SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 16511675 of 1808 papers

TitleStatusHype
Mitigating Deep Learning Vulnerabilities from Adversarial Examples Attack in the Cybersecurity Domain0
CharBot: A Simple and Effective Method for Evading DGA Classifiers0
Weight Map Layer for Noise and Adversarial Attack Robustness0
POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm0
NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural NetworksCode0
CAMOU: Learning Physical Vehicle Camouflages to Adversarially Attack Detectors in the WildCode0
NATTACK: A STRONG AND UNIVERSAL GAUSSIAN BLACK-BOX ADVERSARIAL ATTACK0
Second-Order Adversarial Attack and Certifiable Robustness0
Adversarial Training for Free!Code1
Minimizing Perceived Image Quality Loss Through Adversarial Attack Scoping0
blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness0
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural NetworksCode0
Defensive Quantization: When Efficiency Meets Robustness0
AT-GAN: An Adversarial Generator Model for Non-constrained Adversarial Examples0
Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense0
Black-Box Decision based Adversarial Attack with Symmetric α-stable Distribution0
Towards Analyzing Semantic Robustness of Deep Neural NetworksCode0
HopSkipJumpAttack: A Query-Efficient Decision-Based AttackCode0
Curls & Whey: Boosting Black-Box Adversarial AttacksCode0
Adversarial Attacks against Deep Saliency Models0
Learning to Defense by Learning to Attack0
Text Processing Like Humans Do: Visually Attacking and Shielding NLP SystemsCode0
Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacksCode0
Defending against Whitebox Adversarial Attacks via Randomized DiscretizationCode0
The LogBarrier adversarial attack: making effective use of decision boundary informationCode0
Show:102550
← PrevPage 67 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1ResNet20Test Accuracy89.9589.95(1)Community Verified
2Xu et al.Attack: PGD2078.68Unverified
33-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
4TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
5AdvTraining [madry2018]Attack: PGD2048.44Unverified
6TRADES [zhang2019b]Attack: PGD2045.9Unverified
7XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified