SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 10011050 of 1808 papers

TitleStatusHype
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability0
Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation0
Salient Information Preserving Adversarial Training Improves Clean and Robust Accuracy0
Sample Complexity of an Adversarial Attack on UCB-based Best-arm Identification Policy0
Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks0
SAR-AE-SFP: SAR Imagery Adversarial Example in Real Physics domain with Target Scattering Feature Parameters0
Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers0
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator0
Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution0
Scale-Invariant Adversarial Attack for Evaluating and Enhancing Adversarial Defenses0
Scaling Laws for Black box Adversarial Attacks0
A^3D: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks0
Search Space of Adversarial Perturbations against Image Filters0
Second-Order Adversarial Attack and Certifiable Robustness0
Second-Order NLP Adversarial Examples0
Second Order State Hallucinations for Adversarial Attack Mitigation in Formation Control of Multi-Agent Systems0
Secure Diagnostics: Adversarial Robustness Meets Clinical Interpretability0
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples0
Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks0
Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack0
Seeing is Deceiving: Exploitation of Visual Pathways in Multi-Modal Language Models0
Seeing the Threat: Vulnerabilities in Vision-Language Models to Adversarial Attack0
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation0
SAM Meets UAP: Attacking Segment Anything Model With Universal Adversarial Perturbation0
Self adversarial attack as an augmentation method for immunohistochemical stainings0
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner0
SELF-KNOWLEDGE DISTILLATION ADVERSARIAL ATTACK0
Self-Supervised Adversarial Example Detection by Disentangled Representation0
Self-Supervised Contrastive Learning with Adversarial Perturbations for Robust Pretrained Language Models0
Self-Supervised Representation Learning for Adversarial Attack Detection0
Semantic Adversarial Attacks on Face Recognition through Significant Attributes0
Semantic Autoencoder and Its Potential Usage for Adversarial Attack0
Semantic Image Attack for Visual Model Diagnosis0
Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm0
Model Robustness with Text Classification: Semantic-preserving adversarial attacks0
SemDiff: Generating Natural Unrestricted Adversarial Examples via Semantic Attributes Optimization in Diffusion Models0
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images0
Sequential Attacks on Agents for Long-Term Adversarial Goals0
SHARP: Search-Based Adversarial Attack for Structured Prediction0
ShieldNets: Defending Against Adversarial Attacks Using Probabilistic Adversarial Robustness0
Should Adversarial Attacks Use Pixel p-Norm?0
SIGL: Securing Software Installations Through Deep Graph Learning0
Signal Adversarial Examples Generation for Signal Detection Network via White-Box Attack0
Similarity of Neural Architectures using Adversarial Attack Transferability0
Simple and Effective Stochastic Neural Networks0
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis0
SMART: Skeletal Motion Action Recognition aTtack0
SNEAK: Synonymous Sentences-Aware Adversarial Attack on Natural Language Video Localization0
Snowball Adversarial Attack on Traffic Sign Classification0
Solving Non-Convex Non-Differentiable Min-Max Games using Proximal Gradient Method0
Show:102550
← PrevPage 21 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified