SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13511375 of 1808 papers

TitleStatusHype
Learn2Weight: Weights Transfer Defense against Similar-domain Adversarial Attacks0
Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations0
Learning deep forest with multi-scale Local Binary Pattern features for face anti-spoofing0
Learning Globally Optimized Language Structure via Adversarial Training0
Learning Key Steps to Attack Deep Reinforcement Learning Agents0
Learning to Attack: Towards Textual Adversarial Attacking in Real-world Situations0
Learning to Defend by Learning to Attack0
Learning to Defense by Learning to Attack0
Learning to Detect Adversarial Examples Based on Class Scores0
Left-right Discrepancy for Adversarial Attack on Stereo Networks0
Less is More: A Stealthy and Efficient Adversarial Attack Method for DRL-based Autonomous Driving Policies0
Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend0
LFAA: Crafting Transferable Targeted Adversarial Examples with Low-Frequency Perturbations0
Light Lies: Optical Adversarial Attack0
Limited Budget Adversarial Attack Against Online Image Stream0
Linear Backpropagation Leads to Faster Convergence0
Linear system security -- detection and correction of adversarial attacks in the noise-free case0
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper0
Local Competition and Stochasticity for Adversarial Robustness in Deep Learning0
Local Competition and Uncertainty for Adversarial Robustness in Deep Learning0
Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification0
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model0
Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability0
L_p-norm Distortion-Efficient Adversarial Attack0
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set0
Show:102550
← PrevPage 55 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1ResNet20Test Accuracy89.9589.95(1)Community Verified
2Xu et al.Attack: PGD2078.68Unverified
33-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
4TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
5AdvTraining [madry2018]Attack: PGD2048.44Unverified
6TRADES [zhang2019b]Attack: PGD2045.9Unverified
7XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified