SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 15261550 of 1808 papers

TitleStatusHype
Imperceptible Face Forgery Attack via Adversarial Semantic MaskCode0
Adversarial Attack for RGB-Event based Visual Object TrackingCode0
Adversarial Attack and Defense on Graph Data: A SurveyCode0
Improved Adversarial Training Through Adaptive Instance-wise Loss SmoothingCode0
Provable defenses against adversarial examples via the convex outer adversarial polytopeCode0
Improved Network Robustness with Adversary CriticCode0
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function PriorCode0
HopSkipJumpAttack: A Query-Efficient Decision-Based AttackCode0
Efficient and Transferable Adversarial Examples from Bayesian Neural NetworksCode0
Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion ModelsCode0
Boosting Adversarial Transferability via Fusing Logits of Top-1 Decomposed FeatureCode0
Robustness for Non-Parametric Classification: A Generic Attack and DefenseCode0
Pyramid Adversarial Training Improves ViT PerformanceCode0
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition SystemsCode0
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and ChallengesCode0
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial ExamplesCode0
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign ClassificationCode0
Improving Robustness of Deep Reinforcement Learning Agents: Environment Attack based on the Critic NetworkCode0
Cluster Attack: Query-based Adversarial Attacks on Graphs with Graph-Dependent PriorsCode0
Query-Efficient Adversarial Attack Against Vertical Federated Graph LearningCode0
Query-Efficient Adversarial Attack Based on Latin Hypercube SamplingCode0
Dynamic Transformers Provide a False Sense of EfficiencyCode0
Improving the Generalization of Adversarial Training with Domain AdaptationCode0
Query-Efficient Black-box Adversarial Examples (superceded)Code0
Improving the robustness and accuracy of biomedical language models through adversarial trainingCode0
Show:102550
← PrevPage 62 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1ResNet20Test Acc90.190.1(1)Community Verified
2ResNet20Test Accuracy89.9589.95(1)Community Verified
3ResNet20Test Acc89.590.1(1)Community Verified
4Xu et al.Attack: PGD2078.68Unverified
53-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
6TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
7AdvTraining [madry2018]Attack: PGD2048.44Unverified
8TRADES [zhang2019b]Attack: PGD2045.9Unverified
9XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
1ResNet20Test Acc80.4Community Verified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
3multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified