SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 551575 of 1808 papers

TitleStatusHype
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial Attack against Infrared Pedestrian Detectors0
Adaptive Adversarial Attack on Scene Text Recognition0
DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks0
A Survey on Physical Adversarial Attacks against Face Recognition Systems0
A Survey on Physical Adversarial Attack in Computer Vision0
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Adversarial Imitation Attack0
Adversarial Attack for Uncertainty Estimation: Identifying Critical Regions in Neural Networks0
A Study for Universal Adversarial Attacks on Texture Recognition0
ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction0
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio0
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System0
As Firm As Their Foundations: Can open-sourced foundation models be used to create adversarial examples for downstream tasks?0
Fooling the primate brain with minimal, targeted image manipulation0
A Bayes-Optimal View on Adversarial Examples0
Does Safety Training of LLMs Generalize to Semantically Related Natural Prompts?0
Doppelganger Method: Breaking Role Consistency in LLM Agent via Prompt-based Transferable Adversarial Attack0
DRO-Augment Framework: Robustness by Synergizing Wasserstein Distributionally Robust Optimization and Data Augmentation0
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems0
Adversarial Identity Injection for Semantic Face Image Synthesis0
Adversarial Attack for Explanation Robustness of Rationalization Models0
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art0
A Robust Likelihood Model for Novelty Detection0
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques0
Show:102550
← PrevPage 23 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified