Defense Mechanism

SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models

Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22
Adversarial Learning
Computational Complexity
Defense Mechanism

Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval

Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21
RAG
Large Language Model
Defense Mechanism

Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses

Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21
Alignment
Prompt Injection
Defense Mechanism

Model-agnostic clean-label backdoor mitigation in cybersecurity environments

Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05
Backdoor Detection
Backdoor Attack
Defense Mechanism

Large Language Model Sentinel: LLM Agent for Adversarial Purification

Authors: Guang Lin, Toshihisa Tanaka, Qibin Zhao | Published: 2024-05-24 | Updated: 2025-04-23
Prompt validation
Adversarial Text Purification
Defense Mechanism

ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning

Authors: Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio | Published: 2023-08-09 | Updated: 2025-05-21
Relationship between Robustness and Privacy
Adversarial Example Detection
Defense Mechanism

Defend Data Poisoning Attacks on Voice Authentication

Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07
Model Design
Adversarial Attack Detection
Defense Mechanism

Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification

Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19
Training Data Extraction Method
Reconstruction Attack
Defense Mechanism

A Review of Adversarial Attack and Defense for Classification Methods

Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18
Adversarial Example
Adversarial attack
Defense Mechanism

QUDOS: Quorum-Based Cloud-Edge Distributed DNNs for Security Enhanced Industry 4.0

Authors: Kevin Wallis, Christoph Reich, Blesson Varghese, Christian Schindelhauer | Published: 2021-11-09
Data Integrity Constraints
Efficiency of Distributed Learning
Defense Mechanism