SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 451475 of 1808 papers

TitleStatusHype
Adversarial Robustness for Deep Learning-based Wildfire Prediction Models0
Attribution for Enhanced Explanation with Transferable Adversarial eXploration0
Robustness-aware Automatic Prompt OptimizationCode0
An Empirical Analysis of Federated Learning Models Subject to Label-Flipping Adversarial Attack0
SurvAttack: Black-Box Attack On Survival Models through Ontology-Informed EHR Perturbation0
Retention Score: Quantifying Jailbreak Risks for Vision Language Models0
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models0
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters0
Adversarial Attack Against Images Classification based on Generative Adversarial Networks0
PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation0
Adversarial Robustness through Dynamic Ensemble Learning0
Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation0
Adversarially robust generalization theory via Jacobian regularization for deep neural networks0
Unpacking the Resilience of SNLI Contradiction Examples to AttacksCode0
RAT: Adversarial Attacks on Deep Reinforcement Agents for Targeted Behaviors0
AHSG: Adversarial Attack on High-level Semantics in Graph Neural Networks0
A Generative Victim Model for Segmentation0
Take Fake as Real: Realistic-like Robust Black-box Adversarial Attack to Evade AIGC Detection0
From Flexibility to Manipulation: The Slippery Slope of XAI EvaluationCode0
Less is More: A Stealthy and Efficient Adversarial Attack Method for DRL-based Autonomous Driving Policies0
Does Safety Training of LLMs Generalize to Semantically Related Natural Prompts?0
Pay Attention to the Robustness of Chinese Minority Language Models! Syllable-level Textual Adversarial Attack on Tibetan ScriptCode0
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks0
Multi-Granularity Tibetan Textual Adversarial Attack Method Based on Masked Language ModelCode0
Intermediate Outputs Are More Sensitive Than You Think0
Show:102550
← PrevPage 19 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified