SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 351400 of 1808 papers

TitleStatusHype
Uncertainty-Aware SAR ATR: Defending Against Adversarial Attacks via Bayesian Neural Networks0
Deep Learning for Robust and Explainable Models in Computer Vision0
CosalPure: Learning Concept from Group Images for Robust Co-Saliency Detection0
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous DrivingCode2
LinkPrompt: Natural and Universal Adversarial Attacks on Prompt-based Language ModelsCode0
Diffusion Attack: Leveraging Stable Diffusion for Naturalistic Image Attacking0
DD-RobustBench: An Adversarial Robustness Benchmark for Dataset DistillationCode0
FMM-Attack: A Flow-based Multi-modal Adversarial Attack on Video-based LLMsCode0
Capsule Neural Networks as Noise Stabilizer for Time Series Data0
As Firm As Their Foundations: Can open-sourced foundation models be used to create adversarial examples for downstream tasks?0
SSCAE -- Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator0
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model0
Robust Overfitting Does Matter: Test-Time Adversarial Purification With FGSMCode0
A Modified Word Saliency-Based Adversarial Attack on Text Classification Models0
Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks0
Fast Inference of Removal-Based Node InfluenceCode0
Attack Deterministic Conditional Image Generative Models for Diverse and Controllable Generation0
epsilon-Mesh Attack: A Surface-based Adversarial Point Cloud Attack for Facial Expression RecognitionCode1
IOI: Invisible One-Iteration Adversarial Attack on No-Reference Image- and Video-Quality MetricsCode0
Hard-label based Small Query Black-box Adversarial AttackCode0
Prepared for the Worst: A Learning-Based Adversarial Attack for Resilience Analysis of the ICP Algorithm0
Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point CloudsCode1
Adversarial Infrared Geometry: Using Geometry to Perform Adversarial Attack against Infrared Pedestrian Detectors0
One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language ModelsCode2
SAR-AE-SFP: SAR Imagery Adversarial Example in Real Physics domain with Target Scattering Feature Parameters0
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey0
Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification0
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks0
Conformal Shield: A Novel Adversarial Attack Detection Framework for Automatic Modulation Classification0
Extreme Miscalibration and the Illusion of Adversarial Robustness0
Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing0
RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage GenerationCode1
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper0
Fast Adversarial Attacks on Language Models In One GPU MinuteCode2
Noise-BERT: A Unified Perturbation-Robust Framework with Noise Alignment Pre-training for Noisy Slot Filling Task0
Beyond Worst-case Attacks: Robust RL with Adaptive Defense via Non-dominated PoliciesCode0
An Adversarial Approach to Evaluating the Robustness of Event Identification Models0
AICAttack: Adversarial Image Captioning Attack with Attention-Based OptimizationCode0
Only My Model On My Data: A Privacy Preserving Approach Protecting one Model and Deceiving Unauthorized Black-Box Models0
Accuracy of TextFooler black box adversarial attacks on 01 loss sign activation neural network ensembleCode0
Corruption Robust Offline Reinforcement Learning with Human Feedback0
TETRIS: Towards Exploring the Robustness of Interactive Segmentation0
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution0
PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks0
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision TransformersCode0
Analyzing Sentiment Polarity Reduction in News Presentation through Contextual Perturbation and Large Language Models0
HQA-Attack: Toward High Quality Black-Box Hard-Label Adversarial Attack on TextCode0
On the Multi-modal Vulnerability of Diffusion ModelsCode1
SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign DecodingCode0
STAA-Net: A Sparse and Transferable Adversarial Attack for Speech Emotion Recognition0
Show:102550
← PrevPage 8 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified