SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 676700 of 1808 papers

TitleStatusHype
Susceptibility of Adversarial Attack on Medical Image Segmentation ModelsCode0
HGAttack: Transferable Heterogeneous Graph Adversarial Attack0
Artwork Protection Against Neural Style Transfer Using Locally Adaptive Adversarial Color AttackCode0
Rethinking Impersonation and Dodging Attacks on Face Recognition Systems0
A Generative Adversarial Attack for Multilingual Text Classifiers0
Left-right Discrepancy for Adversarial Attack on Stereo Networks0
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability0
Data-Driven Subsampling in the Presence of an Adversarial ActorCode0
Transferable Learned Image Compression-Resistant Adversarial Perturbations0
Demonstration of an Adversarial Attack Against a Multimodal Vision Language Model for Pathology ImagingCode0
Dual Teacher Knowledge Distillation with Domain Alignment for Face Anti-spoofing0
AR-GAN: Generative Adversarial Network-Based Defense Method Against Adversarial Attacks on the Traffic Sign Classification System of Autonomous Vehicles0
Towards adversarial robustness verification of no-reference image-and video-quality metricsCode0
Explainability-Driven Leaf Disease Classification Using Adversarial Training and Knowledge Distillation0
Explainability-Based Adversarial Attack on Graphs Through Edge Perturbation0
Attack Tree Analysis for Adversarial Evasion Attacks0
Adversarial Attacks on Image Classification Models: Analysis and Defense0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual Adversarial ExamplesCode0
Mutual-modality Adversarial Attack with Semantic Perturbation0
Embodied Laser Attack:Leveraging Scene Priors to Achieve Agent-based Robust Non-contact Attacks0
A Malware Classification Survey on Adversarial Attacks and Defences0
Forbidden Facts: An Investigation of Competing Objectives in Llama-20
Robust Few-Shot Named Entity Recognition with Boundary Discrimination and Correlation PurificationCode0
Towards Transferable Adversarial Attacks with Centralized Perturbation0
Show:102550
← PrevPage 28 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified