SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 251275 of 1808 papers

TitleStatusHype
Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack0
Robust Active Learning (RoAL): Countering Dynamic Adversaries in Active Learning with Elastic Weight Consolidation0
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack0
Ensemble everything everywhere: Multi-scale aggregation for adversarial robustnessCode1
Improving Network Interpretability via Explanation Consistency Evaluation0
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis0
Guardians of Image Quality: Benchmarking Defenses Against Adversarial Attacks on Image Quality MetricsCode1
Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks0
OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack0
Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion0
Vulnerabilities in AI-generated Image Detection: The Challenge of Adversarial Attacks0
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability DetectionCode1
Physical Adversarial Attack on Monocular Depth Estimation via Shape-Varying Patches0
Beyond Dropout: Robust Convolutional Neural Networks Based on Local Feature Masking0
PG-Attack: A Precision-Guided Adversarial Attack Framework Against Vision Foundation Models for Autonomous DrivingCode1
Compressed models are NOT miniature versions of large models0
Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift0
Any Target Can be Offense: Adversarial Example Generation via Generalized Latent InfectionCode0
AEMIM: Adversarial Examples Meet Masked Image Modeling0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical AnalysisCode0
Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks0
Transferable 3D Adversarial Shape Completion using Diffusion ModelsCode0
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images0
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition SystemsCode0
Show:102550
← PrevPage 11 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified