SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 16511700 of 1808 papers

TitleStatusHype
As Firm As Their Foundations: Can open-sourced foundation models be used to create adversarial examples for downstream tasks?0
Defending Against Adversarial Attack in ECG Classification with Adversarial Distillation Training0
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-task Training0
Defending Against Adversarial Examples by Regularized Deep Embedding0
A Black-Box Attack on Optical Character Recognition Systems0
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems0
Post-train Black-box Defense via Bayesian Boundary Correction0
AdversariaL attacK sAfety aLIgnment(ALKALI): Safeguarding LLMs through GRACE: Geometric Representation-Aware Contrastive Enhancement- Introducing Adversarial Vulnerability Quality Index (AVQI)0
Adversarial Attack on Skeleton-based Human Action Recognition0
Art-Attack: Black-Box Adversarial Attack via Evolutionary Art0
A Robust Likelihood Model for Novelty Detection0
ABIGX: A Unified Framework for eXplainable Fault Detection and Classification0
Defense against Adversarial Cloud Attack on Remote Sensing Salient Object Detection0
Defense Against Explanation Manipulation0
Adversarial Attack on Sentiment Classification0
Defense-guided Transferable Adversarial Attacks0
Defense of Adversarial Ranking Attack in Text Retrieval: Benchmark and Baseline via Detection0
AR-GAN: Generative Adversarial Network-Based Defense Method Against Adversarial Attacks on the Traffic Sign Classification System of Autonomous Vehicles0
Defensive Quantization: When Efficiency Meets Robustness0
SMART: Skeletal Motion Action Recognition aTtack0
Delving into Data: Effectively Substitute Training for Black-box Attack0
SNEAK: Synonymous Sentences-Aware Adversarial Attack on Natural Language Video Localization0
Democratic Training Against Universal Adversarial Perturbations0
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning0
Design of secure and robust cognitive system for malware detection0
Snowball Adversarial Attack on Traffic Sign Classification0
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions0
Universal Attacks on Equivariant Networks0
Solving Non-Convex Non-Differentiable Min-Max Games using Proximal Gradient Method0
Adversarial Attack on Hierarchical Graph Pooling Neural Networks0
Detecting and Segmenting Adversarial Graphics Patterns from Images0
A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks0
Sparse Adversarial Attack in Multi-agent Reinforcement Learning0
Adversarial Attack on Facial Recognition using Visible Light0
DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning0
Device-aware Optical Adversarial Attack for a Portable Projector-camera System0
DFT-Based Adversarial Attack Detection in MRI Brain Imaging: Enhancing Diagnostic Accuracy in Alzheimer's Case Studies0
A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models0
Architecture Selection via the Trade-off Between Accuracy and Robustness0
Adversarial Attack on Deep Product Quantization Network for Image Retrieval0
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement0
A Practical and Stealthy Adversarial Attack for Cyber-Physical Applications0
Differentially Private Reward Estimation with Preference Feedback0
Differential Privacy in Personalized Pricing with Nonparametric Demand Models0
Adversarial Attack on Deep Cross-Modal Hamming Retrieval0
Diffusion Attack: Leveraging Stable Diffusion for Naturalistic Image Attacking0
A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems0
DIMBA: Discretely Masked Black-Box Attack in Single Object Tracking0
Universal Distributional Decision-based Black-box Adversarial Attack with Reinforcement Learning0
Applying Tensor Decomposition to image for Robustness against Adversarial Attack0
Show:102550
← PrevPage 34 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified