Red-Teaming Text-to-Image Systems by Rule-based Preference Modeling Authors: Yichuan Cao, Yibo Miao, Xiao-Shan Gao, Yinpeng Dong | Published: 2025-05-27 Model EvaluationExperimental ValidationAttack Evaluation 2025.05.27 2025.05.29 Literature Database
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 Backdoor AttackPoisoningExperimental Validation 2025.01.21 2025.05.27 Literature Database
GaussMark: A Practical Approach for Structural Watermarking of Language Models Authors: Adam Block, Ayush Sekhari, Alexander Rakhlin | Published: 2025-01-17 WatermarkingHypothesis TestingExperimental Validation 2025.01.17 2025.05.27 Literature Database
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers Authors: Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif | Published: 2025-01-17 Data Integrity ConstraintsExperimental ValidationAdversarial Example 2025.01.17 2025.05.27 Literature Database
Learning-based Detection of GPS Spoofing Attack for Quadrotors Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10 CybersecurityExperimental ValidationAttack Evaluation 2025.01.10 2025.05.27 Literature Database
Towards Robust and Accurate Stability Estimation of Local Surrogate Models in Text-based Explainable AI Authors: Christopher Burger, Charles Walter, Thai Le, Lingwei Chen | Published: 2025-01-03 Experimental Validation 2025.01.03 2025.05.27 Literature Database
Post-Hoc Robustness Enhancement in Graph Neural Networks with Conditional Random Fields Authors: Yassine Abbahaddou, Sofiane Ennadir, Johannes F. Lutzeyer, Fragkiskos D. Malliaros, Michalis Vazirgiannis | Published: 2024-11-08 Experimental Validation 2024.11.08 2025.05.27 Literature Database
An Intelligent Native Network Slicing Security Architecture Empowered by Federated Learning Authors: Rodrigo Moreira, Rodolfo S. Villaca, Moises R. N. Ribeiro, Joberto S. B. Martins, Joao Henrique Correa, Tereza C. Carvalho, Flavio de Oliveira Silva | Published: 2024-10-04 Network SlicingExperimental Validation 2024.10.04 2025.05.27 Literature Database
Encryption-Friendly LLM Architecture Authors: Donghwan Rho, Taeseong Kim, Minje Park, Jung Woo Kim, Hyunsik Chae, Jung Hee Cheon, Ernest K. Ryu | Published: 2024-10-03 AlgorithmExperimental Validation 2024.10.03 2025.05.27 Literature Database
A novel reliability attack of Physical Unclonable Functions Authors: Gaoxiang Li, Yu Zhuang | Published: 2024-05-21 | Updated: 2024-06-07 FPGAExperimental ValidationAttack Method 2024.05.21 2025.05.27 Literature Database