SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 901925 of 1808 papers

TitleStatusHype
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks0
Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks0
How Sampling Impacts the Robustness of Stochastic Neural Networks0
Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks0
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning0
AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization0
Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks0
I2VGuard: Safeguarding Images against Misuse in Diffusion-based Image-to-Video Models0
Identification of Attack-Specific Signatures in Adversarial Examples0
Identification of Systematic Errors of Image Classifiers on Rare Subgroups0
Using Word Embeddings to Explore the Learned Representations of Convolutional Neural Networks0
Identifying Classes Susceptible to Adversarial Attacks0
Identifying Informative Latent Variables Learned by GIN via Mutual Information0
Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception0
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection0
IDT: Dual-Task Adversarial Attacks for Privacy Protection0
A Generative Victim Model for Segmentation0
ILFO: Adversarial Attack on Adaptive Neural Networks0
Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks0
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs0
ImF: Implicit Fingerprint for Large Language Models0
Impact of Scaled Image on Robustness of Deep Neural Networks0
Imperceptible Adversarial Attack on Deep Neural Networks from Image Boundary0
Show:102550
← PrevPage 37 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified