SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 151175 of 1808 papers

TitleStatusHype
SurvAttack: Black-Box Attack On Survival Models through Ontology-Informed EHR Perturbation0
Retention Score: Quantifying Jailbreak Risks for Vision Language Models0
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models0
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters0
PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation0
Adversarial Attack Against Images Classification based on Generative Adversarial Networks0
Adversarial Robustness through Dynamic Ensemble Learning0
Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation0
Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera SystemsCode1
Adversarially robust generalization theory via Jacobian regularization for deep neural networks0
Human-in-the-Loop Generation of Adversarial Texts: A Case Study on Tibetan ScriptCode1
Unpacking the Resilience of SNLI Contradiction Examples to AttacksCode0
RAT: Adversarial Attacks on Deep Reinforcement Agents for Targeted Behaviors0
A2RNet: Adversarial Attack Resilient Network for Robust Infrared and Visible Image FusionCode1
Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language ModelsCode1
Adversarial Vulnerabilities in Large Language Models for Time Series ForecastingCode1
A Generative Victim Model for Segmentation0
AHSG: Adversarial Attack on High-level Semantics in Graph Neural Networks0
Take Fake as Real: Realistic-like Robust Black-box Adversarial Attack to Evade AIGC Detection0
From Flexibility to Manipulation: The Slippery Slope of XAI EvaluationCode0
Does Safety Training of LLMs Generalize to Semantically Related Natural Prompts?0
Less is More: A Stealthy and Efficient Adversarial Attack Method for DRL-based Autonomous Driving Policies0
Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks0
Pay Attention to the Robustness of Chinese Minority Language Models! Syllable-level Textual Adversarial Attack on Tibetan ScriptCode0
Multi-Granularity Tibetan Textual Adversarial Attack Method Based on Masked Language ModelCode0
Show:102550
← PrevPage 7 of 73Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified