SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13011350 of 1808 papers

TitleStatusHype
Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations0
Improving Robustness of Task Oriented Dialog Systems0
ODE guided Neural Data Augmentation Techniques for Time Series Data and its Benefits on Robustness0
Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing0
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation0
Improving the Transferability of Adversarial Attacks on Face Recognition with Beneficial Perturbation Feature Augmentation0
Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature Mixing0
Improving Visual Quality and Transferability of Adversarial Attacks on Face Recognition Simultaneously with Adversarial Restoration0
Improving Visual Quality of Unrestricted Adversarial Examples with Wavelet-VAE0
Influence Based Defense Against Data Poisoning Attacks in Online Learning0
"Influence Sketching": Finding Influential Samples In Large-Scale Regressions0
Information Importance-Aware Defense against Adversarial Attack for Automatic Modulation Classification:An XAI-Based Approach0
Inline Detection of DGA Domains Using Side Information0
Input Hessian Regularization of Neural Networks0
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain0
Input-specific Attention Subnetworks for Adversarial Detection0
Input-specific Attention Subnetworks for Adversarial Detection0
Intermediate Level Adversarial Attack for Enhanced Transferability0
Intermediate Outputs Are More Sensitive Than You Think0
Internal Wasserstein Distance for Adversarial Attack and Defense0
Interpolation between CNNs and ResNets0
Interpreting and Evaluating Neural Network Robustness0
Interpreting Hidden Semantics in the Intermediate Layers of 3D Point Cloud Classification Neural Network0
Discovering Failure Modes of Text-guided Diffusion Models via Adversarial Search0
MF-CLIP: Leveraging CLIP as Surrogate Models for No-box Adversarial Attacks0
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems0
Exploring the Robustness of NMT Systems to Nonsensical Inputs0
Investigating Decision Boundaries of Trained Neural Networks0
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization0
Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems0
Investigating Vulnerability to Adversarial Examples on Multimodal Data Fusion in Deep Learning0
I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models0
Learning Task-aware Robust Deep Learning Systems0
Is It Time to Redefine the Classification Task for Deep Learning Systems?0
Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition0
Iterative Adversarial Attack on Image-guided Story Ending Generation0
ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition0
Adversarial Rain Attack and Defensive Deraining for DNN Perception0
JailbreakHunter: A Visual Analytics Approach for Jailbreak Prompts Discovery from Large-Scale Human-LLM Conversational Datasets0
Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts0
Jailbreaking Prompt Attack: A Controllable Adversarial Attack against Diffusion Models0
Jitter Does Matter: Adapting Gaze Estimation to New Domains0
Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame Attack0
Keep on Swimming: Real Attackers Only Need Partial Knowledge of a Multi-Model System0
KoDF: A Large-scale Korean DeepFake Detection Dataset0
Label Smoothing and Adversarial Robustness0
LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications0
Large-Scale Adversarial Attacks on Graph Neural Networks via Graph Coarsening0
Latent Magic: An Investigation into Adversarial Examples Crafted in the Semantic Latent Space0
LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions0
Show:102550
← PrevPage 27 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified