Adversarial attack

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11
Poisoning
Robustness Evaluation
Adversarial attack

Model Extraction Attacks Revisited

Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08
Cyber Attack
Model Extraction Attack
Adversarial attack

A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System

Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06
Robustness Evaluation
Intrusion Detection System
Adversarial attack

Rethinking PGD Attack: Is Sign Function Necessary?

Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21
Poisoning
Robustness Evaluation
Adversarial attack

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30
Watermarking
Robustness Evaluation
Adversarial attack

Transfer Attacks and Defenses for Large Language Models on Coding Tasks

Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22
Prompt Injection
Adversarial attack
Defense Method

DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20
Adversarial attack
Machine Learning Method
Dimensionality Reduction Method

Bergeron: Combating Adversarial Attacks through a Conscience-Based Alignment Framework

Authors: Matthew Pisano, Peter Ly, Abraham Sanders, Bingsheng Yao, Dakuo Wang, Tomek Strzalkowski, Mei Si | Published: 2023-11-16 | Updated: 2024-08-18
Prompt Injection
Multilingual LLM Jailbreak
Adversarial attack

PubDef: Defending Against Transfer Attacks From Public Models

Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17
Adversarial attack
Adversarial Training
Defense Method

Competitive Advantage Attacks to Decentralized Federated Learning

Authors: Yuqi Jia, Minghong Fang, Neil Zhenqiang Gong | Published: 2023-10-20
Client Contribution Assessment
Poisoning
Adversarial attack