Adversarial Training

The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks

Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14
Watermarking
Quantification of Uncertainty
Adversarial Training

Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples

Authors: Matous Kozak, Luca Demetrio, Dmitrijs Trizna, Fabio Roli | Published: 2024-05-04
Malware Classification
Adversarial Example
Adversarial Training

Why You Should Not Trust Interpretations in Machine Learning: Adversarial Attacks on Partial Dependence Plots

Authors: Xi Xin, Giles Hooker, Fei Huang | Published: 2024-04-29 | Updated: 2024-05-01
Model Interpretability
Adversarial Training
Watermark Evaluation

A Comparative Analysis of Adversarial Robustness for Quantum and Classical Machine Learning Models

Authors: Maximilian Wendlinger, Kilian Tscharke, Pascal Debus | Published: 2024-04-24
Poisoning
Adversarial Training
Quantum Framework

MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception

Authors: Vidit Khazanchi, Pavan Kulkarni, Yuvaraj Govindarajulu, Manojkumar Parmar | Published: 2024-04-24 | Updated: 2024-05-02
Model Interpretability
Attack Method
Adversarial Training

Multimodal Attack Detection for Action Recognition Models

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13
DoS Mitigation
Adversarial Training
Defense Method

Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers

Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11
Edge Computing
Adversarial Example
Adversarial Training

CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06
Intrusion Detection System
Adversarial Training
Threat modeling

ADAPT to Robustify Prompt Tuning Vision Transformers

Authors: Masih Eskandar, Tooba Imtiaz, Zifeng Wang, Jennifer Dy | Published: 2024-03-19 | Updated: 2025-02-07
Prompting Strategy
Prompt Engineering
Adversarial Training

Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks

Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23
Intrusion Detection System
Adversarial Training
Structural Attack