SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 14011450 of 1808 papers

TitleStatusHype
Adversarial attacks on deep learning models for fatty liver disease classification by modification of ultrasound image reconstruction method0
Robustness of Selected Learning Models under Label-Flipping Attack0
Robust Optimal Power Flow Against Adversarial Attacks: A Tri-Level Optimization Approach0
Tropical Attention: Neural Algorithmic Reasoning for Combinatorial Algorithms0
Robust Physical-World Attacks on Face Recognition0
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression0
When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence0
Trustworthy Actionable Perturbations0
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search0
Robust saliency maps with distribution-preserving decoys0
SecureSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition0
Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness0
Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack0
Robust Superpixel-Guided Attentional Adversarial Attack0
Robust Text CAPTCHAs Using Adversarial Examples0
A Computationally Efficient Method for Defending Adversarial Deep Learning Attacks0
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond0
Robust Transfer Learning with Pretrained Language Models through Adapters0
Robust Unpaired Single Image Super-Resolution of Faces0
Toward Enhanced Robustness in Unsupervised Graph Representation Learning: A Graph Information Bottleneck Perspective0
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp0
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints0
Adversarial Attacks on Deep Graph Matching0
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation0
Accelerating Monte Carlo Bayesian Inference via Approximating Predictive Uncertainty over the Simplex0
UNBUS: Uncertainty-aware Deep Botnet Detection System in Presence of Perturbed Samples0
SAD: Saliency-based Defenses Against Adversarial Examples0
Adversarial Attacks on Camera-LiDAR Models for 3D Car Detection0
Safeguarding Vision-Language Models Against Patched Visual Prompt Injectors0
Adversarial attacks on audio source separation0
A Survey of Safety and Trustworthiness of Deep Neural Networks: Verification, Testing, Adversarial Attack and Defence, and Interpretability0
Uncertainty-Aware SAR ATR: Defending Against Adversarial Attacks via Bayesian Neural Networks0
Adversarial attacks on an optical neural network0
Yet another but more efficient black-box adversarial attack: tiling and evolution strategies0
Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation0
Salient Information Preserving Adversarial Training Improves Clean and Robust Accuracy0
Uncertainty Measurement of Deep Learning System based on the Convex Hull of Training Sets0
Sample Complexity of an Adversarial Attack on UCB-based Best-arm Identification Policy0
Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks0
SAR-AE-SFP: SAR Imagery Adversarial Example in Real Physics domain with Target Scattering Feature Parameters0
Undersensitivity in Neural Reading Comprehension0
Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers0
Membership Inference Attacks Against Temporally Correlated Data in Deep Reinforcement Learning0
Scale-free and Task-agnostic Attack: Generating Photo-realistic Adversarial Patterns with Patch Quilting Generator0
Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution0
Scale-Invariant Adversarial Attack for Evaluating and Enhancing Adversarial Defenses0
Scaling Laws for Black box Adversarial Attacks0
Accelerated Zeroth-Order and First-Order Momentum Methods from Mini to Minimax Optimization0
Understanding Model Ensemble in Transferable Adversarial Attack0
Adversarial Attacks on AI-Generated Text Detection Models: A Token Probability-Based Approach Using Embeddings0
Show:102550
← PrevPage 29 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified