SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 16011650 of 1808 papers

TitleStatusHype
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies0
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey0
A Study on the Efficiency and Generalization of Light Hybrid Retrievers0
CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models0
CorrAttack: Black-box Adversarial Attack with Structured Search0
Correlation Analysis of Adversarial Attack in Time Series Classification0
Corruption Robust Offline Reinforcement Learning with Human Feedback0
CosalPure: Learning Concept from Group Images for Robust Co-Saliency Detection0
A Study for Universal Adversarial Attacks on Texture Recognition0
Should Adversarial Attacks Use Pixel p-Norm?0
Covariate Balancing Methods for Randomized Controlled Trials Are Not Adversarially Robust0
COVER: A Heuristic Greedy Adversarial Attack on Prompt-based Learning in Language Models0
Critical Checkpoints for Evaluating Defence Models Against Adversarial Attack and Robustness0
Universal Adversarial Attack on Aligned Multimodal LLMs0
Cross-Modality Attack Boosted by Gradient-Evolutionary Multiform Optimization0
Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift0
SIGL: Securing Software Installations Through Deep Graph Learning0
CuDA2: An approach for Incorporating Traitor Agents into Cooperative Multi-Agent Systems0
Signal Adversarial Examples Generation for Signal Detection Network via White-Box Attack0
Curvature Dynamic Black-box Attack: revisiting adversarial robustness via dynamic curvature estimation0
ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction0
Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense0
DA^3: A Distribution-Aware Adversarial Attack against Language Models0
Adversarial Attacks and Defences for Skin Cancer Classification0
DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation0
Darknet Traffic Classification and Adversarial Attacks0
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet0
Universal Adversarial Attack on Deep Learning Based Prognostics0
D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack0
DDR-ID: Dual Deep Reconstruction Networks Based Image Decomposition for Anomaly Detection0
Universal Adversarial Attack Using Very Few Test Examples0
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias0
Deceptive Diffusion: Generating Synthetic Adversarial Examples0
Adversarial Attacks against Deep Saliency Models0
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks0
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal0
Similarity of Neural Architectures using Adversarial Attack Transferability0
Simple and Effective Stochastic Neural Networks0
Deep adversarial attack on target detection systems0
Deep-Attack over the Deep Reinforcement Learning0
Universal Adversarial Perturbations and Image Spam Classifiers0
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System0
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis0
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems0
Adversarial Attacks Against Deep Learning Systems for ICD-9 Code Assignment0
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data Augmentation0
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment0
Deep Learning for Robust and Explainable Models in Computer Vision0
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs0
Deep-RBF Networks Revisited: Robust Classification with Rejection0
Show:102550
← PrevPage 33 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified