SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 526550 of 1808 papers

TitleStatusHype
Hard No-Box Adversarial Attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed GradientCode1
Federated Zeroth-Order Optimization using Trajectory-Informed Surrogate GradientsCode0
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning0
Exploring the Physical World Adversarial Robustness of Vehicle Detection0
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation0
An AI-Enabled Framework to Defend Ingenious MDT-based Attacks on the Emerging Zero Touch Cellular Networks0
An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial TransferabilityCode1
Multi-attacks: Many images + the same adversarial attack many target labelsCode1
Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness0
LimeAttack: Local Explainable Method for Textual Hard-Label Adversarial AttackCode0
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
On Neural Network approximation of ideal adversarial attack and convergence of adversarial training0
When Measures are Unreliable: Imperceptible Adversarial Perturbations toward Top-k Multi-Label LearningCode0
Universal and Transferable Adversarial Attacks on Aligned Language ModelsCode4
On the unreasonable vulnerability of transformers for image restoration -- and an easy fix0
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation0
AdvDiff: Generating Unrestricted Adversarial Examples using Diffusion ModelsCode1
OUTFOX: LLM-Generated Essay Detection Through In-Context Learning with Adversarially Generated ExamplesCode1
Adversarial Attacks on Traffic Sign Recognition: A Survey0
On the Robustness of Split Learning against Adversarial Attacks0
On the Sensitivity of Deep Load Disaggregation to Adversarial Attacks0
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical WorldCode0
Frequency Domain Adversarial Training for Robust Volumetric Medical SegmentationCode1
Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations0
Show:102550
← PrevPage 22 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified