Adversarially Pretrained Transformers may be Universally Robust In-Context Learners Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki | Published: 2025-05-20 Certified RobustnessRelationship between Robustness and PrivacyAdversarial Learning 2025.05.20 2025.05.28 Literature Database
Quantum Support Vector Regression for Robust Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Sebastian Issel, Pascal Debus | Published: 2025-05-02 | Updated: 2025-05-13 Certified RobustnessAnomaly Detection MethodRole of Quantum Machine Learning 2025.05.02 2025.05.28 Literature Database
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations Authors: Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, David Mohaisen | Published: 2025-04-24 Detection Rate of Phishing AttacksCertified RobustnessAdversarial Example Detection 2025.04.24 2025.05.27 Literature Database
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03 Privacy ProtectionCertified RobustnessModel Performance Evaluation 2025.03.01 2025.05.27 Literature Database
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks Authors: Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou | Published: 2024-06-18 | Updated: 2025-04-14 Certified RobustnessReconstruction AttackAdversarial Attack Detection 2024.06.18 2025.05.27 Literature Database
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts Authors: Shoupeng Ren, Lipeng He, Tianyu Tu, Di Wu, Jian Liu, Kui Ren, Chun Chen | Published: 2024-01-14 | Updated: 2025-04-02 Smart ContractCertified RobustnessModel Performance Evaluation 2024.01.14 2025.05.27 Literature Database
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03 Certified RobustnessDetection of Model Extraction AttacksAttack Evaluation 2019.06.26 2025.05.28 Literature Database
On the Vulnerability of CNN Classifiers in EEG-Based BCIs Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2019.03.31 2025.05.28 Literature Database
Bridging Adversarial Robustness and Gradient Interpretability Authors: Beomsu Kim, Junghoon Seo, Taegyun Jeon | Published: 2019-03-27 | Updated: 2019-04-19 Certified RobustnessAdversarial LearningInterpretability 2019.03.27 2025.05.28 Literature Database
A geometry-inspired decision-based attack Authors: Yujia Liu, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard | Published: 2019-03-26 Certified RobustnessEffective Perturbation MethodsAdversarial Attack Detection 2019.03.26 2025.05.28 Literature Database