SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 10511100 of 1808 papers

TitleStatusHype
Sparse Adversarial Attack in Multi-agent Reinforcement Learning0
Sparse and Transferable Universal Singular Vectors Attack0
SSCAE: A Novel Semantic, Syntactic, and Context-Aware Natural Language Adversarial Example Generator0
SSCAE -- Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator0
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?0
STA: Adversarial Attacks on Siamese Trackers0
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech Emotion Recognition0
Stabilized Medical Attacks0
Stabilizing Deep Tomographic Reconstruction0
Standard detectors aren't (currently) fooled by physical adversarial stop signs0
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning0
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems0
Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning0
Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples0
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling0
Stochastic Variance Reduced Ensemble Adversarial Attack0
Strategically-timed State-Observation Attacks on Deep Reinforcement Learning Agents0
Strong Black-box Adversarial Attacks on Unsupervised Machine Learning Models0
Superclass Adversarial Attack0
SurvAttack: Black-Box Attack On Survival Models through Ontology-Informed EHR Perturbation0
Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks0
Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges0
Suspicion-Free Adversarial Attacks on Clustering Algorithms0
Graded Suspiciousness of Adversarial Texts to Human0
SWE2: SubWord Enriched and Significant Word Emphasized Framework for Hate Speech Detection0
Symmetric Saliency-based Adversarial Attack To Speaker Identification0
Tactics of Adversarial Attack on Deep Reinforcement Learning Agents0
Take Fake as Real: Realistic-like Robust Black-box Adversarial Attack to Evade AIGC Detection0
Targeted Adversarial Attacks against Neural Network Trajectory Predictors0
Effective Targeted Attacks for Adversarial Self-Supervised Learning0
Targeted Attacks on Timeseries Forecasting0
Target Model Agnostic Adversarial Attacks with Query Budgets on Language Understanding Models0
TASA: Twin Answer Sentences Attack for Adversarial Context Generation in Question Answering0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition0
TenAd: A Tensor-based Low-rank Black Box Adversarial Attack for Video Classification0
TESSER: Transfer-Enhancing Adversarial Attacks from Vision Transformers via Spectral and Semantic Regularization0
TETRIS: Towards Exploring the Robustness of Interactive Segmentation0
TextAttack: Lessons learned in designing Python frameworks for NLP0
TextDefense: Adversarial Text Detection based on Word Importance Entropy0
TextFlint: Unified Multilingual Robustness Evaluation Toolkit for Natural Language Processing0
Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks0
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification0
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language Models0
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks0
The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection0
The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness0
THE EFFECT OF ADVERSARIAL TRAINING: A THEORETICAL CHARACTERIZATION0
The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI0
The Efficacy of SHIELD under Different Threat Models0
Show:102550
← PrevPage 22 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified