MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11 PoisoningRobustness EvaluationAdversarial attack 2023.12.11 2025.05.28 Literature Database
Model Extraction Attacks Revisited Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08 Cyber AttackModel Extraction AttackAdversarial attack 2023.12.08 2025.05.28 Literature Database
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06 Robustness EvaluationIntrusion Detection SystemAdversarial attack 2023.12.06 2025.05.28 Literature Database
Rethinking PGD Attack: Is Sign Function Necessary? Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21 PoisoningRobustness EvaluationAdversarial attack 2023.12.03 2025.05.28 Literature Database
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30 WatermarkingRobustness EvaluationAdversarial attack 2023.11.30 2025.05.28 Literature Database
Transfer Attacks and Defenses for Large Language Models on Coding Tasks Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22 Prompt InjectionAdversarial attackDefense Method 2023.11.22 2025.05.28 Literature Database
DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20 Adversarial attackMachine Learning MethodDimensionality Reduction Method 2023.11.20 2025.05.28 Literature Database
Bergeron: Combating Adversarial Attacks through a Conscience-Based Alignment Framework Authors: Matthew Pisano, Peter Ly, Abraham Sanders, Bingsheng Yao, Dakuo Wang, Tomek Strzalkowski, Mei Si | Published: 2023-11-16 | Updated: 2024-08-18 Prompt InjectionMultilingual LLM JailbreakAdversarial attack 2023.11.16 2025.05.28 Literature Database
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 Adversarial attackAdversarial TrainingDefense Method 2023.10.26 2025.05.28 Literature Database
Competitive Advantage Attacks to Decentralized Federated Learning Authors: Yuqi Jia, Minghong Fang, Neil Zhenqiang Gong | Published: 2023-10-20 Client Contribution AssessmentPoisoningAdversarial attack 2023.10.20 2025.05.28 Literature Database