SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 676700 of 1808 papers

TitleStatusHype
Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks0
Adversarial Examples in Deep Learning: Characterization and Divergence0
Forbidden Facts: An Investigation of Competing Objectives in Llama-20
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
Effective faking of verbal deception detection with target-aligned adversarial attacks0
Effects of Forward Error Correction on Communications Aware Evasion Attacks0
Defensive Quantization: When Efficiency Meets Robustness0
Adversarial Attack with Raindrops0
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models0
A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models0
FABLE: A Localized, Targeted Adversarial Attack on Weather Forecasting Models0
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
Frequency-Tuned Universal Adversarial Attacks0
Analyzing Robustness of the Deep Reinforcement Learning Algorithm in Ramp Metering Applications Considering False Data Injection Attack and Defense0
Efficient universal shuffle attack for visual object tracking0
EFSG: Evolutionary Fooling Sentences Generator0
Embodied Laser Attack:Leveraging Scene Priors to Achieve Agent-based Robust Non-contact Attacks0
Defense-guided Transferable Adversarial Attacks0
Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features0
Empirical Study of the Decision Region and Robustness in Deep Neural Networks0
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model0
Energy Attack: On Transferring Adversarial Examples0
Analytically Tractable Hidden-States Inference in Bayesian Neural Networks0
Show:102550
← PrevPage 28 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified