SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13511400 of 1808 papers

TitleStatusHype
Retention Score: Quantifying Jailbreak Risks for Vision Language Models0
Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective0
Rethinking Adversarial Transferability from a Data Distribution Perspective0
Adversarial Attack with Pattern Replacement0
Rethinking Classifier and Adversarial Attack0
Adversarial Attack Type I: Cheat Classifiers by Significant Changes0
Transferable Adversarial Examples for Anchor Free Object Detection0
Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness0
Transferable and Configurable Audio Adversarial Attack from Low-Level Features0
Rethinking Textual Adversarial Defense for Pre-trained Language Models0
Adaptive Adversarial Attack on Scene Text Recognition0
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack0
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching0
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems0
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing0
Transferable Learned Image Compression-Resistant Adversarial Perturbations0
Unauthorized AI cannot Recognize Me: Reversible Adversarial Example0
Reversible Attack based on Local Visual Adversarial Perturbation0
Reversible Adversarial Attack based on Reversible Image Transformation0
Adversarial Attacks on Traffic Sign Recognition: A Survey0
Transferable Perturbations of Deep Feature Distributions0
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective0
Rewriting Meaningful Sentences via Conditional BERT Sampling and an application on fooling text classifiers0
Transferable Physical Attack against Object Detection with Separable Attention0
Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey0
Rigid Body Adversarial Attacks0
A Black-Box Attack on Code Models via Representation Nearest Neighbor Search0
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio0
Robust Active Learning (RoAL): Countering Dynamic Adversaries in Active Learning with Elastic Weight Consolidation0
Robust Adversarial Attacks Detection based on Explainable Deep Reinforcement Learning For UAV Guidance and Planning0
Robust Adversarial Attacks Detection for Deep Learning based Relative Pose Estimation for Space Rendezvous0
Robust and Effective Grammatical Error Correction with Simple Cycle Self-Augmenting0
NaturalAE: Natural and Robust Physical Adversarial Examples for Object Detectors0
Robust Certification for Laplace Learning on Geometric Graphs0
Robust Constrained Reinforcement Learning0
Active Sentence Learning by Adversarial Uncertainty Sampling in Discrete Space0
Robust Deep Learning Models Against Semantic-Preserving Adversarial Attack0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
Adversarial Attacks on Image Classification Models: Analysis and Defense0
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey0
Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack0
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection0
XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers via Feature Substitution0
Adversarial Attacks on Hidden Tasks in Multi-Task Learning0
Activation Learning by Local Competitions0
Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization0
Robustness of Bayesian Neural Networks to White-Box Adversarial Attacks0
Robustness of Explanation Methods for NLP Models0
Testing robustness of predictions of trained classifiers against naturally occurring perturbations0
A critique of the DeepSec Platform for Security Analysis of Deep Learning Models0
Show:102550
← PrevPage 28 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified