Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14 Privacy Protection MethodPoisoningWatermark Evaluation 2024.01.14 2025.05.27 Literature Database
Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran | Published: 2024-01-10 Byzantine ResiliencePoisoningFederated Learning 2024.01.10 2025.05.27 Literature Database
AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08 WatermarkingPoisoningFederated Learning 2023.12.29 2025.05.27 Literature Database
Attack Tree Analysis for Adversarial Evasion Attacks Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28 PoisoningAdversarial attackWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28 PoisoningMachine UnlearningWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Defenses in Adversarial Machine Learning: A Survey Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13 PoisoningAdversarial ExampleDefense Method 2023.12.13 2025.05.27 Literature Database
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11 PoisoningRobustness EvaluationAdversarial attack 2023.12.11 2025.05.28 Literature Database
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs Authors: Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek | Published: 2023-12-06 | Updated: 2024-10-07 Character Role ActingPrompt InjectionPoisoning 2023.12.06 2025.05.28 Literature Database
Rethinking PGD Attack: Is Sign Function Necessary? Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21 PoisoningRobustness EvaluationAdversarial attack 2023.12.03 2025.05.28 Literature Database
The Philosopher’s Stone: Trojaning Plugins of Large Language Models Authors: Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu | Published: 2023-12-01 | Updated: 2024-09-11 Prompt InjectionPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database