SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 851900 of 1808 papers

TitleStatusHype
GradMDM: Adversarial Attack on Dynamic Networks0
Beyond Classification: Evaluating Diffusion Denoised Smoothing for Security-Utility Trade off0
Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data0
A Differentiable Language Model Adversarial Attack on Text Classifiers0
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks0
Evaluating the Robustness of the "Ensemble Everything Everywhere" Defense0
Gradient-guided Unsupervised Text Style Transfer via Contrastive Learning0
Gradient-based adversarial attacks on categorical sequence models via traversing an embedded world0
Golden Ratio Search: A Low-Power Adversarial Attack for Deep Learning based Modulation Classification0
Global Robustness Verification Networks0
Best Practices for Noise-Based Augmentation to Improve the Performance of Deployable Speech-Based Emotion Recognition Systems0
Adversarial Robustness for Deep Learning-based Wildfire Prediction Models0
Generative Adversarial Patches for Physical Attacks on Cross-Modal Pedestrian Re-Identification0
Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing0
Generating Watermarked Adversarial Texts0
Graphfool: Targeted Label Adversarial Attack on Graph Embedding0
Generating Valid and Natural Adversarial Examples with Large Language Models0
Benign Adversarial Attack: Tricking Models for Goodness0
Generating Unrestricted Adversarial Examples via Three Parameters0
Generating Semantically Valid Adversarial Questions for TableQA0
Benchmarking the Physical-world Adversarial Robustness of Vehicle Detection0
Adversarial Relighting Against Face Recognition0
AdversariaL attacK sAfety aLIgnment(ALKALI): Safeguarding LLMs through GRACE: Geometric Representation-Aware Contrastive Enhancement- Introducing Adversarial Vulnerability Quality Index (AVQI)0
Generating Semantic Adversarial Examples via Feature Manipulation0
Generating Out of Distribution Adversarial Attack using Latent Space Poisoning0
Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks0
Benchmarking Adversarial Robustness0
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline0
Generating Black-Box Adversarial Examples in Sparse Domain0
Harmonic Adversarial Attack Method0
Generating Adversarial Inputs Using A Black-box Differential Technique0
Generating Adversarial Examples with an Optimized Quality0
Generating Adversarial Attacks in the Latent Space0
Benchmarking Adversarially Robust Quantum Machine Learning at Scale0
Adversarial Attack on Skeleton-based Human Action Recognition0
Heating up decision boundaries: isocapacitory saturation, adversarial scenarios and generalization bounds0
Generalization to Mitigate Synonym Substitution Attacks0
Heterogeneous Architecture Search Approach within Adversarial Dynamic Defense Framework0
Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks0
BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization0
General Adversarial Defense Against Black-box Attacks via Pixel Level and Feature Level Distribution Alignments0
Gender Bias and Universal Substitution Adversarial Attacks on Grammatical Error Correction Systems for Automated Assessment0
Hiding Backdoors within Event Sequence Data via Poisoning Attacks0
CE-based white-box adversarial attacks will not work using super-fitting0
Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs0
Adversarial Attack on Sentiment Classification0
A Deep Genetic Programming based Methodology for Art Media Classification Robust to Adversarial Perturbations0
A Black-Box Attack on Optical Character Recognition Systems0
GasHis-Transformer: A Multi-scale Visual Transformer Approach for Gastric Histopathological Image Detection0
GAIM: Attacking Graph Neural Networks via Adversarial Influence Maximization0
Show:102550
← PrevPage 18 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified