SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 551600 of 1808 papers

TitleStatusHype
Emoti-Attack: Zero-Perturbation Adversarial Attacks on NLP Systems via Emoji Sequences0
A Survey on Physical Adversarial Attacks against Face Recognition Systems0
A Survey on Physical Adversarial Attack in Computer Vision0
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Adversarial Imitation Attack0
Adversarial Attack for Uncertainty Estimation: Identifying Critical Regions in Neural Networks0
A Study for Universal Adversarial Attacks on Texture Recognition0
ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction0
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio0
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System0
As Firm As Their Foundations: Can open-sourced foundation models be used to create adversarial examples for downstream tasks?0
Fooling the primate brain with minimal, targeted image manipulation0
A Bayes-Optimal View on Adversarial Examples0
EFSG: Evolutionary Fooling Sentences Generator0
Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features0
Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations0
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems0
Adversarial Identity Injection for Semantic Face Image Synthesis0
Adversarial Attack for Explanation Robustness of Rationalization Models0
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art0
A Robust Likelihood Model for Novelty Detection0
Adversarial Fine-tune with Dynamically Regulated Adversary0
AR-GAN: Generative Adversarial Network-Based Defense Method Against Adversarial Attacks on the Traffic Sign Classification System of Autonomous Vehicles0
Adversarial Attack Driven Data Augmentation for Accurate And Robust Medical Image Segmentation0
Adversarial Exposure Attack on Diabetic Retinopathy Imagery Grading0
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models0
A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models0
Adversarial Attack by Limited Point Cloud Surface Modifications0
Architecture Selection via the Trade-off Between Accuracy and Robustness0
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement0
Adversarial Attack Based on Prediction-Correction0
Adversarial Examples in Deep Learning: Characterization and Divergence0
Improving VAEs' Robustness to Adversarial Attack0
A Practical and Stealthy Adversarial Attack for Cyber-Physical Applications0
A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems0
Effective faking of verbal deception detection with target-aligned adversarial attacks0
Effects of Forward Error Correction on Communications Aware Evasion Attacks0
Applying Tensor Decomposition to image for Robustness against Adversarial Attack0
Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks0
Application of Adversarial Examples to Physical ECG Signals0
Adversarial Examples for Model-Based Control: A Sensitivity Analysis0
Active Sentence Learning by Adversarial Uncertainty Sampling in Discrete Space0
Physical-World Optical Adversarial Attacks on 3D Face Recognition0
Adversarial Example Detection Using Latent Neighborhood Graph0
A Perceptual Distortion Reduction Framework: Towards Generating Adversarial Examples with High Perceptual Quality and Attack Success Rate0
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning0
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique0
Anti-Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization0
Adversarial Attack and Defense on Point Sets0
Show:102550
← PrevPage 12 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified