SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 651700 of 1808 papers

TitleStatusHype
Boosting Adversarial Transferability using Dynamic Cues0
An Incremental Gray-box Physical Adversarial Attack on Neural Network Training0
Variation Enhanced Attacks Against RRAM-based Neuromorphic Computing System0
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective0
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item DetectionCode1
Towards Safer Generative Language Models: A Survey on Safety Risks, Evaluations, and Improvements0
StyleAdv: Meta Style Adversarial Training for Cross-Domain Few-Shot LearningCode1
Graph Adversarial Immunization for Certifiable RobustnessCode0
Robust Mid-Pass Filtering Graph Convolutional NetworksCode1
Threatening Patch Attacks on Object Detection in Optical Remote Sensing ImagesCode0
TextDefense: Adversarial Text Detection based on Word Importance Entropy0
Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend0
CosPGD: an efficient white-box adversarial attack for pixel-wise prediction tasksCode1
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification0
TransFool: An Adversarial Attack against Neural Machine Translation ModelsCode0
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks0
The Impacts of Unanswerable Questions on the Robustness of Machine Reading Comprehension Models0
Improving Adversarial Transferability with Scheduled Step Size and Dual Example0
Identifying Adversarially Attackable and Robust SamplesCode0
Analyzing Robustness of the Deep Reinforcement Learning Algorithm in Ramp Metering Applications Considering False Data Injection Attack and Defense0
Semantic Adversarial Attacks on Face Recognition through Significant Attributes0
Targeted Attacks on Timeseries Forecasting0
Attacking Important Pixels for Anchor-free Detectors0
On the Adversarial Robustness of Camera-based 3D Object DetectionCode1
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics0
On the feasibility of attacking Thai LPR systems with adversarial examples0
On the Susceptibility and Robustness of Time Series Models through Adversarial Attack and Defense0
Availability Adversarial Attack and Countermeasures for Deep Learning-based Load ForecastingCode0
Boosting Adversarial Transferability via Gradient Relevance AttackCode1
F&F Attack: Adversarial Attack against Multiple Object Trackers by Inducing False Negatives and False Positives0
Transferable Adversarial Attack for Both Vision Transformers and Convolutional Networks via Momentum Integrated Gradients0
LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions0
Explaining Adversarial Robustness of Neural Networks from Clustering Effect PerspectiveCode0
Frequency-aware GAN for Adversarial Manipulation Generation0
Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation0
Proximal Splitting Adversarial Attack for Semantic SegmentationCode1
The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection0
BiasAdv: Bias-Adversarial Augmentation for Model Debiasing0
Towards Transferable Targeted Adversarial ExamplesCode0
RIATIG: Reliable and Imperceptible Adversarial Text-to-Image Generation With Natural PromptsCode1
Angelic Patches for Improving Third-Party Object Detector PerformanceCode0
ExploreADV: Towards exploratory attack for Neural Networks0
Generalizable Black-Box Adversarial Attack with Meta LearningCode1
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence0
Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch AttacksCode1
Multi-head Uncertainty Inference for Adversarial Attack Detection0
Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face RecognitionCode1
AI Security for Geoscience and Remote Sensing: Challenges and Future Trends0
Alternating Objectives Generates Stronger PGD-Based Adversarial Attacks0
Adversarial Attacks and Defences for Skin Cancer Classification0
Show:102550
← PrevPage 14 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified