SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 701750 of 1808 papers

TitleStatusHype
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems0
Enhanced Urban Region Profiling with Adversarial Self-Supervised Learning for Robust Forecasting and Security0
Enhancing Accuracy and Robustness through Adversarial Training in Class Incremental Continual Learning0
Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack0
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System0
Enhancing Adversarial Transferability via Component-Wise Transformation0
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions0
ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction0
A Study for Universal Adversarial Attacks on Texture Recognition0
Harmonic Adversarial Attack Method0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation0
Enhancing the Transferability via Feature-Momentum Adversarial Attack0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack0
Enhancing Transferability of Adversarial Attacks with GE-AdvGAN+: A Comprehensive Framework for Gradient Editing0
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier0
A Survey on Physical Adversarial Attacks against Face Recognition Systems0
Frequency-Tuned Universal Adversarial Attacks0
Design of secure and robust cognitive system for malware detection0
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models0
ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech0
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization0
EVALOOP: Assessing LLM Robustness in Programming from a Self-consistency Perspective0
AT-GAN: An Adversarial Generator Model for Non-constrained Adversarial Examples0
Evaluating Adversarial Robustness on Document Image Classification0
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach0
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication0
Evaluating Neural Model Robustness for Machine Comprehension0
Attacking c-MARL More Effectively: A Data Driven Approach0
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning0
Evaluating Similitude and Robustness of Deep Image Denoising Models via Adversarial Attack0
Democratic Training Against Universal Adversarial Perturbations0
Evaluating the Robustness of LiDAR Point Cloud Tracking Against Adversarial Attack0
Fortify Machine Learning Production Systems: Detect and Classify Adversarial Attacks0
Analyzing the Noise Robustness of Deep Neural Networks0
Delving into Data: Effectively Substitute Training for Black-box Attack0
Evaluation of Momentum Diverse Input Iterative Fast Gradient Sign Method (M-DI2-FGSM) Based Attack Method on MCS 2018 Adversarial Attacks on Black Box Face Recognition System0
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
Defensive Quantization: When Efficiency Meets Robustness0
EvolBA: Evolutionary Boundary Attack under Hard-label Black Box condition0
Adversarial Attack with Raindrops0
Forbidden Facts: An Investigation of Competing Objectives in Llama-20
Examining the Human Perceptibility of Black-Box Adversarial Attacks on Face Recognition0
Attacking Perceptual Similarity Metrics0
FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection0
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks0
Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
Show:102550
← PrevPage 15 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified