SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 12011250 of 1808 papers

TitleStatusHype
Optimal Cost Constrained Adversarial Attacks For Multiple Agent Systems0
Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding0
Optimizing Key-Selection for Face-based One-Time Biometrics via Morphing0
Adversarially Robust Conformal Prediction0
OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization0
Bridging Optimal Transport and Jacobian Regularization by Optimal Trajectory for Enhanced Adversarial Defense0
A Deep Genetic Programming based Methodology for Art Media Classification Robust to Adversarial Perturbations0
Adversarially Robust Classification by Conditional Generative Model Inversion0
Towards Robust and Secure Embodied AI: A Survey on Vulnerabilities and Attacks0
Overlap-Aware Feature Learning for Robust Unsupervised Domain Adaptation for 3D Semantic Segmentation0
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels0
Ownership Verification of DNN Models Using White-Box Adversarial Attacks with Specified Probability Manipulation0
PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN0
Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks0
Mitigating the Impact of Noisy Edges on Graph-Based Algorithms via Adversarial Robustness Evaluation0
Pareto Regret Analyses in Multi-objective Multi-armed Bandit0
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack0
3D-VFD: A Victim-free Detector against 3D Adversarial Point Clouds0
Towards Robustness of Deep Neural Networks via Regularization0
Adversarial Learning of Deepfakes in Accounting0
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain0
Adversarial Interaction Attacks: Fooling AI to Misinterpret Human Intentions0
Towards Robust Neural Image Compression: Adversarial Attack and Model Finetuning0
PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation0
Towards Robust Speech-to-Text Adversarial Attack0
PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image Deraining for Semantic Segmentation0
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning0
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception0
Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification0
Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions0
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions0
Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation0
Towards Sybil Resilience in Decentralized Learning0
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial Attack against Infrared Pedestrian Detectors0
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions0
Perturbations in the Wild: Leveraging Human-Written Text Perturbations for Realistic Adversarial Attack and Defense0
Towards the Transferable Audio Adversarial Attack via Ensemble Methods0
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability0
Adversarial Imitation Attack0
Fooling the primate brain with minimal, targeted image manipulation0
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection0
Phrase-level Textual Adversarial Attack with Label Preservation0
Adversarial Identity Injection for Semantic Face Image Synthesis0
Adversarial Fine-tune with Dynamically Regulated Adversary0
Adversarial Exposure Attack on Diabetic Retinopathy Imagery Grading0
Physical Adversarial Attack on Monocular Depth Estimation via Shape-Varying Patches0
Physical Adversarial Attack on Vehicle Detector in the Carla Simulator0
Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook0
Adversarial Examples in Deep Learning: Characterization and Divergence0
PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack0
Show:102550
← PrevPage 25 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified