tomographic Reconstruction0
Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks0
Sparse Adversarial Attack via Perturbation FactorizationCode1
SemanticAdv: Generating Adversarial Examples via Attribute-conditioned Image EditingCode1
SimAug: Learning Robust Representations from Simulation for Trajectory PredictionCode1
Physical Adversarial Attack on Vehicle Detector in the Carla Simulator0
Show:102550
← PrevPage 55 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified