Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability Authors: Rajdeep Haldar, Yue Xing, Qifan Song | Published: 2024-03-06 | Updated: 2024-03-23 Clustering methodsAdversarial ExampleAdversarial Training 2024.03.06 2025.05.27 Literature Database
Improving behavior based authentication against adversarial attack using XAI Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan | Published: 2024-02-26 | Updated: 2024-03-10 Adversarial TrainingFeature Selection MethodDefense Method 2024.02.26 2025.05.27 Literature Database
Robust CLIP: Unsupervised Adversarial Fine-Tuning of Vision Embeddings for Robust Large Vision-Language Models Authors: Christian Schlarmann, Naman Deep Singh, Francesco Croce, Matthias Hein | Published: 2024-02-19 | Updated: 2024-06-05 Prompt InjectionRobustness EvaluationAdversarial Training 2024.02.19 2025.05.27 Literature Database
DART: A Principled Approach to Adversarially Robust Unsupervised Domain Adaptation Authors: Yunjuan Wang, Hussein Hazimeh, Natalia Ponomareva, Alexey Kurakin, Ibrahim Hammoud, Raman Arora | Published: 2024-02-16 AlgorithmAdversarial TrainingWatermark Evaluation 2024.02.16 2025.05.27 Literature Database
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06 Cyber AttackPoisoningAdversarial Training 2024.02.06 2025.05.27 Literature Database
Asymptotic Behavior of Adversarial Training Estimator under $\ell_\infty$-Perturbation Authors: Yiling Xie, Xiaoming Huo | Published: 2024-01-27 WatermarkingAdversarial TrainingAdaptive Adversarial Training 2024.01.27 2025.05.27 Literature Database
Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective Authors: Yue Xing, Xiaofeng Lin, Qifan Song, Yi Xu, Belinda Zeng, Guang Cheng | Published: 2024-01-26 PoisoningAdversarial TrainingFeature Selection Method 2024.01.26 2025.05.27 Literature Database
Elevating Defenses: Bridging Adversarial Training and Watermarking for Model Resilience Authors: Janvi Thakkar, Giulio Zizzo, Sergio Maffeis | Published: 2023-12-21 | Updated: 2024-01-07 WatermarkingHyperparameter TuningAdversarial Training 2023.12.21 2025.05.27 Literature Database
Balance, Imbalance, and Rebalance: Understanding Robust Overfitting from a Minimax Game Perspective Authors: Yifei Wang, Liangchen Li, Jiansheng Yang, Zhouchen Lin, Yisen Wang | Published: 2023-10-30 Robustness EvaluationAdversarial TrainingAdaptive Adversarial Training 2023.10.30 2025.05.28 Literature Database
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 Adversarial attackAdversarial TrainingDefense Method 2023.10.26 2025.05.28 Literature Database