SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13511375 of 1808 papers

TitleStatusHype
Retention Score: Quantifying Jailbreak Risks for Vision Language Models0
Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective0
Rethinking Adversarial Transferability from a Data Distribution Perspective0
Adversarial Attack with Pattern Replacement0
Rethinking Classifier and Adversarial Attack0
Adversarial Attack Type I: Cheat Classifiers by Significant Changes0
Transferable Adversarial Examples for Anchor Free Object Detection0
Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness0
Transferable and Configurable Audio Adversarial Attack from Low-Level Features0
Rethinking Textual Adversarial Defense for Pre-trained Language Models0
Adaptive Adversarial Attack on Scene Text Recognition0
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack0
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching0
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems0
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing0
Transferable Learned Image Compression-Resistant Adversarial Perturbations0
Unauthorized AI cannot Recognize Me: Reversible Adversarial Example0
Reversible Attack based on Local Visual Adversarial Perturbation0
Reversible Adversarial Attack based on Reversible Image Transformation0
Adversarial Attacks on Traffic Sign Recognition: A Survey0
Transferable Perturbations of Deep Feature Distributions0
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective0
Rewriting Meaningful Sentences via Conditional BERT Sampling and an application on fooling text classifiers0
Transferable Physical Attack against Object Detection with Separable Attention0
Adversarial Attacks on Speech Recognition Systems for Mission-Critical Applications: A Survey0
Show:102550
← PrevPage 55 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified