Visual Adversarial Examples Jailbreak Aligned Large Language Models Authors: Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal | Published: 2023-06-22 | Updated: 2023-08-16 Prompt InjectionInappropriate Content GenerationAdversarial attack 2023.06.22 2025.05.28 Literature Database
Extracting Cloud-based Model with Prior Knowledge Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13 Backdoor AttackAttack EvaluationAdversarial attack 2023.06.07 2025.05.28 Literature Database
Exploring Model Dynamics for Accumulative Poisoning Discovery Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06 Backdoor AttackModel Design and AccuracyAdversarial attack 2023.06.06 2025.05.28 Literature Database
Evading Black-box Classifiers Without Breaking Eggs Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14 Attack EvaluationAdversarial ExampleAdversarial attack 2023.06.05 2025.05.28 Literature Database
Poisoning Network Flow Classifiers Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02 Backdoor AttackPoisoningAdversarial attack 2023.06.02 2025.05.28 Literature Database
A Closer Look at the Adversarial Robustness of Deep Equilibrium Models Authors: Zonghan Yang, Tianyu Pang, Yang Liu | Published: 2023-06-02 Robustness EvaluationAdversarial attackAdaptive Adversarial Training 2023.06.02 2025.05.28 Literature Database
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02 Attack EvaluationAdversarial attackWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01 Adversarial ExampleAdversarial attackWatermark Evaluation 2023.06.01 2025.05.28 Literature Database
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31 Backdoor AttackAdversarial attackCausal Discovery Using Missing Data 2023.05.31 2025.05.28 Literature Database
Robust Lipschitz Bandits to Adversarial Corruptions Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08 Reinforcement LearningAdversarial attackMachine Learning Method 2023.05.29 2025.05.28 Literature Database