Adversarial Attack Detection

Sparse and Transferable Universal Singular Vectors Attack

Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25
Watermarking
Adversarial Attack Detection
Optimization Methods

A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26
Security Analysis
Model Design
Adversarial Attack Detection

Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks

Authors: Xinglong Chang, Katharina Dost, Gillian Dobbie, Jörg Wicker | Published: 2023-10-24
Data Generation
Poisoning
Adversarial Attack Detection

On the Detection of Image-Scaling Attacks in Machine Learning

Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23
Backdoor Attack
Adversarial Attack Detection
Analysis of Detection Methods

Group-based Robustness: A General Framework for Customized Robustness in the Real World

Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10
Group-Based Robustness
Attack Evaluation
Adversarial Attack Detection

On the Exploitability of Instruction Tuning

Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28
Prompt Injection
Poisoning
Adversarial Attack Detection

Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries

Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14
Model Design
Adversarial Attack Detection
Deep Learning Method

A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game

Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13
Model Design
Adversarial Attack Detection
Optimization Strategy

Defend Data Poisoning Attacks on Voice Authentication

Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07
Model Design
Adversarial Attack Detection
Defense Mechanism

SAGE: Software-based Attestation for GPU Execution

Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig | Published: 2022-09-07
Secure Communication Channel
Memory Management Method
Adversarial Attack Detection