SOTAVerified

Adversarial Attack

An Adversarial Attack is a technique to find a perturbation that changes the prediction of a machine learning model. The perturbation can be very small and imperceptible to human eyes.

Source: Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks

Papers

Showing 401450 of 1808 papers

TitleStatusHype
Adversarial Attack on Sentiment Classification0
Constraint-Guided Prediction Refinement via Deterministic Diffusion Trajectories0
CosalPure: Learning Concept from Group Images for Robust Co-Saliency Detection0
Consistency-Sensitivity Guided Ensemble Black-Box Adversarial Attacks in Low-Dimensional Spaces0
Mitigating the Impact of Noisy Edges on Graph-Based Algorithms via Adversarial Robustness Evaluation0
Consistent Valid Physically-Realizable Adversarial Attack against Crowd-flow Prediction Models0
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing0
Adversarial Patch Attacks on Monocular Depth Estimation Networks0
Conformal Shield: A Novel Adversarial Attack Detection Framework for Automatic Modulation Classification0
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Meme Stock Prediction0
Adversarial optimization leads to over-optimistic security-constrained dispatch, but sampling can help0
Adaptive Perturbation for Adversarial Attack0
Bandlimiting Neural Networks Against Adversarial Attacks0
BankTweak: Adversarial Attack against Multi-Object Trackers by Manipulating Feature Banks0
A White-Box Adversarial Attack Against a Digital Twin0
AVTrustBench: Assessing and Enhancing Reliability and Robustness in Audio-Visual LLMs0
Adversarial Neon Beam: A Light-based Physical Attack to DNNs0
BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization0
Compressed models are NOT miniature versions of large models0
Benchmarking Adversarially Robust Quantum Machine Learning at Scale0
Benchmarking Adversarial Robustness0
Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks0
Adversarial Music: Real World Audio Adversary Against Wake-word Detection System0
ABIGX: A Unified Framework for eXplainable Fault Detection and Classification0
Benign Adversarial Attack: Tricking Models for Goodness0
Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion0
Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers0
Best Practices for Noise-Based Augmentation to Improve the Performance of Deployable Speech-Based Emotion Recognition Systems0
Adversarial Attack on Hierarchical Graph Pooling Neural Networks0
Adversarial Robustness for Deep Learning-based Wildfire Prediction Models0
Compressive Sensing Based Adaptive Defence Against Adversarial Images0
Constrained Adversarial Learning for Automated Software Testing: a literature review0
Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data0
A Differentiable Language Model Adversarial Attack on Text Classifiers0
Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives0
Adversarial Robustness in Deep Learning: Attacks on Fragile Neurons0
BiasAdv: Bias-Adversarial Augmentation for Model Debiasing0
Bias Field Poses a Threat to DNN-based X-Ray Recognition0
Automated Decision-based Adversarial Attacks0
Biologically inspired protection of deep networks from adversarial attacks0
AutoAugment Input Transformation for Highly Transferable Targeted Attacks0
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks0
AutoAdversary: A Pixel Pruning Method for Sparse Adversarial Attack0
Black-box Adversarial Attacks against Dense Retrieval Models: A Multi-view Contrastive Learning Method0
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information0
Black-Box Adversarial Attacks on Graph Neural Networks as An Influence Maximization Problem0
Adaptive Meta-learning-based Adversarial Training for Robust Automatic Modulation Classification0
Adversarial Attacks and Defences for Skin Cancer Classification0
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality0
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective0
Show:102550
← PrevPage 9 of 37Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Xu et al.Attack: PGD2078.68Unverified
23-ensemble of multi-resolution self-ensemblesAttack: AutoAttack78.13Unverified
3TRADES-ANCRA/ResNet18Attack: AutoAttack59.7Unverified
4AdvTraining [madry2018]Attack: PGD2048.44Unverified
5TRADES [zhang2019b]Attack: PGD2045.9Unverified
6XU-NetRobust Accuracy1Unverified
#ModelMetricClaimedVerifiedStatus
13-ensemble of multi-resolution self-ensemblesAttack: AutoAttack51.28Unverified
2multi-resolution self-ensemblesAttack: AutoAttack47.85Unverified