SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 14511475 of 1808 papers

TitleStatusHype
Adversarial Attacks Neutralization via Data Set Randomization0
Understanding Oversmoothing in GNNs as Consensus in Opinion Dynamics0
Understanding Pose and Appearance Disentanglement in 3D Human Pose Estimation0
A^3D: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks0
Search Space of Adversarial Perturbations against Image Filters0
Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks0
Second-Order Adversarial Attack and Certifiable Robustness0
A Brief Survey on Deep Learning Based Data Hiding0
Second-Order NLP Adversarial Examples0
Second Order State Hallucinations for Adversarial Attack Mitigation in Formation Control of Multi-Agent Systems0
Secure Diagnostics: Adversarial Robustness Meets Clinical Interpretability0
Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples0
Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks0
Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion0
AVTrustBench: Assessing and Enhancing Reliability and Robustness in Audio-Visual LLMs0
A White-Box Adversarial Attack Against a Digital Twin0
Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack0
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Meme Stock Prediction0
Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers0
Automated Decision-based Adversarial Attacks0
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
AutoAdversary: A Pixel Pruning Method for Sparse Adversarial Attack0
Augmented Adversarial Trigger Learning0
Bandlimiting Neural Networks Against Adversarial Attacks0
Show:102550
← PrevPage 59 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified