SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 251300 of 1808 papers

TitleStatusHype
Robust Active Learning (RoAL): Countering Dynamic Adversaries in Active Learning with Elastic Weight Consolidation0
Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack0
ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack0
Ensemble everything everywhere: Multi-scale aggregation for adversarial robustnessCode1
Improving Network Interpretability via Explanation Consistency Evaluation0
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis0
Guardians of Image Quality: Benchmarking Defenses Against Adversarial Attacks on Image Quality MetricsCode1
Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks0
OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack0
Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion0
Vulnerabilities in AI-generated Image Detection: The Challenge of Adversarial Attacks0
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability DetectionCode1
Physical Adversarial Attack on Monocular Depth Estimation via Shape-Varying Patches0
Compressed models are NOT miniature versions of large models0
Beyond Dropout: Robust Convolutional Neural Networks Based on Local Feature Masking0
PG-Attack: A Precision-Guided Adversarial Attack Framework Against Vision Foundation Models for Autonomous DrivingCode1
Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift0
Any Target Can be Offense: Adversarial Example Generation via Generalized Latent InfectionCode0
AEMIM: Adversarial Examples Meet Masked Image Modeling0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical AnalysisCode0
Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks0
Transferable 3D Adversarial Shape Completion using Diffusion ModelsCode0
SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images0
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition SystemsCode0
Adversarial Attacks and Defenses on Text-to-Image Diffusion Models: A SurveyCode2
DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques0
Rethinking Targeted Adversarial Attacks For Neural Machine TranslationCode0
Controlling Whisper: Universal Acoustic Adversarial Attacks to Control Speech Foundation ModelsCode1
Self-Supervised Representation Learning for Adversarial Attack Detection0
TrackPGD: Efficient Adversarial Attack using Object Binary Masks against Robust Transformer TrackersCode0
JailbreakHunter: A Visual Analytics Approach for Jailbreak Prompts Discovery from Large-Scale Human-LLM Conversational Datasets0
L_p-norm Distortion-Efficient Adversarial Attack0
Adversarial Magnification to Deceive Deepfake Detection through Super ResolutionCode1
EvolBA: Evolutionary Boundary Attack under Hard-label Black Box condition0
Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability0
Query-Efficient Hard-Label Black-Box Attack against Vision Transformers0
Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features0
Deceptive Diffusion: Generating Synthetic Adversarial Examples0
IDT: Dual-Task Adversarial Attacks for Privacy Protection0
On Discrete Prompt Optimization for Diffusion ModelsCode2
CuDA2: An approach for Incorporating Traitor Agents into Cooperative Multi-Agent Systems0
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification0
The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI0
GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning0
AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization0
Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation0
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor AttacksCode0
Imperceptible Face Forgery Attack via Adversarial Semantic MaskCode0
RWKU: Benchmarking Real-World Knowledge Unlearning for Large Language ModelsCode2
Show:102550
← PrevPage 6 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified