SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 801850 of 1808 papers

TitleStatusHype
Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion0
FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation Models0
Adversarial Attack with Raindrops0
Adversarial Music: Real World Audio Adversary Against Wake-word Detection System0
Identification of Systematic Errors of Image Classifiers on Rare Subgroups0
Identifying Informative Latent Variables Learned by GIN via Mutual Information0
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs0
Fooling Adversarial Training with Inducing Noise0
Fooling Adversarial Training with Induction Noise0
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution0
Forbidden Facts: An Investigation of Competing Objectives in Llama-20
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Meme Stock Prediction0
Analyzing Robustness of the Deep Reinforcement Learning Algorithm in Ramp Metering Applications Considering False Data Injection Attack and Defense0
Defense-guided Transferable Adversarial Attacks0
Analytically Tractable Hidden-States Inference in Bayesian Neural Networks0
Adversarial Attack with Pattern Replacement0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
Defense Against Explanation Manipulation0
Defense against Adversarial Cloud Attack on Remote Sensing Salient Object Detection0
Frequency-Tuned Universal Adversarial Attacks0
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks0
From Environmental Sound Representation to Robustness of 2D CNN Models Against Adversarial Attacks0
An AI-Enabled Framework to Defend Ingenious MDT-based Attacks on the Emerging Zero Touch Cellular Networks0
From Sound Representation to Model Robustness0
Adversarial Attack and Defense for LoRa Device Identification and Authentication via Deep Learning0
GAIM: Attacking Graph Neural Networks via Adversarial Influence Maximization0
GasHis-Transformer: A Multi-scale Visual Transformer Approach for Gastric Histopathological Image Detection0
Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack0
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks0
An Adversarial Attack via Feature Contributive Regions0
How Sampling Impacts the Robustness of Stochastic Neural Networks0
An Adversarial Attack Defending System for Securing In-Vehicle Networks0
Post-train Black-box Defense via Bayesian Boundary Correction0
Adversarial Attack Type I: Cheat Classifiers by Significant Changes0
A Computationally Efficient Method for Defending Adversarial Deep Learning Attacks0
BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization0
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case0
Generating Adversarial Examples with an Optimized Quality0
Generating Adversarial Inputs Using A Black-box Differential Technique0
Generating Black-Box Adversarial Examples in Sparse Domain0
Benchmarking Adversarial Robustness0
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline0
Generating Out of Distribution Adversarial Attack using Latent Space Poisoning0
Generating Semantic Adversarial Examples via Feature Manipulation0
Defending Against Adversarial Examples by Regularized Deep Embedding0
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-task Training0
I2VGuard: Safeguarding Images against Misuse in Diffusion-based Image-to-Video Models0
Defending Against Adversarial Attack in ECG Classification with Adversarial Distillation Training0
Show:102550
← PrevPage 17 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified