Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh | Published: 2023-10-16 Prompt InjectionAdversarial ExampleAdversarial Training 2023.10.16 2025.05.28 Literature Database
Regularization properties of adversarially-trained linear regression Authors: Antônio H. Ribeiro, Dave Zachariah, Francis Bach, Thomas B. Schön | Published: 2023-10-16 Convergence PropertyLoss TermAdversarial Training 2023.10.16 2025.05.28 Literature Database
How Robust is Google’s Bard to Adversarial Image Attacks? Authors: Yinpeng Dong, Huanran Chen, Jiawei Chen, Zhengwei Fang, Xiao Yang, Yichi Zhang, Yu Tian, Hang Su, Jun Zhu | Published: 2023-09-21 | Updated: 2023-10-14 Adversarial TrainingDefense MethodFace Recognition 2023.09.21 2025.05.28 Literature Database
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review Authors: Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen | Published: 2023-08-30 | Updated: 2023-12-25 Energy ManagementPrompt InjectionAdversarial Training 2023.08.30 2025.05.28 Literature Database
Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29 Text Generation MethodAdversarial TrainingAdaptive Misuse Detection 2023.08.29 2025.05.28 Literature Database
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13 Backdoor AttackAdversarial TrainingDefense Method 2023.08.13 2025.05.28 Literature Database
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09 Attack MethodAdversarial TrainingBehavior Analysis Method 2023.06.09 2025.05.28 Literature Database
Isometric 3D Adversarial Examples in the Physical World Authors: Yibo Miao, Yinpeng Dong, Jun Zhu, Xiao-Shan Gao | Published: 2022-10-27 Adversarial TrainingOptimization MethodsGenerative Adversarial Network 2022.10.27 2025.05.28 Literature Database
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25 WatermarkingDynamic AnalysisAdversarial Training 2022.10.25 2025.05.28 Literature Database
A White-Box Adversarial Attack Against a Digital Twin Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25 Cyber AttackAdversarial TrainingAnomaly Detection Method 2022.10.25 2025.05.28 Literature Database