SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 901950 of 1808 papers

TitleStatusHype
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks0
Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks0
How Sampling Impacts the Robustness of Stochastic Neural Networks0
Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks0
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning0
AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization0
Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks0
I2VGuard: Safeguarding Images against Misuse in Diffusion-based Image-to-Video Models0
Identification of Attack-Specific Signatures in Adversarial Examples0
Identification of Systematic Errors of Image Classifiers on Rare Subgroups0
Using Word Embeddings to Explore the Learned Representations of Convolutional Neural Networks0
Identifying Classes Susceptible to Adversarial Attacks0
Identifying Informative Latent Variables Learned by GIN via Mutual Information0
Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception0
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection0
IDT: Dual-Task Adversarial Attacks for Privacy Protection0
A Generative Victim Model for Segmentation0
ILFO: Adversarial Attack on Adaptive Neural Networks0
Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks0
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs0
ImF: Implicit Fingerprint for Large Language Models0
Impact of Scaled Image on Robustness of Deep Neural Networks0
Imperceptible Adversarial Attack on Deep Neural Networks from Image Boundary0
A Generative Adversarial Attack for Multilingual Text Classifiers0
Imperceptible CMOS camera dazzle for adversarial attacks on deep neural networks0
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification0
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation0
Implicit Euler Skip Connections: Enhancing Adversarial Robustness via Numerical Stability0
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language Models0
Improved Adversarial Training via Learned Optimizer0
Utilizing Adversarial Targeted Attacks to Boost Adversarial Robustness0
A General Black-box Adversarial Attack on Graph-based Fake News Detectors0
Improving adversarial robustness of deep neural networks by using semantic information0
AGATE: Stealthy Black-box Watermarking for Multimodal Model Copyright Protection0
Enhancing Transferability of Adversarial Examples with Spatial Momentum0
Improving Adversarial Transferability with Scheduled Step Size and Dual Example0
Improving Deep Learning Model Robustness Against Adversarial Attack by Increasing the Network Capacity0
Improving Gradient-based Adversarial Training for Text Classification by Contrastive Learning and Auto-Encoder0
Improving Network Interpretability via Explanation Consistency Evaluation0
Improving Neural Network Robustness through Neighborhood Preserving Layers0
A Framework for Verification of Wasserstein Adversarial Robustness0
Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator0
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks0
Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations0
Improving Robustness of Task Oriented Dialog Systems0
ODE guided Neural Data Augmentation Techniques for Time Series Data and its Benefits on Robustness0
A Framework for Understanding Model Extraction Attack and Defense0
The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection0
Show:102550
← PrevPage 19 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified