TAET: Two-Stage Adversarial Equalization Training on Long-Tailed Distributions Authors: Wang YuHang, Junkang Guo, Aolei Liu, Kaihao Wang, Zaitong Wu, Zhenyu Liu, Wenfei Yin, Jian Liu | Published: 2025-03-02 | Updated: 2025-03-21 RobustnessAdversarial LearningAdversarial Training 2025.03.02 2025.05.27 Literature Database
SATA: A Paradigm for LLM Jailbreak via Simple Assistive Task Linkage Authors: Xiaoning Dong, Wenbo Hu, Wei Xu, Tianxing He | Published: 2024-12-19 | Updated: 2025-03-21 Prompt InjectionLarge Language ModelAdversarial Learning 2024.12.19 2025.05.27 Literature Database
Protecting Confidentiality, Privacy and Integrity in Collaborative Learning Authors: Dong Chen, Alice Dethise, Istemi Ekin Akkus, Ivica Rimac, Klaus Satzke, Antti Koskela, Marco Canini, Wei Wang, Ruichuan Chen | Published: 2024-12-11 | Updated: 2025-04-17 Privacy protection frameworkDifferential PrivacyAdversarial Learning 2024.12.11 2025.05.27 Literature Database
On the Lack of Robustness of Binary Function Similarity Systems Authors: Gianluca Capozzi, Tong Tang, Jie Wan, Ziqi Yang, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Lorenzo Cavallaro, Leonardo Querzoni | Published: 2024-12-05 | Updated: 2025-05-22 バイナリ分析Adversarial LearningAdversarial Learning 2024.12.05 2025.05.28 Literature Database
Robust LLM safeguarding via refusal feature adversarial training Authors: Lei Yu, Virginie Do, Karen Hambardzumyan, Nicola Cancedda | Published: 2024-09-30 | Updated: 2025-03-20 Prompt InjectionModel RobustnessAdversarial Learning 2024.09.30 2025.05.27 Literature Database
Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli | Published: 2024-02-27 | Updated: 2025-05-29 Model DesignRobustness EvaluationAdversarial Learning 2024.02.27 2025.05.31 Literature Database
LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04 HallucinationVulnerability of Adversarial ExamplesAdversarial Learning 2023.10.02 2025.05.28 Literature Database
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11 PoisoningAttack TypeAdversarial Learning 2022.07.11 2025.05.28 Literature Database
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04 Network SlicingRisk Assessment MethodAdversarial Learning 2022.07.04 2025.05.28 Literature Database
IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31 Algorithm DesignEfficient Proof SystemAdversarial Learning 2022.06.29 2025.05.28 Literature Database