SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 226250 of 1808 papers

TitleStatusHype
High-Frequency Anti-DreamBooth: Robust Defense against Personalized Image SynthesisCode0
D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack0
Unrevealed Threats: A Comprehensive Study of the Adversarial Robustness of Underwater Image Enhancement Models0
Unlearning or Concealment? A Critical Analysis and Evaluation Metrics for Unlearning in Diffusion Models0
Adversarial Attacks on Data AttributionCode0
A practical approach to evaluating the adversarial distance for machine learning classifiersCode0
OpenFact at CheckThat! 2024: Combining Multiple Attack Methods for Effective Adversarial Text Generation0
One-Index Vector Quantization Based Adversarial Attack on Image Classification0
Network transferability of adversarial patches in real-time object detectionCode0
Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch AttackCode0
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language Models0
2D-Malafide: Adversarial Attacks Against Face Deepfake Detection SystemsCode0
Probing the Robustness of Vision-Language Pretrained Models: A Multimodal Adversarial Attack Approach0
Query-Efficient Video Adversarial Attack with Stylized Logo0
BankTweak: Adversarial Attack against Multi-Object Trackers by Manipulating Feature Banks0
Leveraging Information Consistency in Frequency and Spatial Domain for Adversarial AttacksCode0
Enhancing Transferability of Adversarial Attacks with GE-AdvGAN+: A Comprehensive Framework for Gradient Editing0
Correlation Analysis of Adversarial Attack in Time Series Classification0
Adversarial Attack for Explanation Robustness of Rationalization Models0
MsMemoryGAN: A Multi-scale Memory GAN for Palm-vein Adversarial Purification0
GAIM: Attacking Graph Neural Networks via Adversarial Influence Maximization0
Malacopula: adversarial automatic speaker verification attacks using a neural-based generalised Hammerstein modelCode1
DFT-Based Adversarial Attack Detection in MRI Brain Imaging: Enhancing Diagnostic Accuracy in Alzheimer's Case Studies0
Evaluating the Validity of Word-level Adversarial Attacks with Large Language ModelsCode0
A Multi-task Adversarial Attack Against Face AuthenticationCode0
Show:102550
← PrevPage 10 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified