SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 17761800 of 1808 papers

TitleStatusHype
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks0
Enhancing Transferability of Adversarial Attacks with GE-AdvGAN+: A Comprehensive Framework for Gradient Editing0
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier0
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling0
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms0
An Empirical Study on Adversarial Attack on NMT: Languages and Positions Matter0
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models0
Adversarial Attack by Limited Point Cloud Surface Modifications0
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization0
EVALOOP: Assessing LLM Robustness in Programming from a Self-consistency Perspective0
Stochastic Variance Reduced Ensemble Adversarial Attack0
Evaluating Adversarial Robustness on Document Image Classification0
Adversarial Attack Based on Prediction-Correction0
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication0
Evaluating Neural Model Robustness for Machine Comprehension0
Attacking c-MARL More Effectively: A Data Driven Approach0
Evaluating Similitude and Robustness of Deep Image Denoising Models via Adversarial Attack0
Strategically-timed State-Observation Attacks on Deep Reinforcement Learning Agents0
Unlearning or Concealment? A Critical Analysis and Evaluation Metrics for Unlearning in Diffusion Models0
Evaluating the Robustness of LiDAR Point Cloud Tracking Against Adversarial Attack0
Strong Black-box Adversarial Attacks on Unsupervised Machine Learning Models0
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs0
Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement Analysis0
Evaluation of Momentum Diverse Input Iterative Fast Gradient Sign Method (M-DI2-FGSM) Based Attack Method on MCS 2018 Adversarial Attacks on Black Box Face Recognition System0
Show:102550
← PrevPage 72 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified