Low-Cost High-Power Membership Inference Attacks Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12 2023.12.06 2025.05.12 Literature Database
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06 2023.12.06 2025.05.12 Literature Database
Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15 2023.12.05 2025.05.12 Literature Database
When PETs misbehave: A Contextual Integrity analysis Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05 2023.12.05 2025.05.12 Literature Database
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05 2023.12.05 2025.05.12 Literature Database
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen | Published: 2023-12-04 2023.12.04 2025.05.12 Literature Database
Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 2023.12.04 2025.05.12 Literature Database
Tree of Attacks: Jailbreaking Black-Box LLMs Automatically Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31 2023.12.04 2025.05.12 Literature Database
Intrusion Detection System with Machine Learning and Multiple Datasets Authors: Haiyan Xuan, Mohith Manohar | Published: 2023-12-04 2023.12.04 2025.05.12 Literature Database
Rethinking PGD Attack: Is Sign Function Necessary? Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21 2023.12.03 2025.05.12 Literature Database