SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 13761400 of 1808 papers

TitleStatusHype
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack0
MAA: Meticulous Adversarial Attack against Vision-Language Pre-trained Models0
Make the Most of Everything: Further Considerations on Disrupting Diffusion-based Customization0
MARAGE: Transferable Multi-Model Adversarial Attack for Retrieval-Augmented Generation Data Extraction0
Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning0
MathAttack: Attacking Large Language Models Towards Math Solving Ability0
Fast Inference of Removal-Based Node InfluenceCode0
Fast Adversarial CNN-based Perturbation Attack of No-Reference Image Quality MetricsCode0
Fashion-Guided Adversarial Attack on Person SegmentationCode0
FDA: Feature Disruptive AttackCode0
A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding ModelsCode0
Versatile Weight Attack via Flipping Limited BitsCode0
Extending Adversarial Attacks to Produce Adversarial Class Probability DistributionsCode0
Feature Space Perturbations Yield More Transferable Adversarial ExamplesCode0
The Limitations of Deep Learning in Adversarial SettingsCode0
The LogBarrier adversarial attack: making effective use of decision boundary informationCode0
Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness against Adversarial AttackCode0
Federated Zeroth-Order Optimization using Trajectory-Informed Surrogate GradientsCode0
FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation TechniquesCode0
Adversarial Images for Variational AutoencodersCode0
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningCode0
Are Your Explanations Reliable? Investigating the Stability of LIME in Explaining Text Classifiers by Marrying XAI and Adversarial AttackCode0
Patch augmentation: Towards efficient decision boundaries for neural networksCode0
FireBERT: Hardening BERT-based classifiers against adversarial attackCode0
Transferability Bound Theory: Exploring Relationship between Adversarial Transferability and FlatnessCode0
Show:102550
← PrevPage 56 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1ResNet20Test Accuracy89.9589.95(1)Community Verified
2Xu et al.Attack: PGD2078.68Unverified
33-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
4TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
5AdvTraining [madry2018]Attack: PGD2048.44Unverified
6TRADES [zhang2019b]Attack: PGD2045.9Unverified
7XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified