SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 651700 of 1808 papers

TitleStatusHype
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks0
Extreme Miscalibration and the Illusion of Adversarial Robustness0
Conformal Shield: A Novel Adversarial Attack Detection Framework for Automatic Modulation Classification0
Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing0
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper0
Noise-BERT: A Unified Perturbation-Robust Framework with Noise Alignment Pre-training for Noisy Slot Filling Task0
Beyond Worst-case Attacks: Robust RL with Adaptive Defense via Non-dominated PoliciesCode0
An Adversarial Approach to Evaluating the Robustness of Event Identification Models0
AICAttack: Adversarial Image Captioning Attack with Attention-Based OptimizationCode0
Only My Model On My Data: A Privacy Preserving Approach Protecting one Model and Deceiving Unauthorized Black-Box Models0
Accuracy of TextFooler black box adversarial attacks on 01 loss sign activation neural network ensembleCode0
TETRIS: Towards Exploring the Robustness of Interactive Segmentation0
Corruption Robust Offline Reinforcement Learning with Human Feedback0
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution0
PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks0
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision TransformersCode0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
HQA-Attack: Toward High Quality Black-Box Hard-Label Adversarial Attack on TextCode0
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech Emotion Recognition0
Enhanced Urban Region Profiling with Adversarial Self-Supervised Learning for Robust Forecasting and Security0
SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign DecodingCode0
AdvGPS: Adversarial GPS for Multi-Agent Perception AttackCode0
Mitigating the Impact of Noisy Edges on Graph-Based Algorithms via Adversarial Robustness Evaluation0
Sparse and Transferable Universal Singular Vectors Attack0
Exploring Adversarial Threat Models in Cyber Physical Battery Systems0
Susceptibility of Adversarial Attack on Medical Image Segmentation ModelsCode0
HGAttack: Transferable Heterogeneous Graph Adversarial Attack0
Artwork Protection Against Neural Style Transfer Using Locally Adaptive Adversarial Color AttackCode0
Rethinking Impersonation and Dodging Attacks on Face Recognition Systems0
A Generative Adversarial Attack for Multilingual Text Classifiers0
Left-right Discrepancy for Adversarial Attack on Stereo Networks0
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability0
Data-Driven Subsampling in the Presence of an Adversarial ActorCode0
Transferable Learned Image Compression-Resistant Adversarial Perturbations0
Demonstration of an Adversarial Attack Against a Multimodal Vision Language Model for Pathology ImagingCode0
Dual Teacher Knowledge Distillation with Domain Alignment for Face Anti-spoofing0
AR-GAN: Generative Adversarial Network-Based Defense Method Against Adversarial Attacks on the Traffic Sign Classification System of Autonomous Vehicles0
Towards adversarial robustness verification of no-reference image-and video-quality metricsCode0
Explainability-Driven Leaf Disease Classification Using Adversarial Training and Knowledge Distillation0
Explainability-Based Adversarial Attack on Graphs Through Edge Perturbation0
Attack Tree Analysis for Adversarial Evasion Attacks0
Adversarial Attacks on Image Classification Models: Analysis and Defense0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual Adversarial ExamplesCode0
Mutual-modality Adversarial Attack with Semantic Perturbation0
Embodied Laser Attack:Leveraging Scene Priors to Achieve Agent-based Robust Non-contact Attacks0
A Malware Classification Survey on Adversarial Attacks and Defences0
Forbidden Facts: An Investigation of Competing Objectives in Llama-20
Robust Few-Shot Named Entity Recognition with Boundary Discrimination and Correlation PurificationCode0
Towards Transferable Adversarial Attacks with Centralized Perturbation0
Show:102550
← PrevPage 14 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified