Skip to content

Researcher verdict

Recommended implementation path available

implementation baseline
Benchmark trust: thin evidence
Quality tier: researcher ready

This page has evidence-backed benchmark findings and a concrete implementation recommendation anchored on tianzheng4/Distributionally-Adversarial-Attack. Use it as an implementation baseline, then validate benchmark parity before adapting it.

Why this page is still worth reading

  • A concrete repository path exists via tianzheng4/Distributionally-Adversarial-Attack, so this page can act as a practical starting point.
  • Reproduction risks are surfaced explicitly, which helps decide whether the paper is worth immediate prototyping.

Benchmark trust

Some benchmark signal exists in the extracted evidence, but it is not structured strongly enough yet for a confident benchmark decision.

Use this page as

Start here when you need the most practical implementation path quickly.

Results & Benchmarks

Freshness tier: cold
Direct + Inferred Evidence

Some benchmark signal exists in the extracted evidence, but it is not structured strongly enough yet for a confident benchmark decision.

Recent work on adversarial attack has shown that Projected Gradient Descent (PGD) Adversary is a universal first-order adversary, and the classifier adversarially trained by PGD is robust against a wide range of first-order attacks.

Use This Implementation Because…

Confidence: high

tianzheng4/Distributionally-Adversarial-Attack is the strongest maintained implementation based on ranking signals. License is declared (NOASSERTION).

Open tianzheng4/Distributionally-Adversarial-Attack

Reproduction Risks

  • No CI workflows detected
  • Dependency manifest is missing

Hardware Notes

Expect multi-day setup/compute for meaningful reproduction based on current guidance.

Evidence disclosure

LLM evidence refs: paper.title, paper.abstract, researcherSummary.reproductionRisks, guidance.riskFlags, researcherSummary.benchmarkSnapshot, evidencePack.repoSources, summary.hasReliableImplementation

Evidence graph: 4 refs, 4 links.

Utility signals: depth 85/100, grounding 85/100, status high.

Implementation Comparison

Top 3 paths

Compare maintenance quality, reproducibility coverage, and evidence confidence before choosing a reproduction baseline.

Maintenance: Stale risk
Confidence: High
Reproducibility: Limited

Official implementation from Papers with Code · Repository link is mentioned in the paper metadata

Stars
53
Last push
May 30, 2025 (281d ago)

Risk flags

  • No CI pipeline detected
  • No tagged releases
  • No Docker setup
MadryLab/mnist_challenge
historical official
Maintenance: Stale
Confidence: High
Reproducibility: Limited

Official implementation from Papers with Code · Repository link is mentioned in the paper metadata

Stars
758
Last push
May 3, 2022 (1404d ago)

Risk flags

  • No push in 12+ months
  • No CI pipeline detected
  • No tagged releases
Maintenance: Stale
Confidence: High
Reproducibility: Limited

Official implementation from Papers with Code · Repository link is mentioned in the paper metadata

Stars
506
Last push
Aug 30, 2021 (1650d ago)

Risk flags

  • No push in 12+ months
  • No CI pipeline detected
  • No tagged releases

Paper summary

AI-generated

AI-generated summary grounded in paper metadata and artifact signals.

Recent work on adversarial attack has shown that Projected Gradient Descent (PGD) Adversary is a universal first-order adversary, and the classifier adversarially trained by PGD is robust against a wide range of first-order attacks. This page includes benchmark evidence for Stochastic optimization on MNIST. Reproduction guidance focuses on implementation viability and concrete risk controls.

Key contributions

  • Recent work on adversarial attack has shown that Projected Gradient Descent (PGD) Adversary is a universal first-order adversary, and the classifier adversarially trained by PGD is robust against a wide range.
  • Benchmark finding: Stochastic optimization on MNIST.

Implementation guidance

Use tianzheng4/Distributionally-Adversarial-Attack first because deterministic ranking and extracted evidence align on implementation viability. Start with the repo setup path, then validate benchmark reproduction before adaptation.

Reproducibility notes

  • No CI workflows detected
  • Dependency manifest is missing
  • Dependency manifest is missing.
  • No CI workflow signal detected.

Best implementation now

tianzheng4/Distributionally-Adversarial-Attack
Confidence: High
Reproducibility: Limited

AAAI 2019 oral presentation

Stars: 53
Forks: 12
Last push: May 30, 2025
License: NOASSERTION
Official implementation from Papers with Code
Repository link is mentioned in the paper metadata
Matched via arXiv identifier search
Strong overlap with paper title keywords
Community adoption signal (53 stars)
License ✓
CI –
Deps –
Docker –
  • Selected tianzheng4/Distributionally-Adversarial-Attack as the strongest maintained implementation for new work.
  • Repository activity is within the last 24 months.
  • Official repository is preserved separately as historical context.

Historical official implementation

Preserved for provenance. Not recommended as the default path for new builds.

MadryLab/mnist_challenge
Stars: 758
Last push: May 3, 2022

Reproduction path

Direct

Follow the direct implementation path

  1. 1

    Start with tianzheng4/Distributionally-Adversarial-Attack and validate setup instructions in README.

  2. 2

    Reproduce the baseline result with the provided defaults before modifying hyperparameters.

  3. 3

    Log exact dependency versions and runtime environment for reproducibility.

Framework baselines

Time to first repro: a few days
No CI workflows detected
Dependency manifest is missing

Additional implementations

Official

  • A challenge to explore adversarial robustness of neural networks on CIFAR10.

    Stars: 506
    Forks: 132
    Last push: Aug 30, 2021
    License: MIT

Community

No additional community repositories detected yet.

Hugging Face artifacts

No direct paper-linked artifacts were found. Showing strongest curated related artifacts for faster exploration.

Research context

Tasks

Adversarial robustness, Stochastic optimization

Methods

Stochastic optimization

Domains

None detected

Evaluation & Human Feedback Data

Open this paper in HFEPX to review benchmark signals, evaluation modes, and human-feedback protocol context.

Open in HFEPX

Explore Similar Papers

Jump to Paper2Code search queries derived from this paper's research context.

Need human evaluators for your AI research? Scale annotation with expert AI Trainers.