SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 17011750 of 1808 papers

TitleStatusHype
Application of Adversarial Examples to Physical ECG Signals0
Physical-World Optical Adversarial Attacks on 3D Face Recognition0
Sparse and Transferable Universal Singular Vectors Attack0
A Perceptual Distortion Reduction Framework: Towards Generating Adversarial Examples with High Perceptual Quality and Attack Success Rate0
OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training0
White-Box Target Attack for EEG-Based BCI Regression Problems0
Anti-Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization0
Classifier-independent Lower-Bounds for Adversarial Robustness0
Distillation-Enhanced Physical Adversarial Attacks0
Semantically Stealthy Adversarial Attacks against Segmentation Models0
Distributed Estimation over Directed Graphs Resilient to Sensor Spoofing0
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks0
Adversarial Attack Framework on Graph Embedding Models with Limited Knowledge0
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques0
DMS: Addressing Information Loss with More Steps for Pragmatic Adversarial Attacks0
DO-AutoEncoder: Learning and Intervening Bivariate Causal Mechanisms in Images0
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics0
Does Safety Training of LLMs Generalize to Semantically Related Natural Prompts?0
Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images0
DoPa: A Comprehensive CNN Detection Methodology against Physical Adversarial Attacks0
Doppelganger Method: Breaking Role Consistency in LLM Agent via Prompt-based Transferable Adversarial Attack0
Double Backpropagation for Training Autoencoders against Adversarial Attack0
DIP-Watermark: A Double Identity Protection Method Based on Robust Adversarial Watermark0
Do we need entire training data for adversarial training?0
DRO-Augment Framework: Robustness by Synergizing Wasserstein Distributionally Robust Optimization and Data Augmentation0
AN-GCN: An Anonymous Graph Convolutional Network Defense Against Edge-Perturbing Attack0
D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack0
DTA: Physical Camouflage Attacks using Differentiable Transformation Network0
Dual Teacher Knowledge Distillation with Domain Alignment for Face Anti-spoofing0
SSCAE: A Novel Semantic, Syntactic, and Context-Aware Natural Language Adversarial Example Generator0
SSCAE -- Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator0
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?0
Dynamic backdoor attacks against federated learning0
Dynamic ensemble selection based on Deep Neural Network Uncertainty Estimation for Adversarial Robustness0
Dynamic Knowledge Graph-based Dialogue Generation with Improved Adversarial Meta-Learning0
STA: Adversarial Attacks on Siamese Trackers0
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech Emotion Recognition0
Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks0
Stabilized Medical Attacks0
A Bayes-Optimal View on Adversarial Examples0
A Non-monotonic Smooth Activation Function0
Effective black box adversarial attack with handcrafted kernels0
Effective faking of verbal deception detection with target-aligned adversarial attacks0
Effects of Forward Error Correction on Communications Aware Evasion Attacks0
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models0
Stabilizing Deep Tomographic Reconstruction0
Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense0
Adversarial Attack for Uncertainty Estimation: Identifying Critical Regions in Neural Networks0
Adversarial Attack for Explanation Robustness of Rationalization Models0
An Incremental Gray-box Physical Adversarial Attack on Neural Network Training0
Show:102550
← PrevPage 35 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified