Adversarial attack

On Evaluating Adversarial Robustness of Large Vision-Language Models

Authors: Yunqing Zhao, Tianyu Pang, Chao Du, Xiao Yang, Chongxuan Li, Ngai-Man Cheung, Min Lin | Published: 2023-05-26 | Updated: 2023-10-29
LLM Performance Evaluation
Prompt Injection
Adversarial attack

Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias

Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08
Adversarial Example
Adversarial attack
Deep Learning Method

Adversarial Demonstration Attacks on Large Language Models

Authors: Jiongxiao Wang, Zichen Liu, Keun Hee Park, Zhuojun Jiang, Zhaoheng Zheng, Zhuofeng Wu, Muhao Chen, Chaowei Xiao | Published: 2023-05-24 | Updated: 2023-10-14
Malicious Demo Construction
Adversarial Example
Adversarial attack

Poisoning Web-Scale Training Datasets is Practical

Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06
Poisoning
Attack Scenario Analysis
Adversarial attack

Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization

Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11
Poisoning
Performance Evaluation Metrics
Adversarial attack

Characterizing Internal Evasion Attacks in Federated Learning

Authors: Taejin Kim, Shubhranshu Singh, Nikhil Madaan, Carlee Joe-Wong | Published: 2022-09-17 | Updated: 2023-10-21
Poisoning
Adversarial attack
Adaptive Adversarial Training

Membership Inference Attacks by Exploiting Loss Trajectory

Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31
Membership Inference
Model Architecture
Adversarial attack

A Black-Box Attack on Optical Character Recognition Systems

Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30
Adversarial Example
Adversarial attack
Optimization Methods

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15
Adversarial Learning
Adversarial attack
Threat Model

Statically Detecting Adversarial Malware through Randomised Chaining

Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04
Malware Detection Method
Adversarial attack
Defense Method