On Evaluating Adversarial Robustness of Large Vision-Language Models Authors: Yunqing Zhao, Tianyu Pang, Chao Du, Xiao Yang, Chongxuan Li, Ngai-Man Cheung, Min Lin | Published: 2023-05-26 | Updated: 2023-10-29 LLM Performance EvaluationPrompt InjectionAdversarial attack 2023.05.26 2025.05.28 Literature Database
Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08 Adversarial ExampleAdversarial attackDeep Learning Method 2023.05.24 2025.05.28 Literature Database
Adversarial Demonstration Attacks on Large Language Models Authors: Jiongxiao Wang, Zichen Liu, Keun Hee Park, Zhuojun Jiang, Zhaoheng Zheng, Zhuofeng Wu, Muhao Chen, Chaowei Xiao | Published: 2023-05-24 | Updated: 2023-10-14 Malicious Demo ConstructionAdversarial ExampleAdversarial attack 2023.05.24 2025.05.28 Literature Database
Poisoning Web-Scale Training Datasets is Practical Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06 PoisoningAttack Scenario AnalysisAdversarial attack 2023.02.20 2025.05.28 Literature Database
Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11 PoisoningPerformance Evaluation MetricsAdversarial attack 2022.10.11 2025.05.28 Literature Database
Characterizing Internal Evasion Attacks in Federated Learning Authors: Taejin Kim, Shubhranshu Singh, Nikhil Madaan, Carlee Joe-Wong | Published: 2022-09-17 | Updated: 2023-10-21 PoisoningAdversarial attackAdaptive Adversarial Training 2022.09.17 2025.05.28 Literature Database
Membership Inference Attacks by Exploiting Loss Trajectory Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31 Membership InferenceModel ArchitectureAdversarial attack 2022.08.31 2025.05.28 Literature Database
A Black-Box Attack on Optical Character Recognition Systems Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30 Adversarial ExampleAdversarial attackOptimization Methods 2022.08.30 2025.05.28 Literature Database
Architectural Backdoors in Neural Networks Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15 Adversarial LearningAdversarial attackThreat Model 2022.06.15 2025.05.28 Literature Database
Statically Detecting Adversarial Malware through Randomised Chaining Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Malware Detection MethodAdversarial attackDefense Method 2021.11.28 2025.05.28 Literature Database