SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 401425 of 1808 papers

TitleStatusHype
Availability Adversarial Attack and Countermeasures for Deep Learning-based Load ForecastingCode0
FMM-Attack: A Flow-based Multi-modal Adversarial Attack on Video-based LLMsCode0
Federated Zeroth-Order Optimization using Trajectory-Informed Surrogate GradientsCode0
Feature Space Perturbations Yield More Transferable Adversarial ExamplesCode0
FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation TechniquesCode0
Attention Masks Help Adversarial Attacks to Bypass Safety DetectorsCode0
FireBERT: Hardening BERT-based classifiers against adversarial attackCode0
From Adversarial Arms Race to Model-centric Evaluation: Motivating a Unified Automatic Robustness Evaluation FrameworkCode0
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural NetworksCode0
Identifying Adversarially Attackable and Robust SamplesCode0
Fashion-Guided Adversarial Attack on Person SegmentationCode0
Fast Adversarial CNN-based Perturbation Attack of No-Reference Image Quality MetricsCode0
Adversarial Privacy-preserving FilterCode0
Adversarial Attack on Network Embeddings via Supervised Network PoisoningCode0
Attack Transferability Characterization for Adversarially Robust Multi-label ClassificationCode0
Extending Adversarial Attacks to Produce Adversarial Class Probability DistributionsCode0
Exploiting vulnerabilities of deep neural networks for privacy protectionCode0
Adaptive Image Transformations for Transfer-based Adversarial AttackCode0
Explaining Adversarial Robustness of Neural Networks from Clustering Effect PerspectiveCode0
BEARD: Benchmarking the Adversarial Robustness for Dataset DistillationCode0
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial AttackCode0
Exploring the Vulnerability of Natural Language Processing Models via Universal Adversarial TextsCode0
Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNsCode0
Excess Capacity and Backdoor PoisoningCode0
Expanding Scope: Adapting English Adversarial Attacks to ChineseCode0
Show:102550
← PrevPage 17 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified