SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 751800 of 1808 papers

TitleStatusHype
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning0
Adversarially Robust Classification by Conditional Generative Model Inversion0
Attack-SAM: Towards Attacking Segment Anything Model With Adversarial Examples0
Exploiting epistemic uncertainty of the deep learning models to generate adversarial samples0
Democratic Training Against Universal Adversarial Perturbations0
Attacks on State-of-the-Art Face Recognition using Attentional Adversarial Attack Generative Network0
Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks0
ExploreADV: Towards exploratory attack for Neural Networks0
GradMDM: Adversarial Attack on Dynamic Networks0
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability0
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers0
Exploring Adversarial Fake Images on Face Manifold0
Exploring Adversarial Threat Models in Cyber Physical Battery Systems0
Analyzing the Noise Robustness of Deep Neural Networks0
Exploring Frequency Adversarial Attacks for Face Forgery Detection0
Exploring High-Order Structure for Robust Graph Structure Learning0
Delving into Data: Effectively Substitute Training for Black-box Attack0
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models0
Attention, Please! Adversarial Defense via Activation Rectification and Preservation0
Extreme Miscalibration and the Illusion of Adversarial Robustness0
FABLE: A Localized, Targeted Adversarial Attack on Weather Forecasting Models0
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images0
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning0
Fair Robust Active Learning by Joint Inconsistency0
Faithfulness and the Notion of Adversarial Sensitivity in NLP Explanations0
Fall Leaf Adversarial Attack on Traffic Sign Classification0
Audio Adversarial Examples: Attacks Using Vocal Masks0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
Defensive Quantization: When Efficiency Meets Robustness0
Adversarial Attack with Raindrops0
Evaluating the Robustness of the "Ensemble Everything Everywhere" Defense0
Graphfool: Targeted Label Adversarial Attack on Graph Embedding0
Headless Horseman: Adversarial Attacks on Transfer Learning Models0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
Analyzing Robustness of the Deep Reinforcement Learning Algorithm in Ramp Metering Applications Considering False Data Injection Attack and Defense0
Defense-guided Transferable Adversarial Attacks0
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack0
Analytically Tractable Hidden-States Inference in Bayesian Neural Networks0
Adversarial Attack with Pattern Replacement0
Feature Unlearning for Pre-trained GANs and VAEs0
Feature Visualization within an Automated Design Assessment leveraging Explainable Artificial Intelligence Methods0
FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
Global Robustness Verification Networks0
Few-Features Attack to Fool Machine Learning Models through Mask-Based GAN0
Defense Against Explanation Manipulation0
F&F Attack: Adversarial Attack against Multiple Object Trackers by Inducing False Negatives and False Positives0
Defense against Adversarial Cloud Attack on Remote Sensing Salient Object Detection0
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks0
Show:102550
← PrevPage 16 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified