Vulnerability of Adversarial Examples

Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack

Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27
RAG
Poisoning attack on RAG
Vulnerability of Adversarial Examples

Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent

Authors: Philip Doldo, Derek Everett, Amol Khanna, Andre T Nguyen, Edward Raff | Published: 2025-03-25
Vulnerability of Adversarial Examples
Adversarial Learning
Robustness of Deep Networks

BounTCHA: A CAPTCHA Utilizing Boundary Identification in Guided Generative AI-extended Videos

Authors: Lehao Lin, Ke Wang, Maha Abdallah, Wei Cai | Published: 2025-01-30 | Updated: 2025-04-01
CAPTCHA
Video Reliability Assurance
Vulnerability of Adversarial Examples

CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers

Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31
LLM Security
Backdoor Attack
Vulnerability of Adversarial Examples

LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples

Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04
Hallucination
Vulnerability of Adversarial Examples
Adversarial Learning

Hack The Box: Fooling Deep Learning Abstraction-Based Monitors

Authors: Sara Hajj Ibrahim, Mohamed Nassar | Published: 2021-07-10 | Updated: 2021-07-18
Attack Scenario Analysis
Adversarial Example
Vulnerability of Adversarial Examples

Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05
Medical Image Analysis
Vulnerability of Adversarial Examples
Adversarial attack

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04
Hardware Security
Vulnerability of Adversarial Examples
Vulnerability Analysis

Who’s Afraid of Adversarial Transferability?

Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06
Adversarial Example
Vulnerability of Adversarial Examples
Vulnerability Analysis

Adversarial Attacks and Defenses for Speech Recognition Systems

Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31
Vulnerability of Adversarial Examples
Literature List
Defense Mechanism