SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 751800 of 1808 papers

TitleStatusHype
A Formalization of Robustness for Deep Neural Networks0
Adversarial Attacks on AI-Generated Text Detection Models: A Token Probability-Based Approach Using Embeddings0
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers0
Chain-of-Thought Poisoning Attacks against R1-based Retrieval-Augmented Generation Systems0
Affine Disentangled GAN for Interpretable and Robust AV Perception0
Chain Association-based Attacking and Shielding Natural Language Processing Systems0
AEMIM: Adversarial Examples Meet Masked Image Modeling0
Adversarial Attacks Neutralization via Data Set Randomization0
Certifiably Robust Variational Autoencoders0
AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation0
AdvSwap: Covert Adversarial Perturbation with High Frequency Info-swapping for Autonomous Driving Perception0
Adversarial Attacks in Sound Event Classification0
Capsule Neural Networks as Noise Stabilizer for Time Series Data0
CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification0
AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture0
Can We Rely on AI?0
Patch Synthesis for Property Repair of Deep Neural Networks0
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey0
AdvCodeMix: Adversarial Attack on Code-Mixed Data0
Can We Really Trust Explanations? Evaluating the Stability of Feature Attribution Explanation Methods via Adversarial Attack0
Can the state of relevant neurons in a deep neural networks serve as indicators for detecting adversarial attacks?0
AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems0
Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers0
CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator0
AdvMask: A Sparse Adversarial Attack Based Data Augmentation Method for Image Classification0
CAAD 2018: Iterative Ensemble Adversarial Attack0
Adversarial Attacks for Multi-view Deep Models0
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network0
BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries0
Btech thesis report on adversarial attack detection and purification of adverserially attacked images0
AdvHaze: Adversarial Haze Attack0
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack0
Making Corgis Important for Honeycomb Classification: Adversarial Attacks on Concept-based Explainability Tools0
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems0
Brightness-Restricted Adversarial Attack Patch0
Bridge the Gap Between CV and NLP! A Gradient-based Textual Adversarial Attack Framework0
AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems0
Adversarial Attacks and Dimensionality in Text Classifiers0
Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition0
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework0
Bregman Linearized Augmented Lagrangian Method for Nonconvex Constrained Stochastic Zeroth-order Optimization0
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack0
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning0
Adverseness vs. Equilibrium: Exploring Graph Adversarial Resilience through Dynamic Equilibrium0
Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors0
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy0
Boosting Black-Box Adversarial Attacks with Meta Learning0
Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs0
Boosting Adversarial Transferability via High-Frequency Augmentation and Hierarchical-Gradient Fusion0
Boosting Adversarial Transferability using Dynamic Cues0
Show:102550
← PrevPage 16 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified