Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization Authors: Chengcan Wu, Zhixin Zhang, Zeming Wei, Yihao Zhang, Meng Sun | Published: 2025-05-22 LLM SecurityAlignmentAdversarial Learning 2025.05.22 2025.05.28 Literature Database
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22 Adversarial LearningComputational ComplexityDefense Mechanism 2025.05.22 2025.05.28 Literature Database
Adversarially Pretrained Transformers may be Universally Robust In-Context Learners Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki | Published: 2025-05-20 Certified RobustnessRelationship between Robustness and PrivacyAdversarial Learning 2025.05.20 2025.05.28 Literature Database
FlowPure: Continuous Normalizing Flows for Adversarial Purification Authors: Elias Collaert, Abel Rodríguez, Sander Joos, Lieven Desmet, Vera Rimmer | Published: 2025-05-19 Robustness Improvement MethodAdversarial LearningEffectiveness Analysis of Defense Methods 2025.05.19 2025.05.28 Literature Database
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems Authors: Mostafa Jafari, Alireza Shameli-Sendi | Published: 2025-05-14 Robustness AnalysisAttack Detection MethodAdversarial Learning 2025.05.14 2025.05.28 Literature Database
BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models Authors: Zihan Wang, Hongwei Li, Rui Zhang, Wenbo Jiang, Kangjie Chen, Tianwei Zhang, Qingchuan Zhao, Guowen Xu | Published: 2025-05-06 Poisoning attack on RAGBackdoor Attack MitigationAdversarial Learning 2025.05.06 2025.05.27 Literature Database
Bayesian Robust Aggregation for Federated Learning Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05 Group-Based RobustnessTrigger DetectionAdversarial Learning 2025.05.05 2025.05.27 Literature Database
How to Backdoor the Knowledge Distillation Authors: Chen Wu, Qian Ma, Prasenjit Mitra, Sencun Zhu | Published: 2025-04-30 Backdoor AttackAdversarial LearningVulnerabilities of Knowledge Distillation 2025.04.30 2025.05.27 Literature Database
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21 Adversarial LearningGenerative ModelWatermarking Technology 2025.04.21 2025.05.27 Literature Database
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent Authors: Philip Doldo, Derek Everett, Amol Khanna, Andre T Nguyen, Edward Raff | Published: 2025-03-25 Vulnerability of Adversarial ExamplesAdversarial LearningRobustness of Deep Networks 2025.03.25 2025.05.27 Literature Database