SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 701725 of 1808 papers

TitleStatusHype
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems0
Enhanced Urban Region Profiling with Adversarial Self-Supervised Learning for Robust Forecasting and Security0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack0
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System0
Enhancing Adversarial Transferability via Component-Wise Transformation0
Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training0
ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction0
A Study for Universal Adversarial Attacks on Texture Recognition0
Global Robustness Verification Networks0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation0
Enhancing the Transferability via Feature-Momentum Adversarial Attack0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Analyzing Robustness of the Deep Reinforcement Learning Algorithm in Ramp Metering Applications Considering False Data Injection Attack and Defense0
Enhancing Transferability of Adversarial Attacks with GE-AdvGAN+: A Comprehensive Framework for Gradient Editing0
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier0
A Survey on Physical Adversarial Attacks against Face Recognition Systems0
Defense-guided Transferable Adversarial Attacks0
Analytically Tractable Hidden-States Inference in Bayesian Neural Networks0
Adversarial Attack with Pattern Replacement0
ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech0
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization0
EVALOOP: Assessing LLM Robustness in Programming from a Self-consistency Perspective0
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features0
Show:102550
← PrevPage 29 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified