Imitative Membership Inference Attack Authors: Yuntao Du, Yuetian Chen, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-09-08 Experimental ValidationAttack MethodAdversarial Learning 2025.09.08 2025.09.10 Literature Database
Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27 Model Extraction AttackAdversarial LearningIntellectual Property Protection 2025.08.27 2025.08.29 Literature Database
Intrusion Detection in Heterogeneous Networks with Domain-Adaptive Multi-Modal Learning Authors: Mabin Umman Varghese, Zahra Taghiyarrenani | Published: 2025-08-05 データセットの多様性Adversarial LearningDeep Learning Model 2025.08.05 2025.08.07 Literature Database
On Reconstructing Training Data From Bayesian Posteriors and Trained Models Authors: George Wynne | Published: 2025-07-24 Reconstruction AttackAdversarial LearningWatermark Evaluation 2025.07.24 2025.07.26 Literature Database
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2025.06.12 2025.06.14 Literature Database
On the Stability of Graph Convolutional Neural Networks: A Probabilistic Perspective Authors: Ning Zhang, Henry Kenlay, Li Zhang, Mihai Cucuringu, Xiaowen Dong | Published: 2025-06-01 | Updated: 2025-06-03 Dynamic Graph ProcessingAdversarial LearningOptimization Problem 2025.06.01 2025.06.05 Literature Database
Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization Authors: Chengcan Wu, Zhixin Zhang, Zeming Wei, Yihao Zhang, Meng Sun | Published: 2025-05-22 LLM SecurityAlignmentAdversarial Learning 2025.05.22 2025.05.28 Literature Database
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22 Adversarial LearningComputational ComplexityDefense Mechanism 2025.05.22 2025.05.28 Literature Database
Adversarially Pretrained Transformers may be Universally Robust In-Context Learners Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki | Published: 2025-05-20 Certified RobustnessRelationship between Robustness and PrivacyAdversarial Learning 2025.05.20 2025.05.28 Literature Database
FlowPure: Continuous Normalizing Flows for Adversarial Purification Authors: Elias Collaert, Abel Rodríguez, Sander Joos, Lieven Desmet, Vera Rimmer | Published: 2025-05-19 Robustness Improvement MethodAdversarial LearningEffectiveness Analysis of Defense Methods 2025.05.19 2025.05.28 Literature Database