SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 651675 of 1808 papers

TitleStatusHype
Anti-Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization0
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques0
DMS: Addressing Information Loss with More Steps for Pragmatic Adversarial Attacks0
DO-AutoEncoder: Learning and Intervening Bivariate Causal Mechanisms in Images0
Design of secure and robust cognitive system for malware detection0
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach0
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning0
DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks0
Doppelganger Method: Breaking Role Consistency in LLM Agent via Prompt-based Transferable Adversarial Attack0
Double Backpropagation for Training Autoencoders against Adversarial Attack0
Democratic Training Against Universal Adversarial Perturbations0
Do we need entire training data for adversarial training?0
Experimental robustness benchmark of quantum neural network on a superconducting quantum processor0
Analyzing the Noise Robustness of Deep Neural Networks0
D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack0
DTA: Physical Camouflage Attacks using Differentiable Transformation Network0
Delving into Data: Effectively Substitute Training for Black-box Attack0
Applying Tensor Decomposition to image for Robustness against Adversarial Attack0
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
Defensive Quantization: When Efficiency Meets Robustness0
Adversarial Attack with Raindrops0
Dynamic Knowledge Graph-based Dialogue Generation with Improved Adversarial Meta-Learning0
A Practical and Stealthy Adversarial Attack for Cyber-Physical Applications0
Examining the Human Perceptibility of Black-Box Adversarial Attacks on Face Recognition0
Show:102550
← PrevPage 27 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified