SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 476500 of 1808 papers

TitleStatusHype
CT-GAT: Cross-Task Generative Adversarial Attack based on TransferabilityCode0
Beyond Hard Samples: Robust and Effective Grammatical Error Correction with Cycle Self-AugmentingCode0
SAM Meets UAP: Attacking Segment Anything Model With Universal Adversarial Perturbation0
Adversarial Training for Physics-Informed Neural NetworksCode0
Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks0
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization0
Black-box Targeted Adversarial Attack on Segment Anything (SAM)0
A Non-monotonic Smooth Activation Function0
Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion ModelsCode0
Adversarial optimization leads to over-optimistic security-constrained dispatch, but sampling can help0
Targeted Attack Improves Protection against Unauthorized Diffusion CustomizationCode1
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System0
Enhancing Robust Representation in Adversarial Training: Alignment and Exclusion CriteriaCode0
Optimizing Key-Selection for Face-based One-Time Biometrics via Morphing0
Adversarial Client Detection via Non-parametric Subspace Monitoring in the Internet of Federated Things0
Robustness of AI-Image Detectors: Fundamental Limits and Practical AttacksCode1
Gray-box Adversarial Attack of Deep Reinforcement Learning-based Trading Agents0
Structure Invariant Transformation for better Adversarial TransferabilityCode1
Understanding Pose and Appearance Disentanglement in 3D Human Pose Estimation0
PRAT: PRofiling Adversarial aTtacks0
Model Leeching: An Extraction Attack Targeting LLMs0
Transferable Adversarial Attack on Image Tampering Localization0
Context-aware Adversarial Attack on Named Entity Recognition0
Semantic Adversarial Attacks via Diffusion ModelsCode1
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection0
Show:102550
← PrevPage 20 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified