Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13 Graph Neural NetworkFingerprinting MethodRobustness Evaluation 2023.12.13 2025.05.28 Literature Database
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11 PoisoningRobustness EvaluationAdversarial attack 2023.12.11 2025.05.28 Literature Database
Data-Free Hard-Label Robustness Stealing Attack Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12 WatermarkingRobustness EvaluationWatermark Evaluation 2023.12.10 2025.05.28 Literature Database
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06 Robustness EvaluationIntrusion Detection SystemAdversarial attack 2023.12.06 2025.05.28 Literature Database
Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15 Robustness EvaluationWatermark RobustnessWatermark Evaluation 2023.12.05 2025.05.28 Literature Database
Rethinking PGD Attack: Is Sign Function Necessary? Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21 PoisoningRobustness EvaluationAdversarial attack 2023.12.03 2025.05.28 Literature Database
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30 WatermarkingRobustness EvaluationAdversarial attack 2023.11.30 2025.05.28 Literature Database
A Robust Semantics-based Watermark for Large Language Model against Paraphrasing Authors: Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang | Published: 2023-11-15 | Updated: 2024-04-01 Prompt InjectionRobustness EvaluationInformation Hiding Techniques 2023.11.15 2025.05.28 Literature Database
Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game Authors: Sam Toyer, Olivia Watkins, Ethan Adrian Mendes, Justin Svegliato, Luke Bailey, Tiffany Wang, Isaac Ong, Karim Elmaaroufi, Pieter Abbeel, Trevor Darrell, Alan Ritter, Stuart Russell | Published: 2023-11-02 Prompt InjectionPrompt EngineeringRobustness Evaluation 2023.11.02 2025.05.28 Literature Database
Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01 Privacy TechniqueRobustness EvaluationComputational Efficiency 2023.10.30 2025.05.28 Literature Database