Attack Evaluation

Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs

Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10
Attack Evaluation
Attack Method
Adversarial Example

FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses

Authors: Isaac Baglin, Xiatian Zhu, Simon Hadfield | Published: 2024-11-05 | Updated: 2025-01-05
Poisoning
Attack Evaluation
Evaluation Method

F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents

Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14
Prompt Injection
Attack Evaluation
Attack Method

Study of Attacks on the HHL Quantum Algorithm

Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10
Cybersecurity
Attack Evaluation
Attack Method

Robustness Reprogramming for Representation Learning

Authors: Zhichao Hou, MohamadAli Torkamani, Hamid Krim, Xiaorui Liu | Published: 2024-10-06
Attack Evaluation
Defense Method

TA3: Testing Against Adversarial Attacks on Machine Learning Models

Authors: Yuanzhe Jin, Min Chen | Published: 2024-10-06
Attack Evaluation

Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis

Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04
Model Performance Evaluation
Attack Evaluation
Feature Interdependence

GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20
Model Performance Evaluation
Attack Evaluation
Attack Method

Manipulating hidden-Markov-model inferences by corrupting batch data

Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19
Quantification of Uncertainty
Attack Evaluation
Attack Method

On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection

Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15
Dataset Generation
Intrusion Detection System
Attack Evaluation