Adversarial attack

Visual Adversarial Examples Jailbreak Aligned Large Language Models

Authors: Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal | Published: 2023-06-22 | Updated: 2023-08-16
Prompt Injection
Inappropriate Content Generation
Adversarial attack

Extracting Cloud-based Model with Prior Knowledge

Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13
Backdoor Attack
Attack Evaluation
Adversarial attack

Exploring Model Dynamics for Accumulative Poisoning Discovery

Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06
Backdoor Attack
Model Design and Accuracy
Adversarial attack

Evading Black-box Classifiers Without Breaking Eggs

Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14
Attack Evaluation
Adversarial Example
Adversarial attack

Poisoning Network Flow Classifiers

Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02
Backdoor Attack
Poisoning
Adversarial attack

A Closer Look at the Adversarial Robustness of Deep Equilibrium Models

Authors: Zonghan Yang, Tianyu Pang, Yang Liu | Published: 2023-06-02
Robustness Evaluation
Adversarial attack
Adaptive Adversarial Training

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
Attack Evaluation
Adversarial attack
Watermark Evaluation

Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01
Adversarial Example
Adversarial attack
Watermark Evaluation

Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning

Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31
Backdoor Attack
Adversarial attack
Causal Discovery Using Missing Data

Robust Lipschitz Bandits to Adversarial Corruptions

Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08
Reinforcement Learning
Adversarial attack
Machine Learning Method