Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06 Attack TypeAdversarial ExampleMachine Learning Technology 2025.05.06 2025.05.27 Literature Database
Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07 Prompt leakingInformation SecurityAdversarial Example 2025.04.07 2025.05.27 Literature Database
Adv-CPG: A Customized Portrait Generation Framework with Facial Adversarial Attacks Authors: Junying Wang, Hongyuan Zhang, Yuan Yuan | Published: 2025-03-11 Privacy ProtectionAdversarial ExampleFace Recognition System 2025.03.11 2025.05.27 Literature Database
Adversarial Robustness in Two-Stage Learning-to-Defer: Algorithms and Guarantees Authors: Yannis Montreuil, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-02-03 Learning-to-DeferAdversarial ExampleAdversarial Training 2025.02.03 2025.05.27 Literature Database
Differentiable Adversarial Attacks for Marked Temporal Point Processes Authors: Pritish Chakraborty, Vinayak Gupta, Rahul R, Srikanta J. Bedathur, Abir De | Published: 2025-01-17 Adversarial ExampleOptimization Problem 2025.01.17 2025.05.27 Literature Database
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers Authors: Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif | Published: 2025-01-17 Data Integrity ConstraintsExperimental ValidationAdversarial Example 2025.01.17 2025.05.27 Literature Database
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10 Attack EvaluationAttack MethodAdversarial Example 2025.01.02 2025.05.27 Literature Database
Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness Authors: Olukorede Fakorede, Modeste Atsague, Jin Tian | Published: 2024-12-27 Adversarial ExampleAdversarial Training 2024.12.27 2025.05.27 Literature Database
Adversarially robust generalization theory via Jacobian regularization for deep neural networks Authors: Dongya Wu, Xin Li | Published: 2024-12-17 PoisoningAdversarial Example 2024.12.17 2025.05.27 Literature Database
CausAdv: A Causal-based Framework for Detecting Adversarial Examples Authors: Hichem Debbi | Published: 2024-10-29 FrameworkAdversarial Example 2024.10.29 2025.05.27 Literature Database