SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 651700 of 1808 papers

TitleStatusHype
Anti-Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization0
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques0
DMS: Addressing Information Loss with More Steps for Pragmatic Adversarial Attacks0
DO-AutoEncoder: Learning and Intervening Bivariate Causal Mechanisms in Images0
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions0
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack0
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning0
DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks0
Doppelganger Method: Breaking Role Consistency in LLM Agent via Prompt-based Transferable Adversarial Attack0
Double Backpropagation for Training Autoencoders against Adversarial Attack0
Fall Leaf Adversarial Attack on Traffic Sign Classification0
Do we need entire training data for adversarial training?0
Design of secure and robust cognitive system for malware detection0
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach0
D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack0
DTA: Physical Camouflage Attacks using Differentiable Transformation Network0
Dual Teacher Knowledge Distillation with Domain Alignment for Face Anti-spoofing0
Applying Tensor Decomposition to image for Robustness against Adversarial Attack0
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning0
Democratic Training Against Universal Adversarial Perturbations0
Extreme Miscalibration and the Illusion of Adversarial Robustness0
Analyzing the Noise Robustness of Deep Neural Networks0
Dynamic Knowledge Graph-based Dialogue Generation with Improved Adversarial Meta-Learning0
A Practical and Stealthy Adversarial Attack for Cyber-Physical Applications0
Delving into Data: Effectively Substitute Training for Black-box Attack0
Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks0
Adversarial Examples in Deep Learning: Characterization and Divergence0
Forbidden Facts: An Investigation of Competing Objectives in Llama-20
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
Effective faking of verbal deception detection with target-aligned adversarial attacks0
Effects of Forward Error Correction on Communications Aware Evasion Attacks0
Defensive Quantization: When Efficiency Meets Robustness0
Adversarial Attack with Raindrops0
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models0
A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models0
FABLE: A Localized, Targeted Adversarial Attack on Weather Forecasting Models0
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
Frequency-Tuned Universal Adversarial Attacks0
Analyzing Robustness of the Deep Reinforcement Learning Algorithm in Ramp Metering Applications Considering False Data Injection Attack and Defense0
Efficient universal shuffle attack for visual object tracking0
EFSG: Evolutionary Fooling Sentences Generator0
Embodied Laser Attack:Leveraging Scene Priors to Achieve Agent-based Robust Non-contact Attacks0
Defense-guided Transferable Adversarial Attacks0
Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features0
Empirical Study of the Decision Region and Robustness in Deep Neural Networks0
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model0
Energy Attack: On Transferring Adversarial Examples0
Analytically Tractable Hidden-States Inference in Bayesian Neural Networks0
Show:102550
← PrevPage 14 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified