Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli | Published: 2024-02-27 | Updated: 2025-05-29 Model DesignRobustness EvaluationAdversarial Learning 2024.02.27 2025.05.31 Literature Database
Revisiting Transferable Adversarial Images: Systemization, Evaluation, and New Insights Authors: Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Qian Wang, Chao Shen | Published: 2023-10-18 | Updated: 2025-09-16 Model InversionAdversarial Learningevaluation metrics 2023.10.18 2025.09.18 Literature Database
LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04 HallucinationVulnerability of Adversarial ExamplesAdversarial Learning 2023.10.02 2025.05.28 Literature Database
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11 PoisoningAttack TypeAdversarial Learning 2022.07.11 2025.05.28 Literature Database
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04 Network SlicingRisk Assessment MethodAdversarial Learning 2022.07.04 2025.05.28 Literature Database
IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31 Algorithm DesignEfficient Proof SystemAdversarial Learning 2022.06.29 2025.05.28 Literature Database
Private Graph Extraction via Feature Explanations Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02 Attack Methods against DFLPrivacy Risk ManagementAdversarial Learning 2022.06.29 2025.05.28 Literature Database
A Framework for Understanding Model Extraction Attack and Defense Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23 Algorithm DesignMembership InferenceAdversarial Learning 2022.06.23 2025.05.28 Literature Database
ROSE: A RObust and SEcure DNN Watermarking Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22 DNN IP Protection MethodAdversarial LearningEvaluation Method 2022.06.22 2025.05.28 Literature Database
The Privacy Onion Effect: Memorization is Relative Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22 Membership InferenceLabel Inference AttackAdversarial Learning 2022.06.21 2025.05.28 Literature Database