SOTAVerified

Adversarial Defense

Competitions with currently unpublished results:

Papers

Showing 201250 of 403 papers

TitleStatusHype
MimicGAN: Corruption-Mimicking for Blind Image Recovery & Adversarial Defense0
MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking0
MirrorCheck: Efficient Adversarial Defense for Vision-Language Models0
Modeling Adversarial Noise for Adversarial Defense0
Multi-head Uncertainty Inference for Adversarial Attack Detection0
On the Susceptibility and Robustness of Time Series Models through Adversarial Attack and Defense0
Bridging Optimal Transport and Jacobian Regularization by Optimal Trajectory for Enhanced Adversarial Defense0
Perceptual Adversarial Robustness: Generalizable Defenses Against Unforeseen Threat Models0
Perseus: Leveraging Common Data Patterns with Curriculum Learning for More Robust Graph Neural Networks0
Physically Realizable Adversarial Examples for LiDAR Object Detection0
Pixel Redrawn For A Robust Adversarial Defense0
Privacy-preserving Universal Adversarial Defense for Black-box Models0
Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored Images0
PuVAE: A Variational Autoencoder to Purify Adversarial Examples0
RAILS: A Robust Adversarial Immune-inspired Learning System0
The Best Defense is Attack: Repairing Semantics in Textual Adversarial Examples0
Rebuild and Ensemble: Exploring Defense Against Text Adversaries0
Text Adversarial Purification as Defense against Adversarial Attacks0
Releasing Inequality Phenomena in L_-Adversarial Training via Input Gradient Distillation0
Revisiting and Advancing Adversarial Training Through A Simple Baseline0
Rethinking Invariance Regularization in Adversarial Training to Improve Robustness-Accuracy Trade-off0
Rethinking Textual Adversarial Defense for Pre-trained Language Models0
Revisiting Role of Autoencoders in Adversarial Settings0
Robust Adversarial Defense by Tensor Factorization0
Robust Android Malware Detection System against Adversarial Attacks using Q-Learning0
Robust Boosting Forests with Richer Deep Feature Hierarchy0
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks0
Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks0
RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks0
SAD: Saliency Adversarial Defense without Adversarial Training0
Scale-Invariant Adversarial Attack for Evaluating and Enhancing Adversarial Defenses0
A^3D: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks0
Secure Video Quality Assessment Resisting Adversarial Attacks0
Self-Gradient Networks0
NCIS: Neural Contextual Iterative Smoothing for Purifying Adversarial Perturbations0
ShieldLearner: A New Paradigm for Jailbreak Attack Defense in LLMs0
Simple and Effective Stochastic Neural Networks0
Stochastic-Shield: A Probabilistic Approach Towards Training-Free Adversarial Defense in Quantized CNNs0
Struggle with Adversarial Defense? Try Diffusion0
Subspace Defense: Discarding Adversarial Perturbations by Learning a Subspace for Clean Signals0
Sustainable Self-evolution Adversarial Training0
Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuning0
Target Training: Tricking Adversarial Attacks to Fail0
TART: Boosting Clean Accuracy Through Tangent Direction Guided Adversarial Training0
Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost0
The Good, the Bad and the Ugly: Watermarks, Transferable Attacks and Adversarial Defenses0
The Vulnerability of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing0
Towards Achieving Adversarial Robustness Beyond Perceptual Limits0
Towards a constructive framework for control theory0
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids0
Show:102550
← PrevPage 5 of 9Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1WRN-28-10Accuracy90.03Unverified
2Diffusion ClassifierAccuracy89.85Unverified
3Stochastic-LWTA/PGD/WideResNet-34-10Accuracy84.3Unverified
4Ours (Stochastic-LWTA/PGD/WideResNet-34-5)Accuracy83.4Unverified
5Ours (Stochastic-LWTA/PGD/WideResNet-34-1)Accuracy81.87Unverified
6ResNet18 (TRADES-ANCRA/PGD-40)Accuracy81.7Unverified
7Stochastic-LWTA/PGD/WideResNet-34-5Attack: AutoAttack81.22Unverified
8PCL (against PGD, white box)Accuracy46.7Unverified
#ModelMetricClaimedVerifiedStatus
1SAT-EfficientNet-L1Accuracy58.6Unverified
2LLR-ResNet-152Accuracy47Unverified
3ResNet-152 free-m=4Accuracy36Unverified
4ResNet-101 free-m=4Accuracy34.3Unverified
5ResNet-50 free-m=4Accuracy31.8Unverified
#ModelMetricClaimedVerifiedStatus
1ResNet101Accuracy99.8Unverified
2InceptionV3Accuracy98.6Unverified
3Feature DenoisingAccuracy49.5Unverified
#ModelMetricClaimedVerifiedStatus
1ResNet-152 DenoiseAccuracy42.8Unverified
2ResNeXt-101 DenoiseAllAccuracy40.4Unverified
3ResNet-152Accuracy39Unverified
#ModelMetricClaimedVerifiedStatus
1Defense GANAccuracy0.85Unverified
2PuVAEAccuracy0.81Unverified
#ModelMetricClaimedVerifiedStatus
1Feature DenoisingAccuracy50.6Unverified
#ModelMetricClaimedVerifiedStatus
1Auto Encoder-Block Switching defense with GradCAMAccuracy 88.54Unverified