SOTAVerified

Adversarial Defense

Competitions with currently unpublished results:

Papers

Showing 150 of 403 papers

TitleStatusHype
Bridging Robustness and Generalization Against Word Substitution Attacks in NLP via the Growth Bound Matrix ApproachCode0
Active Adversarial Noise Suppression for Image Forgery Localization0
Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuning0
Towards Effective and Efficient Adversarial Defense with Diffusion Models for Robust Visual TrackingCode0
Are classical deep neural networks weakly adversarially robust?0
Adversarially Robust AI-Generated Image Detection for Free: An Information Theoretic Perspective0
A Framework for Adversarial Analysis of Decision Support Systems Prior to Deployment0
EdgeAgentX: A Novel Framework for Agentic AI at the Edge in Military Communication Networks0
Accidental Misalignment: Fine-Tuning Language Models Induces Unexpected VulnerabilityCode0
A Few Large Shifts: Layer-Inconsistency Based Minimal Overhead Adversarial Example DetectionCode0
GenoArmory: A Unified Evaluation Framework for Adversarial Attacks on Genomic Foundation ModelsCode1
Lightweight Defense Against Adversarial Attacks in Time Series ClassificationCode0
Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models0
A Knowledge-guided Adversarial Defense for Resisting Malicious Visual Manipulation0
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization0
Leveraging Generalizability of Image-to-Image Translation for Enhanced Adversarial Defense0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
One Stone, Two Birds: Enhancing Adversarial Defense Through the Lens of Distributional DiscrepancyCode0
Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features0
ShieldLearner: A New Paradigm for Jailbreak Attack Defense in LLMs0
How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies0
Adversarial Masked Autoencoder Purifier with Defense Transferability0
VideoPure: Diffusion-based Adversarial Purification for Video RecognitionCode0
Gradient-Free Adversarial Purification with Diffusion Models0
Double Visual Defense: Adversarial Pre-training and Instruction Tuning for Improving Vision-Language Model Robustness0
Towards a constructive framework for control theory0
Sample Correlation for Fingerprinting Deep Face RecognitionCode0
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images0
Defensive Dual Masking for Robust Adversarial Defense0
A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles0
Adversarial Transferability in Deep Denoising Models: Theoretical Insights and Robustness Enhancement via Out-of-Distribution Typical Set Sampling0
Sustainable Self-evolution Adversarial Training0
Neural Fingerprints for Adversarial Attack DetectionCode0
Alignment-Based Adversarial Training (ABAT) for Improving the Robustness and Accuracy of EEG-Based BCIsCode0
CausalDiff: Causality-Inspired Disentanglement via Diffusion Model for Adversarial DefenseCode1
Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost0
Unitary Multi-Margin BERT for Robust Natural Language ProcessingCode0
Perseus: Leveraging Common Data Patterns with Curriculum Learning for More Robust Graph Neural Networks0
The Good, the Bad and the Ugly: Watermarks, Transferable Attacks and Adversarial Defenses0
Secure Video Quality Assessment Resisting Adversarial Attacks0
Interpretability-Guided Test-Time Adversarial DefenseCode0
Cloud Adversarial Example Generation for Remote Sensing Image Classification0
Real-world Adversarial Defense against Patch Attacks based on Diffusion ModelCode1
Bypassing DARCY Defense: Indistinguishable Universal Adversarial Triggers0
Certified Causal Defense with Generalizable Robustness0
TART: Boosting Clean Accuracy Through Tangent Direction Guided Adversarial Training0
Improving Out-of-Distribution Data Handling and Corruption Resistance via Modern Hopfield NetworksCode0
Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks0
Privacy-preserving Universal Adversarial Defense for Black-box Models0
OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack0
Show:102550
← PrevPage 1 of 9Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1WRN-28-10Accuracy90.03Unverified
2Diffusion ClassifierAccuracy89.85Unverified
3Stochastic-LWTA/PGD/WideResNet-34-10Accuracy84.3Unverified
4Ours (Stochastic-LWTA/PGD/WideResNet-34-5)Accuracy83.4Unverified
5Ours (Stochastic-LWTA/PGD/WideResNet-34-1)Accuracy81.87Unverified
6ResNet18 (TRADES-ANCRA/PGD-40)Accuracy81.7Unverified
7Stochastic-LWTA/PGD/WideResNet-34-5Attack: AutoAttack81.22Unverified
8PCL (against PGD, white box)Accuracy46.7Unverified
#ModelMetricClaimedVerifiedStatus
1SAT-EfficientNet-L1Accuracy58.6Unverified
2LLR-ResNet-152Accuracy47Unverified
3ResNet-152 free-m=4Accuracy36Unverified
4ResNet-101 free-m=4Accuracy34.3Unverified
5ResNet-50 free-m=4Accuracy31.8Unverified
#ModelMetricClaimedVerifiedStatus
1ResNet101Accuracy99.8Unverified
2InceptionV3Accuracy98.6Unverified
3Feature DenoisingAccuracy49.5Unverified
#ModelMetricClaimedVerifiedStatus
1ResNet-152 DenoiseAccuracy42.8Unverified
2ResNeXt-101 DenoiseAllAccuracy40.4Unverified
3ResNet-152Accuracy39Unverified
#ModelMetricClaimedVerifiedStatus
1Defense GANAccuracy0.85Unverified
2PuVAEAccuracy0.81Unverified
#ModelMetricClaimedVerifiedStatus
1Feature DenoisingAccuracy50.6Unverified
#ModelMetricClaimedVerifiedStatus
1Auto Encoder-Block Switching defense with GradCAMAccuracy 88.54Unverified