Adversarial Learning

On Reconstructing Training Data From Bayesian Posteriors and Trained Models

Authors: George Wynne | Published: 2025-07-24
Reconstruction Attack
Adversarial Learning
Watermark Evaluation

Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework

Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12
Certified Robustness
Adversarial Learning
Adversarial Attack Detection

On the Stability of Graph Convolutional Neural Networks: A Probabilistic Perspective

Authors: Ning Zhang, Henry Kenlay, Li Zhang, Mihai Cucuringu, Xiaowen Dong | Published: 2025-06-01 | Updated: 2025-06-03
Dynamic Graph Processing
Adversarial Learning
Optimization Problem

Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization

Authors: Chengcan Wu, Zhixin Zhang, Zeming Wei, Yihao Zhang, Meng Sun | Published: 2025-05-22
LLM Security
Alignment
Adversarial Learning

SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models

Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22
Adversarial Learning
Computational Complexity
Defense Mechanism

Adversarially Pretrained Transformers may be Universally Robust In-Context Learners

Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki | Published: 2025-05-20
Certified Robustness
Relationship between Robustness and Privacy
Adversarial Learning

FlowPure: Continuous Normalizing Flows for Adversarial Purification

Authors: Elias Collaert, Abel Rodríguez, Sander Joos, Lieven Desmet, Vera Rimmer | Published: 2025-05-19
Robustness Improvement Method
Adversarial Learning
Effectiveness Analysis of Defense Methods

Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems

Authors: Mostafa Jafari, Alireza Shameli-Sendi | Published: 2025-05-14
Robustness Analysis
Attack Detection Method
Adversarial Learning

BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models

Authors: Zihan Wang, Hongwei Li, Rui Zhang, Wenbo Jiang, Kangjie Chen, Tianwei Zhang, Qingchuan Zhao, Guowen Xu | Published: 2025-05-06
Poisoning attack on RAG
Backdoor Attack Mitigation
Adversarial Learning

Bayesian Robust Aggregation for Federated Learning

Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05
Group-Based Robustness
Trigger Detection
Adversarial Learning