Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15 Backdoor AttackPrivacy Protection MethodStrategic Game 2024.03.15 2025.05.27 Literature Database
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19 CybersecurityProactive DefenseStrategic Game 2024.03.14 2025.05.27 Literature Database
Game of Trojans: A Submodular Byzantine Approach Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13 Algorithm DesignModel Performance EvaluationStrategic Game 2022.07.13 2025.05.28 Literature Database
Adversarial Source Identification Game with Corrupted Training Authors: Mauro Barni, Benedetta Tondi | Published: 2017-03-27 Security AnalysisStrategic GameAttack Pattern Extraction 2017.03.27 2025.05.28 Literature Database