SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 51100 of 1808 papers

TitleStatusHype
Data-Driven Falsification of Cyber-Physical SystemsCode0
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey0
Adversarial Robustness Analysis of Vision-Language Models in Medical Image SegmentationCode0
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp0
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability0
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks0
Fast and Low-Cost Genomic Foundation Models via Outlier RemovalCode1
AGATE: Stealthy Black-box Watermarking for Multimodal Model Copyright Protection0
Forging and Removing Latent-Noise Diffusion Watermarks Using a Single ImageCode0
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
Adversarial Attack for RGB-Event based Visual Object TrackingCode0
Q-FAKER: Query-free Hard Black-box Attack via Controlled Generation0
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign ClassificationCode0
SemDiff: Generating Natural Unrestricted Adversarial Examples via Semantic Attributes Optimization in Diffusion Models0
Towards Safe Synthetic Image Generation On the Web: A Multimodal Robust NSFW Defense and Million Scale DatasetCode0
Bregman Linearized Augmented Lagrangian Method for Nonconvex Constrained Stochastic Zeroth-order Optimization0
Toward Spiking Neural Network Local Learning Modules Resistant to Adversarial Attacks0
Towards Calibration Enhanced Network by Inverse Adversarial Attack0
Secure Diagnostics: Adversarial Robustness Meets Clinical Interpretability0
Moving Target Defense Against Adversarial False Data Injection Attacks In Power Grids0
Overlap-Aware Feature Learning for Robust Unsupervised Domain Adaptation for 3D Semantic Segmentation0
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection0
TenAd: A Tensor-based Low-rank Black Box Adversarial Attack for Video Classification0
Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks0
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning0
sudo rm -rf agentic_securityCode1
ImF: Implicit Fingerprint for Large Language Models0
Bitstream Collisions in Neural Image Compression via Adversarial PerturbationsCode0
Make the Most of Everything: Further Considerations on Disrupting Diffusion-based Customization0
Augmented Adversarial Trigger Learning0
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security DataCode1
ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial Attacks0
Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution0
Towards Effective and Sparse Adversarial Attack on Spiking Neural Networks via Breaking Invisible Surrogate GradientsCode0
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal0
Data-free Universal Adversarial Perturbation with Pseudo-semantic PriorCode1
QFAL: Quantum Federated Adversarial Learning0
Prompt-driven Transferable Adversarial Attack on Person Re-Identification with Attribute-aware Textual Inversion0
Snowball Adversarial Attack on Traffic Sign Classification0
XSS Adversarial Attacks Based on Deep Reinforcement Learning: A Replication and Extension StudyCode0
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation0
VGFL-SA: Vertical Graph Federated Learning Structure Attack Based on Contrastive Learning0
Emoti-Attack: Zero-Perturbation Adversarial Attacks on NLP Systems via Emoji Sequences0
Tracking the Copyright of Large Vision-Language Models through Parameter Learning Adversarial Images0
A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles0
Moshi Moshi? A Model Selection Hijacking Adversarial Attack0
Iron Sharpens Iron: Defending Against Attacks in Machine-Generated Text Detection with Adversarial TrainingCode1
Show:102550
← PrevPage 2 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified