SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 326350 of 1808 papers

TitleStatusHype
Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation ModelsCode1
BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization0
Universal Adversarial Perturbations for Vision-Language Pre-trained ModelsCode1
Untargeted Adversarial Attack on Knowledge Graph Embeddings0
Revisiting Character-level Adversarial Attacks for Language ModelsCode1
To Each (Textual Sequence) Its Own: Improving Memorized-Data Unlearning in Large Language Models0
Probing Unlearned Diffusion Models: A Transferable Adversarial Attack PerspectiveCode0
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat LandscapeCode1
A General Black-box Adversarial Attack on Graph-based Fake News Detectors0
DIP-Watermark: A Double Identity Protection Method Based on Robust Adversarial Watermark0
Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives0
AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation0
SA-Attack: Speed-adaptive stealthy adversarial attack on trajectory predictionCode0
Adversarial Identity Injection for Semantic Face Image Synthesis0
Towards a Novel Perspective on Adversarial Examples Driven by Frequency0
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of ArtifactsCode0
Towards Building a Robust Toxicity Predictor0
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack0
Adversarial Attacks and Dimensionality in Text Classifiers0
Jailbreaking Prompt Attack: A Controllable Adversarial Attack against Diffusion Models0
READ: Improving Relation Extraction from an ADversarial PerspectiveCode0
Multi-granular Adversarial Attacks against Black-box Neural Ranking Models0
Patch Synthesis for Property Repair of Deep Neural Networks0
Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial AttackCode2
The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness0
Show:102550
← PrevPage 14 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified