SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 14511475 of 1808 papers

TitleStatusHype
Minority Reports Defense: Defending Against Adversarial Patches0
Transferable Perturbations of Deep Feature Distributions0
Towards Feature Space Adversarial AttackCode1
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model0
On the Optimal Interaction Range for Multi-Agent Systems Under Adversarial Attack0
Improved Adversarial Training via Learned Optimizer0
A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers0
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty0
Adversarial Attacks and Defenses: An Interpretation Perspective0
BERT-ATTACK: Adversarial Attack Against BERT Using BERTCode1
Headless Horseman: Adversarial Attacks on Transfer Learning Models0
Dynamic Knowledge Graph-based Dialogue Generation with Improved Adversarial Meta-Learning0
Adversarial Attack on Deep Learning-Based Splice LocalizationCode1
Active Sentence Learning by Adversarial Uncertainty Sampling in Discrete Space0
Extending Adversarial Attacks to Produce Adversarial Class Probability DistributionsCode0
Towards Transferable Adversarial Attack against Deep Face Recognition0
Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images0
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-RankingCode1
SimAug: Learning Robust Representations from 3D Simulation for Pedestrian Trajectory Prediction in Unseen CamerasCode0
BAE: BERT-based Adversarial Examples for Text ClassificationCode2
A Thorough Comparison Study on Adversarial Attacks and Defenses for Common Thorax Disease Classification in Chest X-rays0
Adversarial Imitation Attack0
Challenging the adversarial robustness of DNNs based on error-correcting output codes0
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible NoisesCode1
Solving Non-Convex Non-Differentiable Min-Max Games using Proximal Gradient Method0
Show:102550
← PrevPage 59 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified