SOTAVerified

Adversarial Purification

A class of adversarial defense methods that remove adversarial perturbations using a generative model.

Papers

Showing 2650 of 65 papers

TitleStatusHype
Instant Adversarial Purification with Adversarial Consistency Distillation0
Adversarial Purification by Consistency-aware Latent Space Optimization on Data Manifolds0
Large Language Model Sentinel: LLM Agent for Adversarial Purification0
Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models0
LoRID: Low-Rank Iterative Diffusion for Adversarial Purification0
MimicDiffusion: Purifying Adversarial Perturbation via Mimicking Clean Diffusion Model0
Model-Free Adversarial Purification via Coarse-To-Fine Tensor Network Representation0
MsMemoryGAN: A Multi-scale Memory GAN for Palm-vein Adversarial Purification0
Online Adversarial Purification based on Self-supervised Learning0
Online Adversarial Purification based on Self-Supervision0
Adversarial purification for no-reference image-quality metrics: applicability study and new methods0
Adversarial Purification with the Manifold Hypothesis0
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks0
Rapid Plug-in Defenders0
Purify++: Improving Diffusion-Purification with Advanced Diffusion Models and Control of Randomness0
Adversarial Purification through Representation Disentanglement0
Text Adversarial Purification as Defense against Adversarial Attacks0
Robust Diffusion Models for Adversarial Purification0
Towards Adversarial Purification using Denoising AutoEncoders0
Towards Understanding the Robustness of Diffusion-Based Purification: A Stochastic Perspective0
Towards more transferable adversarial attack in black-box manner0
Adversarial Text Purification: A Large Language Model Approach for Defense0
ADBM: Adversarial diffusion bridge model for reliable adversarial purification0
Classifier Guidance Enhances Diffusion-based Adversarial Purification by Preserving Predictive Information0
Defending Against Frequency-Based Attacks with Diffusion Models0
Show:102550
← PrevPage 2 of 3Next →

No leaderboard results yet.