SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 9511000 of 1808 papers

TitleStatusHype
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack0
Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation0
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping0
Retention Score: Quantifying Jailbreak Risks for Vision Language Models0
Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective0
Rethinking Adversarial Transferability from a Data Distribution Perspective0
Rethinking Classifier and Adversarial Attack0
Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness0
Rethinking Textual Adversarial Defense for Pre-trained Language Models0
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack0
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching0
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing0
Unauthorized AI cannot Recognize Me: Reversible Adversarial Example0
Reversible Attack based on Local Visual Adversarial Perturbation0
Reversible Adversarial Attack based on Reversible Image Transformation0
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective0
Rewriting Meaningful Sentences via Conditional BERT Sampling and an application on fooling text classifiers0
Rigid Body Adversarial Attacks0
A Black-Box Attack on Code Models via Representation Nearest Neighbor Search0
Robust Active Learning (RoAL): Countering Dynamic Adversaries in Active Learning with Elastic Weight Consolidation0
Robust Adversarial Attacks Detection based on Explainable Deep Reinforcement Learning For UAV Guidance and Planning0
Robust Adversarial Attacks Detection for Deep Learning based Relative Pose Estimation for Space Rendezvous0
Robust and Effective Grammatical Error Correction with Simple Cycle Self-Augmenting0
NaturalAE: Natural and Robust Physical Adversarial Examples for Object Detectors0
Robust Certification for Laplace Learning on Geometric Graphs0
Robust Constrained Reinforcement Learning0
Robust Deep Learning Models Against Semantic-Preserving Adversarial Attack0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey0
Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack0
Robustness of Bayesian Neural Networks to White-Box Adversarial Attacks0
Robustness of Explanation Methods for NLP Models0
Testing robustness of predictions of trained classifiers against naturally occurring perturbations0
Robustness of Selected Learning Models under Label-Flipping Attack0
Robust Optimal Power Flow Against Adversarial Attacks: A Tri-Level Optimization Approach0
Robust Physical-World Attacks on Face Recognition0
Robust saliency maps with distribution-preserving decoys0
SecureSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition0
Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness0
Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack0
Robust Superpixel-Guided Attentional Adversarial Attack0
Robust Text CAPTCHAs Using Adversarial Examples0
Robust Transfer Learning with Pretrained Language Models through Adapters0
Robust Unpaired Single Image Super-Resolution of Faces0
Toward Enhanced Robustness in Unsupervised Graph Representation Learning: A Graph Information Bottleneck Perspective0
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp0
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints0
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation0
SAD: Saliency-based Defenses Against Adversarial Examples0
Safeguarding Vision-Language Models Against Patched Visual Prompt Injectors0
Show:102550
← PrevPage 20 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified