Adversarial attack

On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers

Authors: Illia Horenko | Published: 2023-10-19 | Updated: 2023-11-15
Adversarial attack
Optimization Methods
Machine Learning Method

Catastrophic Jailbreak of Open-source LLMs via Exploiting Generation

Authors: Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen | Published: 2023-10-10
Prompt Injection
Attack Evaluation
Adversarial attack

Outlier Robust Adversarial Training

Authors: Shu Hu, Zhenhuan Yang, Xin Wang, Yiming Ying, Siwei Lyu | Published: 2023-09-10
Convergence Property
Loss Term
Adversarial attack

DAD++: Improved Data-free Test Time Adversarial Defense

Authors: Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty | Published: 2023-09-10
Adversarial Example
Adversarial attack
Defense Method

Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences

Authors: Jeremiah Birrell, Mohammadreza Ebrahimi | Published: 2023-09-07
Malicious Demo Construction
Adversarial attack
Defense Method

Non-Asymptotic Bounds for Adversarial Excess Risk under Misspecified Models

Authors: Changyu Liu, Yuling Jiao, Junhui Wang, Jian Huang | Published: 2023-09-02
Convergence Property
Loss Term
Adversarial attack

The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning

Authors: Maria Rigaki, Sebastian Garcia | Published: 2023-08-31
Reinforcement Learning
Malicious Demo Construction
Adversarial attack

A Comparison of Adversarial Learning Techniques for Malware Detection

Authors: Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp | Published: 2023-08-19
Malware Detection
Adversarial Example
Adversarial attack

URET: Universal Robustness Evaluation Toolkit (for Evasion)

Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03
Data Generation
Adversarial Example
Adversarial attack

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03
Adversarial Example
Adversarial attack
Watermark Robustness