SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 16511675 of 1808 papers

TitleStatusHype
Accelerating Monte Carlo Bayesian Inference via Approximating Predictive Uncertainty over SimplexCode0
Zeroth-Order Stochastic Alternating Direction Method of Multipliers for Nonconvex Nonsmooth Optimization0
Functional Adversarial AttacksCode0
Scaleable input gradient regularization for adversarial robustnessCode0
Thwarting finite difference adversarial attacks with output randomization0
DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks0
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer DomainCode0
A critique of the DeepSec Platform for Security Analysis of Deep Learning Models0
Harnessing the Vulnerability of Latent Layers in Adversarially Trained ModelsCode0
Exact Adversarial Attack to Image Captioning via Structured Output Learning with Latent VariablesCode0
Interpreting and Evaluating Neural Network Robustness0
Mitigating Deep Learning Vulnerabilities from Adversarial Examples Attack in the Cybersecurity Domain0
CharBot: A Simple and Effective Method for Evading DGA Classifiers0
Weight Map Layer for Noise and Adversarial Attack Robustness0
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural NetworksCode0
NATTACK: A STRONG AND UNIVERSAL GAUSSIAN BLACK-BOX ADVERSARIAL ATTACK0
Second-Order Adversarial Attack and Certifiable Robustness0
CAMOU: Learning Physical Vehicle Camouflages to Adversarially Attack Detectors in the WildCode0
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm0
Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping0
blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness0
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural NetworksCode0
Defensive Quantization: When Efficiency Meets Robustness0
AT-GAN: An Adversarial Generator Model for Non-constrained Adversarial Examples0
Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense0
Show:102550
← PrevPage 67 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified