SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 10761100 of 1808 papers

TitleStatusHype
Symmetric Saliency-based Adversarial Attack To Speaker Identification0
Tactics of Adversarial Attack on Deep Reinforcement Learning Agents0
Take Fake as Real: Realistic-like Robust Black-box Adversarial Attack to Evade AIGC Detection0
Targeted Adversarial Attacks against Neural Network Trajectory Predictors0
Effective Targeted Attacks for Adversarial Self-Supervised Learning0
Targeted Attacks on Timeseries Forecasting0
Target Model Agnostic Adversarial Attacks with Query Budgets on Language Understanding Models0
TASA: Twin Answer Sentences Attack for Adversarial Context Generation in Question Answering0
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN0
Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition0
TenAd: A Tensor-based Low-rank Black Box Adversarial Attack for Video Classification0
TESSER: Transfer-Enhancing Adversarial Attacks from Vision Transformers via Spectral and Semantic Regularization0
TETRIS: Towards Exploring the Robustness of Interactive Segmentation0
TextAttack: Lessons learned in designing Python frameworks for NLP0
TextDefense: Adversarial Text Detection based on Word Importance Entropy0
TextFlint: Unified Multilingual Robustness Evaluation Toolkit for Natural Language Processing0
Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks0
TextShield: Beyond Successfully Detecting Adversarial Sentences in Text Classification0
TF-Attack: Transferable and Fast Adversarial Attacks on Large Language Models0
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks0
The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection0
The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness0
THE EFFECT OF ADVERSARIAL TRAINING: A THEORETICAL CHARACTERIZATION0
The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI0
The Efficacy of SHIELD under Different Threat Models0
Show:102550
← PrevPage 44 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified