Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01 Adversarial attackOptimization MethodsLinear Model 2023.08.01 2025.05.28 Literature Database
Doubly Robust Instance-Reweighted Adversarial Training Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01 Adversarial attackOptimization MethodsDeep Learning Method 2023.08.01 2025.05.28 Literature Database
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31 Data PreprocessingAdversarial attackDeep Learning Method 2023.07.31 2025.05.28 Literature Database
On Neural Network approximation of ideal adversarial attack and convergence of adversarial training Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30 Convergence PropertyAdversarial attackOptimization Methods 2023.07.30 2025.05.28 Literature Database
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03 Adversarial ExampleAdversarial attackThreat modeling 2023.07.03 2025.05.28 Literature Database
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10 Algorithm DesignAdversarial attackStatistical Testing 2023.06.24 2025.05.28 Literature Database
Boosting Model Inversion Attacks with Adversarial Examples Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24 PoisoningAdversarial ExampleAdversarial attack 2023.06.24 2025.05.28 Literature Database
Creating Valid Adversarial Examples of Malware Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23 Malware ClassificationMalware Detection MethodAdversarial attack 2023.06.23 2025.05.28 Literature Database
Visual Adversarial Examples Jailbreak Aligned Large Language Models Authors: Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal | Published: 2023-06-22 | Updated: 2023-08-16 Prompt InjectionInappropriate Content GenerationAdversarial attack 2023.06.22 2025.05.28 Literature Database
Extracting Cloud-based Model with Prior Knowledge Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13 Backdoor AttackAttack EvaluationAdversarial attack 2023.06.07 2025.05.28 Literature Database