SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 351400 of 1808 papers

TitleStatusHype
Tropical Attention: Neural Algorithmic Reasoning for Combinatorial Algorithms0
Experimental robustness benchmark of quantum neural network on a superconducting quantum processor0
Chain-of-Thought Poisoning Attacks against R1-based Retrieval-Augmented Generation Systems0
Beyond Classification: Evaluating Diffusion Denoised Smoothing for Security-Utility Trade off0
Adverseness vs. Equilibrium: Exploring Graph Adversarial Resilience through Dynamic Equilibrium0
EVALOOP: Assessing LLM Robustness in Programming from a Self-consistency Perspective0
FABLE: A Localized, Targeted Adversarial Attack on Weather Forecasting Models0
Adversarial Attack on Large Language Models using Exponentiated Gradient DescentCode0
Evaluating the Robustness of Adversarial Defenses in Malware Detection SystemsCode0
Towards Adaptive Meta-Gradient Adversarial Examples for Visual TrackingCode0
No Query, No Access0
Input-Specific and Universal Adversarial Attack Generation for Spiking Neural Networks in the Spiking Domain0
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey0
Data-Driven Falsification of Cyber-Physical SystemsCode0
Adversarial Robustness Analysis of Vision-Language Models in Medical Image SegmentationCode0
Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp0
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability0
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks0
AGATE: Stealthy Black-box Watermarking for Multimodal Model Copyright Protection0
Forging and Removing Latent-Noise Diffusion Watermarks Using a Single ImageCode0
Seeking Flat Minima over Diverse Surrogates for Improved Adversarial Transferability: A Theoretical Framework and Algorithmic Instantiation0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
Adversarial Attack for RGB-Event based Visual Object TrackingCode0
Q-FAKER: Query-free Hard Black-box Attack via Controlled Generation0
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign ClassificationCode0
Towards Safe Synthetic Image Generation On the Web: A Multimodal Robust NSFW Defense and Million Scale DatasetCode0
SemDiff: Generating Natural Unrestricted Adversarial Examples via Semantic Attributes Optimization in Diffusion Models0
Bregman Linearized Augmented Lagrangian Method for Nonconvex Constrained Stochastic Zeroth-order Optimization0
Toward Spiking Neural Network Local Learning Modules Resistant to Adversarial Attacks0
Towards Calibration Enhanced Network by Inverse Adversarial Attack0
Secure Diagnostics: Adversarial Robustness Meets Clinical Interpretability0
Moving Target Defense Against Adversarial False Data Injection Attacks In Power Grids0
Overlap-Aware Feature Learning for Robust Unsupervised Domain Adaptation for 3D Semantic Segmentation0
Unleashing the Power of Pre-trained Encoders for Universal Adversarial Attack Detection0
TenAd: A Tensor-based Low-rank Black Box Adversarial Attack for Video Classification0
Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios0
Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks0
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
ImF: Implicit Fingerprint for Large Language Models0
Bitstream Collisions in Neural Image Compression via Adversarial PerturbationsCode0
Make the Most of Everything: Further Considerations on Disrupting Diffusion-based Customization0
Augmented Adversarial Trigger Learning0
ReLATE: Resilient Learner Selection for Multivariate Time-Series Classification Against Adversarial Attacks0
Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution0
Towards Effective and Sparse Adversarial Attack on Spiking Neural Networks via Breaking Invisible Surrogate GradientsCode0
QFAL: Quantum Federated Adversarial Learning0
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal0
Snowball Adversarial Attack on Traffic Sign Classification0
Prompt-driven Transferable Adversarial Attack on Person Re-Identification with Attribute-aware Textual Inversion0
Show:102550
← PrevPage 8 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified