SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 901950 of 1808 papers

TitleStatusHype
Practical Order Attack in Deep Ranking0
PRAT: PRofiling Adversarial aTtacks0
Prepared for the Worst: A Learning-Based Adversarial Attack for Resilience Analysis of the ICP Algorithm0
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters0
Prior Networks for Detection of Adversarial Attacks0
Privacy Protection in Personalized Diffusion Models via Targeted Cross-Attention Adversarial Attack0
Real-Time Privacy Risk Measurement with Privacy Tokens for Gradient Leakage0
Probabilistic Categorical Adversarial Attack & Adversarial Training0
Probabilistic Modeling of Deep Features for Out-of-Distribution and Adversarial Detection0
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization0
Probing the Robustness of Vision-Language Pretrained Models: A Multimodal Adversarial Attack Approach0
ProjAttacker: A Configurable Physical Adversarial Attack for Face Recognition via Projector0
Prompt2Perturb (P2P): Text-Guided Diffusion-Based Adversarial Attack on Breast Ultrasound Images0
Prompt-driven Transferable Adversarial Attack on Person Re-Identification with Attribute-aware Textual Inversion0
Propagated Perturbation of Adversarial Attack for well-known CNNs: Empirical Study and its Explanation0
PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks0
Protection against Cloning for Deep Learning0
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities0
Protein Folding Neural Networks Are Not Robust0
Pseudo-Conversation Injection for LLM Goal Hijacking0
Q-FAKER: Query-free Hard Black-box Attack via Controlled Generation0
QFAL: Quantum Federated Adversarial Learning0
Query-Efficient Black-Box Attack by Active Learning0
Query-Efficient Hard-Label Black-Box Attack against Vision Transformers0
Query-Efficient Video Adversarial Attack with Stylized Logo0
Query-Free Adversarial Transfer via Undertrained Surrogates0
Blindfolded Attackers Still Threatening: Strict Black-Box Adversarial Attacks on Graphs0
RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries0
Attack Agnostic Detection of Adversarial Examples via Random Subspace Analysis0
RAT: Adversarial Attacks on Deep Reinforcement Agents for Targeted Behaviors0
The Best Defense is Attack: Repairing Semantics in Textual Adversarial Examples0
Realistic Scatterer Based Adversarial Attacks on SAR Image Classifiers0
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks0
Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems0
Real-World Adversarial Examples involving Makeup Application0
Reasoning Chain Based Adversarial Attack for Multi-hop Question Answering0
Text Adversarial Purification as Defense against Adversarial Attacks0
Recent Advances in Reliable Deep Graph Learning: Inherent Noise, Distribution Shift, and Adversarial Attack0
Towards Safer Generative Language Models: A Survey on Safety Risks, Evaluations, and Improvements0
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense0
Redefining Machine Unlearning: A Conformal Prediction-Motivated Approach0
Refining Adaptive Zeroth-Order Optimization at Ease0
Region-Wise Attack: On Efficient Generation of Robust Physical Adversarial Examples0
Reinforce Attack: Adversarial Attack against BERT with Reinforcement Learning0
Reinforcement Learning Based Sparse Black-box Adversarial Attack on Video Recognition Models0
ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial Attacks0
Replace-then-Perturb: Targeted Adversarial Attacks With Visual Reasoning for Vision-Language Models0
Residue-Based Natural Language Adversarial Attack Detection0
Resilient and constrained consensus against adversarial attacks: A distributed MPC framework0
Resilient Dynamic Average Consensus based on Trusted agents0
Show:102550
← PrevPage 19 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified