SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 17511800 of 1808 papers

TitleStatusHype
Standard detectors aren't (currently) fooled by physical adversarial stop signs0
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning0
An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks0
Efficient universal shuffle attack for visual object tracking0
EFSG: Evolutionary Fooling Sentences Generator0
Embodied Laser Attack:Leveraging Scene Priors to Achieve Agent-based Robust Non-contact Attacks0
Emoti-Attack: Zero-Perturbation Adversarial Attacks on NLP Systems via Emoji Sequences0
Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features0
Empirical Study of the Decision Region and Robustness in Deep Neural Networks0
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model0
Energy Attack: On Transferring Adversarial Examples0
Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations0
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems0
Enhanced Urban Region Profiling with Adversarial Self-Supervised Learning for Robust Forecasting and Security0
Enhancing Accuracy and Robustness through Adversarial Training in Class Incremental Continual Learning0
Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack0
3DGAA: Realistic and Robust 3D Gaussian-based Adversarial Attack for Autonomous Driving0
Enhancing Adversarial Transferability via Component-Wise Transformation0
Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training0
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks0
Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning0
Adversarial Attack Driven Data Augmentation for Accurate And Robust Medical Image Segmentation0
Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples0
Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation0
Enhancing the Transferability via Feature-Momentum Adversarial Attack0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks0
Enhancing Transferability of Adversarial Attacks with GE-AdvGAN+: A Comprehensive Framework for Gradient Editing0
Enhancing Transformation-Based Defenses Against Adversarial Attacks with a Distribution Classifier0
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling0
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms0
An Empirical Study on Adversarial Attack on NMT: Languages and Positions Matter0
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models0
Adversarial Attack by Limited Point Cloud Surface Modifications0
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization0
EVALOOP: Assessing LLM Robustness in Programming from a Self-consistency Perspective0
Stochastic Variance Reduced Ensemble Adversarial Attack0
Evaluating Adversarial Robustness on Document Image Classification0
Adversarial Attack Based on Prediction-Correction0
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication0
Evaluating Neural Model Robustness for Machine Comprehension0
Attacking c-MARL More Effectively: A Data Driven Approach0
Evaluating Similitude and Robustness of Deep Image Denoising Models via Adversarial Attack0
Strategically-timed State-Observation Attacks on Deep Reinforcement Learning Agents0
Unlearning or Concealment? A Critical Analysis and Evaluation Metrics for Unlearning in Diffusion Models0
Evaluating the Robustness of LiDAR Point Cloud Tracking Against Adversarial Attack0
Strong Black-box Adversarial Attacks on Unsupervised Machine Learning Models0
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs0
Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement Analysis0
Evaluation of Momentum Diverse Input Iterative Fast Gradient Sign Method (M-DI2-FGSM) Based Attack Method on MCS 2018 Adversarial Attacks on Black Box Face Recognition System0
Show:102550
← PrevPage 36 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified