Browse State-of-the-Art
Datasets
Methods
More
Newsletter
RC2022
About
Trends
Portals
Libraries
Sign In
Subscribe to the PwC Newsletter
×
Stay informed on the latest trending ML papers with code, research developments, libraries, methods, and datasets.
Read previous issues
Join the community
×
You need to
log in
to edit.
You can
create a new account
if you don't have one.
Browse SoTA
> Adversarial
Adversarial
34 benchmarks • 25 tasks • 26 datasets • 3116 papers with code
Classification
Classification
326 benchmarks
3267 papers with code
Text Classification
180 benchmarks
1110 papers with code
Graph Classification
69 benchmarks
382 papers with code
Audio Classification
23 benchmarks
135 papers with code
Medical Image Classification
8 benchmarks
125 papers with code
See all 19 tasks
Image Classification
Image Classification
456 benchmarks
3825 papers with code
Out of Distribution (OOD) Detection
3 benchmarks
235 papers with code
Few-Shot Image Classification
116 benchmarks
202 papers with code
Fine-Grained Image Classification
36 benchmarks
173 papers with code
Semi-Supervised Image Classification
69 benchmarks
124 papers with code
See all 28 tasks
2D Semantic Segmentation
Image Segmentation
3 benchmarks
1524 papers with code
Text Style Transfer
3 benchmarks
81 papers with code
Scene Parsing
60 benchmarks
76 papers with code
2D Semantic Segmentation
96 benchmarks
38 papers with code
Reflection Removal
5 benchmarks
29 papers with code
See all 15 tasks
Federated Learning
Federated Learning
19 benchmarks
1262 papers with code
Personalized Federated Learning
7 benchmarks
84 papers with code
Vertical Federated Learning
27 papers with code
Model Posioning
1 papers with code
Fairness
Fairness
3 benchmarks
1202 papers with code
Exposure Fairness
3 papers with code
Adversarial Attack
Adversarial Attack
2 benchmarks
603 papers with code
Backdoor Attack
145 papers with code
Adversarial Text
33 papers with code
Adversarial Attack Detection
14 papers with code
Real-World Adversarial Attack
11 papers with code
Adversarial Robustness
Adversarial Robustness
7 benchmarks
609 papers with code
Adversarial Defense
Adversarial Defense
12 benchmarks
179 papers with code
Provable Adversarial Defense
2 benchmarks
3 papers with code
Data Poisoning
Data Poisoning
124 papers with code
Inference Attack
Inference Attack
87 papers with code
Handwritten Text Recognition
Handwritten Text Recognition
10 benchmarks
46 papers with code
Handwritten Document Recognition
3 papers with code
Unsupervised Text Recognition
1 papers with code
Model extraction
Model extraction
1 benchmark
40 papers with code
backdoor defense
backdoor defense
32 papers with code
Backdoor Defense for Data-Free Distillation with Poisoned Teachers
1 papers with code
Adversarial Text
Adversarial Text
33 papers with code
Reconstruction Attack
Reconstruction Attack
13 papers with code
3D Architecture
3D Architecture
10 papers with code
DNN Testing
DNN Testing
8 papers with code
Design Synthesis
Design Synthesis
8 papers with code
Neural Network Security
Neural Network Security
1 benchmark
2 papers with code
Website Fingerprinting Defense
1 benchmark
1 papers with code
Adversarial Attack on Video Classification
Adversarial Attack on Video Classification
2 papers with code
Multi-View 3D Shape Retrieval
Multi-View 3D Shape Retrieval
2 papers with code
Website Fingerprinting Attacks
Website Fingerprinting Attacks
1 benchmark
1 papers with code
Website Fingerprinting Defense
Website Fingerprinting Defense
1 benchmark
1 papers with code
Optimize the trajectory of UAV which plays a BS in communication system
Optimize the trajectory of UAV which plays a BS in communication system