Adversarial Training

Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh | Published: 2023-10-16
Prompt Injection
Adversarial Example
Adversarial Training

Regularization properties of adversarially-trained linear regression

Authors: Antônio H. Ribeiro, Dave Zachariah, Francis Bach, Thomas B. Schön | Published: 2023-10-16
Convergence Property
Loss Term
Adversarial Training

How Robust is Google’s Bard to Adversarial Image Attacks?

Authors: Yinpeng Dong, Huanran Chen, Jiawei Chen, Zhengwei Fang, Xiao Yang, Yichi Zhang, Yu Tian, Hang Su, Jun Zhu | Published: 2023-09-21 | Updated: 2023-10-14
Adversarial Training
Defense Method
Face Recognition

Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review

Authors: Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen | Published: 2023-08-30 | Updated: 2023-12-25
Energy Management
Prompt Injection
Adversarial Training

Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification

Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29
Text Generation Method
Adversarial Training
Adaptive Misuse Detection

SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13
Backdoor Attack
Adversarial Training
Defense Method

Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09
Attack Method
Adversarial Training
Behavior Analysis Method

Isometric 3D Adversarial Examples in the Physical World

Authors: Yibo Miao, Yinpeng Dong, Jun Zhu, Xiao-Shan Gao | Published: 2022-10-27
Adversarial Training
Optimization Methods
Generative Adversarial Network

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants

Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25
Watermarking
Dynamic Analysis
Adversarial Training

A White-Box Adversarial Attack Against a Digital Twin

Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25
Cyber Attack
Adversarial Training
Anomaly Detection Method