SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 76100 of 1808 papers

TitleStatusHype
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning0
sudo rm -rf agentic_securityCode1
ImF: Implicit Fingerprint for Large Language Models0
Bitstream Collisions in Neural Image Compression via Adversarial PerturbationsCode0
Make the Most of Everything: Further Considerations on Disrupting Diffusion-based Customization0
Augmented Adversarial Trigger Learning0
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security DataCode1
ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial Attacks0
Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution0
Towards Effective and Sparse Adversarial Attack on Spiking Neural Networks via Breaking Invisible Surrogate GradientsCode0
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal0
Data-free Universal Adversarial Perturbation with Pseudo-semantic PriorCode1
QFAL: Quantum Federated Adversarial Learning0
Prompt-driven Transferable Adversarial Attack on Person Re-Identification with Attribute-aware Textual Inversion0
Snowball Adversarial Attack on Traffic Sign Classification0
XSS Adversarial Attacks Based on Deep Reinforcement Learning: A Replication and Extension StudyCode0
Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation0
VGFL-SA: Vertical Graph Federated Learning Structure Attack Based on Contrastive Learning0
Emoti-Attack: Zero-Perturbation Adversarial Attacks on NLP Systems via Emoji Sequences0
Tracking the Copyright of Large Vision-Language Models through Parameter Learning Adversarial Images0
A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles0
Moshi Moshi? A Model Selection Hijacking Adversarial Attack0
Iron Sharpens Iron: Defending Against Attacks in Machine-Generated Text Detection with Adversarial TrainingCode1
Show:102550
← PrevPage 4 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified