Sparse and Transferable Universal Singular Vectors Attack Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25 WatermarkingAdversarial Attack DetectionOptimization Methods 2024.01.25 2025.05.27 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks Authors: Xinglong Chang, Katharina Dost, Gillian Dobbie, Jörg Wicker | Published: 2023-10-24 Data GenerationPoisoningAdversarial Attack Detection 2023.10.24 2025.05.28 Literature Database
On the Detection of Image-Scaling Attacks in Machine Learning Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23 Backdoor AttackAdversarial Attack DetectionAnalysis of Detection Methods 2023.10.23 2025.05.28 Literature Database
Group-based Robustness: A General Framework for Customized Robustness in the Real World Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10 Group-Based RobustnessAttack EvaluationAdversarial Attack Detection 2023.06.29 2025.05.28 Literature Database
On the Exploitability of Instruction Tuning Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28 Prompt InjectionPoisoningAdversarial Attack Detection 2023.06.28 2025.05.28 Literature Database
Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 Model DesignAdversarial Attack DetectionDeep Learning Method 2022.09.14 2025.05.28 Literature Database
A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13 Model DesignAdversarial Attack DetectionOptimization Strategy 2022.09.13 2025.05.28 Literature Database
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 Model DesignAdversarial Attack DetectionDefense Mechanism 2022.09.09 2025.05.28 Literature Database
SAGE: Software-based Attestation for GPU Execution Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig | Published: 2022-09-07 Secure Communication ChannelMemory Management MethodAdversarial Attack Detection 2022.09.07 2025.05.28 Literature Database