SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 501550 of 1808 papers

TitleStatusHype
Certifiably Robust Variational Autoencoders0
AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation0
Attention, Please! Adversarial Defense via Activation Rectification and Preservation0
Chain Association-based Attacking and Shielding Natural Language Processing Systems0
Chain-of-Thought Poisoning Attacks against R1-based Retrieval-Augmented Generation Systems0
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers0
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers0
Adversarially Robust Neural Architectures0
CharBot: A Simple and Effective Method for Evading DGA Classifiers0
A Framework for Adversarial Analysis of Decision Support Systems Prior to Deployment0
Adversarial Attack on Deep Product Quantization Network for Image Retrieval0
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques0
Dual Teacher Knowledge Distillation with Domain Alignment for Face Anti-spoofing0
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks0
Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization0
Attack Type Agnostic Perceptual Enhancement of Adversarial Images0
Adversarially robust generalization theory via Jacobian regularization for deep neural networks0
Attack Tree Analysis for Adversarial Evasion Attacks0
Adversarially robust deepfake media detection using fused convolutional neural network predictions0
Adaptive Adversarial Training Does Not Increase Recourse Costs0
Attack to Fool and Explain Deep Networks0
Attacks on State-of-the-Art Face Recognition using Attentional Adversarial Attack Generative Network0
Adversarially Robust Conformal Prediction0
Attack-SAM: Towards Attacking Segment Anything Model With Adversarial Examples0
Adversarially Robust Classification by Conditional Generative Model Inversion0
Adversarial Attack on Deep Cross-Modal Hamming Retrieval0
Adversarial Learning of Deepfakes in Accounting0
Attacking Perceptual Similarity Metrics0
Attacking Important Pixels for Anchor-free Detectors0
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain0
Attack Deterministic Conditional Image Generative Models for Diverse and Controllable Generation0
Enhancing Transformation-based Defenses using a Distribution Classifier0
Attack-Agnostic Adversarial Detection0
A Thorough Comparison Study on Adversarial Attacks and Defenses for Common Thorax Disease Classification in Chest X-rays0
Adversarial Interaction Attacks: Fooling AI to Misinterpret Human Intentions0
AT-GAN: An Adversarial Generative Model for Non-constrained Adversarial Examples0
Semantically Stealthy Adversarial Attacks against Segmentation Models0
Device-aware Optical Adversarial Attack for a Portable Projector-camera System0
AT-GAN: An Adversarial Generator Model for Non-constrained Adversarial Examples0
Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions0
Adversarial Attack Framework on Graph Embedding Models with Limited Knowledge0
ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech0
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial Attack against Infrared Pedestrian Detectors0
Adaptive Adversarial Attack on Scene Text Recognition0
DFT-Based Adversarial Attack Detection in MRI Brain Imaging: Enhancing Diagnostic Accuracy in Alzheimer's Case Studies0
A Survey on Physical Adversarial Attacks against Face Recognition Systems0
A Survey on Physical Adversarial Attack in Computer Vision0
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Adversarial Imitation Attack0
Show:102550
← PrevPage 11 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified