SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 701750 of 1808 papers

TitleStatusHype
Dynamic Adversarial Attacks on Autonomous Driving SystemsCode0
An adversarial attack approach for eXplainable AI evaluation on deepfake detection modelsCode0
OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization0
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System0
Realistic Scatterer Based Adversarial Attacks on SAR Image Classifiers0
ScAR: Scaling Adversarial Robustness for LiDAR Object DetectionCode0
InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language ModelsCode0
TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation0
NeRFTAP: Enhancing Transferability of Adversarial Patches on Face Recognition using Neural Radiance Fields0
Vulnerability Analysis of Transformer-based Optical Character Recognition to Adversarial Attacks0
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching0
Adversarial Purification of Information MaskingCode0
Trainwreck: A damaging adversarial attack on image classifiersCode0
When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence0
AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems0
Generating Valid and Natural Adversarial Examples with Large Language Models0
Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts0
DA^3: A Distribution-Aware Adversarial Attack against Language Models0
Learning Globally Optimized Language Structure via Adversarial Training0
Robust Text Classification: Analyzing Prototype-Based NetworksCode0
Robust Adversarial Attacks Detection for Deep Learning based Relative Pose Estimation for Space Rendezvous0
Transferability Bound Theory: Exploring Relationship between Adversarial Transferability and FlatnessCode0
Resilient and constrained consensus against adversarial attacks: A distributed MPC framework0
ABIGX: A Unified Framework for eXplainable Fault Detection and Classification0
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selectionCode0
Optimal Cost Constrained Adversarial Attacks For Multiple Agent Systems0
LFAA: Crafting Transferable Targeted Adversarial Examples with Low-Frequency Perturbations0
Amoeba: Circumventing ML-supported Network Censorship via Adversarial Reinforcement LearningCode0
Differentially Private Reward Estimation with Preference Feedback0
Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors0
Adversarial sample generation and training using geometric masks for accurate and resilient license plate character recognitionCode0
Semantic-Aware Adversarial Training for Reliable Deep Hashing RetrievalCode0
Imperceptible CMOS camera dazzle for adversarial attacks on deep neural networks0
CT-GAT: Cross-Task Generative Adversarial Attack based on TransferabilityCode0
Beyond Hard Samples: Robust and Effective Grammatical Error Correction with Cycle Self-AugmentingCode0
SAM Meets UAP: Attacking Segment Anything Model With Universal Adversarial Perturbation0
Adversarial Training for Physics-Informed Neural NetworksCode0
Black-box Targeted Adversarial Attack on Segment Anything (SAM)0
Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks0
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization0
A Non-monotonic Smooth Activation Function0
Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion ModelsCode0
Adversarial optimization leads to over-optimistic security-constrained dispatch, but sampling can help0
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System0
Enhancing Robust Representation in Adversarial Training: Alignment and Exclusion CriteriaCode0
Optimizing Key-Selection for Face-based One-Time Biometrics via Morphing0
Adversarial Client Detection via Non-parametric Subspace Monitoring in the Internet of Federated Things0
Gray-box Adversarial Attack of Deep Reinforcement Learning-based Trading Agents0
Understanding Pose and Appearance Disentanglement in 3D Human Pose Estimation0
PRAT: PRofiling Adversarial aTtacks0
Show:102550
← PrevPage 15 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified