SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 351375 of 1808 papers

TitleStatusHype
Chain-of-Thought Poisoning Attacks against R1-based Retrieval-Augmented Generation Systems0
Experimental robustness benchmark of quantum neural network on a superconducting quantum processor0
Tropical Attention: Neural Algorithmic Reasoning for Combinatorial Algorithms0
Beyond Classification: Evaluating Diffusion Denoised Smoothing for Security-Utility Trade off0
Adverseness vs. Equilibrium: Exploring Graph Adversarial Resilience through Dynamic Equilibrium0
EVALOOP: Assessing LLM Robustness in Programming from a Self-consistency Perspective0
FABLE: A Localized, Targeted Adversarial Attack on Weather Forecasting Models0
Adversarial Attack on Large Language Models using Exponentiated Gradient DescentCode0
Evaluating the Robustness of Adversarial Defenses in Malware Detection SystemsCode0
Towards Adaptive Meta-Gradient Adversarial Examples for Visual TrackingCode0
No Query, No Access0
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain0
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey0
Data-Driven Falsification of Cyber-Physical SystemsCode0
Adversarial Robustness Analysis of Vision-Language Models in Medical Image SegmentationCode0
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp0
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability0
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks0
AGATE: Stealthy Black-box Watermarking for Multimodal Model Copyright Protection0
Forging and Removing Latent-Noise Diffusion Watermarks Using a Single ImageCode0
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation0
Adversarial Attack for RGB-Event based Visual Object TrackingCode0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
Q-FAKER: Query-free Hard Black-box Attack via Controlled Generation0
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign ClassificationCode0
Show:102550
← PrevPage 15 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified